[1] |
徐正全, 徐彦彦 . 可视媒体信息安全[M]. 北京: 高等教育出版社, 2012. XU Z Q , XU Y Y . Visual Media Information Security[M]. Beijing: Higher Education Press, 2012.
|
[2] |
JUDITH A R , WIEM T , DUGELAY J L . Digital image forensics: a booklet for beginners[J]. Multimedia Tools and Applications, 2011,51(1):133-162.
|
[3] |
CHUANG W H , SU H , WU M . Exploring compression effects for improved source camera identification using strongly compressed video[A]. 2011 18th IEEE International Conference on Image Proc-essing[C]. Belgium 2011.1953-1956.
|
[4] |
FARID H . Image forgery detection[J]. IEEE Signal Processing Magazine[C]. Belgium 2011.1953-1956.
|
[5] |
曹刚, 赵耀, 倪蓉 . 多媒体内容认证[J]. 中国计算机学会通讯 2011,7(2):38-44. CAO G , ZHAO Y , NI R R . Multimedia content authentication[J]. China Computer Federation Communications, 2011,7(2):38-44.
|
[6] |
LIAN S G , KANELLOPOULOS D , RUFFO G . Multimedia informa-tion system security[J]. Informatica, 2009,33(1):3-24.
|
[7] |
XU G S , SHI Y Q . Camera model identification using local binary patterns[A]. 2012 IEEE International Conference on Multimedia and Expo[C]. Melbourne 2012.392-397.
|
[8] |
LIN Z C , HE J F , TANG X O , et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis[A]. Pattern Recognition, Melbourne 2009,42(11):2492-2501.
|
[9] |
POPESCU A C , FARID H . Statistical tools for digital forensics[J]. Information Hiding, 2005,3200:128-147.
|
[10] |
LUKAS J , FRIDRICH J . Estimation of primary quantization matrix in double compressed JPEG images[A]. Digital Forensic Research Work-shop[C]. Cleveland 2003.
|
[11] |
WANG W H , FARID H . Exposing digital forgeries in video by detect-ing double MPEG compression[A]. MM&Sec '06 Proceedings of the 8th Workshop on Multimedia and Security[C]. New York,37-47. 2006.
|
[12] |
SU Y T , XU J Y . Detection of double compression in MPEG2 videos[A]. 2010 2nd International Workshop on Intelligent Systems and Applications[C]. Wuhan, China, 2010.1-4.
|
[13] |
LI B , SHI Y Q , HUANG J W . Detecting doubly compressed JPEG images by using mode based first digit features[A]. 2008 IEEE 10th Workshop on Multimedia Signal Processing[C]. Queensland, 2008.730-735.
|
[14] |
FU D D , SHI Y Q , SU W . A generalized Benford's law for JPEG coef-ficients and its applications in image forensics[A]. Security, Steg-anography and Watermarking of Multimedia Contents IX[C]. San Jose, 2007.6505.
|
[15] |
CHEN W , SHI Y Q . Detection of double MPEG compression based on first digit statistics[J]. Digital Watermarking, 2009,5450:16-30.
|
[16] |
HUANG F J , HUANG J W , SHI Y Q . Detecting double JPEG com-pression with the same quantization matrix[J]. IEEE Transactions on Information Forensics and Security, 2010,5(4):848-856.
|
[17] |
LUO W Q , QU Z H , HUANG J W , et al. A novel method for detecting cropped and recompressed image block[A]. IEEE International Con-ference on Acoustics, Speech and Signal Processing[C]. Vancouver, 2007.II-217-II-220.
|
[18] |
REEVE H C , LIM J S . Reduction of blocking effects in image cod-ing[J]. Optical Engineering, 1984,23(1):34-37.
|
[19] |
LIU Q Z . Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery[A]. The 3rd Interna-tional ACM Workshop on Multimedia in Forensics and Intelligence[C]. Scottsdale, 2011.25-30.
|
[20] |
秦运龙 . 压缩域视频被动取证研究[D]. 上海大学, 2010. QIN Y L . The Research of Passive Video Forensics in Compressed Domain[D]. Shanghai University, 2010.
