Overview of state-of-the-art in digital image forensics

HT Sencar, N Memon - Algorithms, Architectures and Information …, 2009 - World Scientific
Digital images can now be easily created, altered, and manipulated with no obvious traces
of having been subjected to any of these operations. There are currently no established …

Image forgery detection

H Farid - IEEE Signal processing magazine, 2009 - ieeexplore.ieee.org
We are undoubtedly living in an age where we are exposed to a remarkable array of visual
imagery. While we may have historically had confidence in the integrity of this imagery …

[图书][B] Disappearing cryptography: information hiding: steganography and watermarking

P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …

Temporal derivative-based spectrum and mel-cepstrum audio steganalysis

Q Liu, AH Sung, M Qiao - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
To improve a recently developed mel-cepstrum audio steganalysis method, we present in
this paper a method based on Fourier spectrum statistics and mel-cepstrum coefficients …

On bayesian analysis of a finite generalized dirichlet mixture via a metropolis-within-gibbs sampling

N Bouguila, D Ziou, RI Hammoud - Pattern Analysis and Applications, 2009 - Springer
In this paper, we present a fully Bayesian approach for generalized Dirichlet mixtures
estimation and selection. The estimation of the parameters is based on the Monte Carlo …

Discriminating between photorealistic computer graphics and natural images using fractal geometry

F Pan, JB Chen, JW Huang - Science in China Series F: Information …, 2009 - Springer
Rendering technology in computer graphics (CG) is now capable of producing highly
photorealistic images, giving rise to the problem of how to identify CG images from natural …

Improved detection and evaluation for JPEG steganalysis

Q Liu, AH Sung, M Qiao - Proceedings of the 17th ACM international …, 2009 - dl.acm.org
Detection of information-hiding in JPEG images is actively delivered in steganalysis
community due to the fact that JPEG is a widely used compression standard and several …

Novel stream mining for audio steganalysis

Q Liu, AH Sung, M Qiao - Proceedings of the 17th ACM international …, 2009 - dl.acm.org
In this paper, we present a novel stream data mining for audio steganalysis, based on
second order derivative of audio streams. We extract Mel-cepstrum coefficients and Markov …