|
[21] |
NG T T , CHANG S F . A model for image splicing[A]. 2004 Interna-tional Conference on Image Processing[C]. Singapore, 2004.1169-1172.
|
[22] |
SHI Y Q , CHEN C H , CHEN W . A natural image model approach to splicing detection[A]. MM&Sec '07 Proceedings of the 9th Workshop on Multimedia and Security[C]. New York, 2007.51-62.
|
[23] |
FRIDRICH J , SOUKAL D , LUKAS J . Detection of copy-move for-gery in digital images[A]. Proceedings of Digital Forensic Research Workshop[C]. New York, 2003.
|
[24] |
POPESCU A C , FARID H . Exposing Digital Forgeries by Detecting Duplicated Image Regions[R]. Dartmouth College, Hanover,NH, Tech Rep TR2004-515 2004.
|
[25] |
LI G.H , WU Q , TU D , et al. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[A]. 2007 IEEE International Conference on Multimedia and Expo[C]. Beijing, China, 2007.1750-1753.
|
[26] |
LANGILLE A , GONG M L . An efficient match-based duplication detection algorithm[A]. The 3rd Canadian Conference on Computer and Robot Vision[C]. Quebec, 2006.64.
|
[27] |
HUANG H L , GUO W Q , ZHANG Y . Detection of copy-move forgery in digital images using SIFT algorithm[A]. IEEE Pacific-Asia Work-shop on Computational Intelligence and Industrial Application[C]. Wuhan, China, 2008.272-276.
|
[28] |
WANG W H , FARID H . Exposing digital forgeries in video by detect-ing duplication[A]. MM&Sec '07 Proceedings of the 9th Workshop on Multimedia & Security[C]. Dallas, 2007.35-42.
|
[29] |
POPESCU A C , FARID H . Exposing digital forgeries in color filter array interpolated images[J]. IEEE Transactions on Signal Processing, 2005,53(10):3948-3959.
|
[30] |
POPESCU A C , FARID H . Exposing digital forgeries by detecting traces of resampling[J]. IEEE Transactions on Signal Processing, 2005,53(2):758-767.
|
[31] |
WANG W H , FARID H . Exposing digital forgeries in interlaced and deinterlaced video[J]. IEEE Transactions on Information Forensics and Security, 2007,2(4):238-258.
|
[32] |
WANG W H , FARID H . Exposing digital forgeries in video by detect-ing double quantization[A]. MM&Sec '09 Proceedings of the 11th ACM Workshop on Multimedia and Security[C]. New York, 2009.39-48.
|
[33] |
BARNI M , COSTANZO A , SABATINI L . Identification of cut &paste tampering by means of double-JPEG detection and image seg-mentation[A]. 2010 IEEE International Symposium on Circuits and Systems[C]. Paris, 2010.1687-1690.
|
[34] |
LUO W Q , WU M , HUANG J W . MPEG recompression detection based on block artifacts[A]. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X[C]. San Jose, 2008.68190X-1-68190X-12.
|
[35] |
STAMM M C , LIN W S , LIU K J R . Temporal forensics and anti-forensics for motion compensated video[J]. IEEE Transactions on Information Forensics and Security, 2012,7(4):1315-1329.
|
[36] |
FARID H . Detecting Digital Forgeries Using Bispectral Analysis[R]. AI Lab Massachusetts Institute of Technology,Tech Rep AIM-1657, 1999.
|
[37] |
CHEN W , SHI Y Q , SU W . Image splicing detection using 2-D phase congruency and statistical moments of characteristic function[A]. Proc SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents IX[C]. San Jose, 2007.
|
[38] |
FU D D , SHI Y Q , SU W . Detection of image splicing based on hil-bert-huang transform and moments of characteristic functions with wavelet decomposition[A]. Digital Watermarking, Proceeding of 5th International Workshop on Digital Watermarking[C]. Jeju Island, 2006.177-187.
|
[39] |
NG T T , CHANG S F , SUN Q B . Blind detection of photomontage using higher order statistics[A]. EEE International Symposium on Circuits and Systems[C]. Vancouver, 2004.688-691.
|
[40] |
Columbia image splicing detection evaluation dataset[EB/OL]. , 2007.
|
[41] |
FARID H , LYU S W . Higher-order wavelet statistics and their applica-tion to digital forensics[A]. CVPRW '03, Conference on Computer Vi-sion and Pattern Recognition Workshop[C]. Madison, 2003.94.
|
[42] |
CHEN M , FRIDRICH J , GOLJAN M , et al. Determining image origin and integrity using sensor pattern noise[J]. IEEE Transactions Infor-mation Forensics Security, 2008,3(1):74-90.
|
[43] |
HSU C C , HUNG T Y , LIN C W , et al. Video forgery detection using correlation of noise residue[A]. Proceedings of IEEE Workshop Mul-timedia Signal Processing[C]. Queensland, 2008.170-174.
|
[44] |
KOBAYASHI M , OKABE T , SATO Y . Detecting forgery from static-scene video based on inconsistency in noise level functions[J]. IEEE Transactions on Information Forensics and Security, 2010,5(4):883-892.
|
[45] |
JOHNSON M K , FARID H . Exposing digital forgeries by detecting inconsistencies in lighting[A]. ACM Multimedia and Security Workshop[C]. New York, 2005.1-10.
|
[46] |
JOHNSON M K , FARID H . Exposing digital forgeries through specu-lar highlights on the eye[A]. The 9th International Workshop on In-formation Hiding[C]. Saint Malo, 2007.311-325.
|
[47] |
JOHNSON M K , FARID H . Exposing digital forgeries in complex lighting environments[J]. IEEE Transactions Information Forensics Security, Saint Malo, 2007,3(2):450-461.
|
[48] |
JOHNSON M K , FARID H . Metric Measurements on a Plane from a Single Image[R]. Dept Comput Sci, Dartmouth College,Tech Rep TR2006-579, 2006.
|
[49] |
JOHNSON M K , FARID H . Detecting photographic composites of people[A]. International Workshop on Digital Watermarking[C]. Guangzhou, China, 2007.
|
[50] |
STAMM M C , LIN W S , LIU K J R . Forensics anti-forensics: a deci-sion and game theoretic framework[A]. 2012 IEEE International Con-ference on Acoustics, Speech and Signal Processing[C]. 2012.1749-1752.
|
[51] |
STAMM M C , LIU K J R . Anti-forensics of digital image compression[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3):1050-1065.
|
[52] |
FENG C H , XU Z Q , ZHENG X H . An anti-forensic algorithm of JPEG double compression based forgery detection[A]. Proceedings of the 2012 4th International Symposium on Information Science and Engineering[C]. Shanghai, China, 2012.159-164.
|
[53] |
GLOE T , KIRCHNER M , WINKLER A . Can we trust digital image forensics[A]. Proceedings of the 15th International Conference on Multimedia[C]. New York, 2007.78-86.
|
[54] |
KIRCHNER M , B¨OHME R . Synthesis of color filter array pattern in digital images[A]. Proceedings of Electronic Imaging: Media Foren-sics and Security[C]. San Jose, 2009.72540.
|
[55] |
CAO G , ZHAO Y , NI R R , et al. Anti-forensics of contrast enhance-ment in digital images[A]. Proceedings of ACM Multimedia and Se-curity Workshop[C]. Roma, 2010.25-34.
|
[56] |
PETITCOLAS F A P , ANDERSON R J , KUHN M G . Attacks on copy-right marking systems[A]. David Aucsmith (Ed), Information Hiding, Second International Workshop, IH'98[C]. Portland, 1998.219-239.
|
[57] |
Certification of watermarking techniques[EB/OL]. , 2002.
|
[58] |
SOLACHIDIS V , TEFAS A , NIKOLAIDIS N , et al. A benchmarking protocol for watermarking methods[A]. 2001 IEEE International Con-ference on Image Processing[C]. Thessaloniki, 2001.1023-1026.
|
[59] |
BESTAGINI P , FONTANI M , MILANI S , et al. An overview on video forensics[A]. The 20th European Signal Processing Conference[C]. Bucharest, Bucharest, 2012.1229-1233.
|
[60] |
[EB/OL]. 2012.
|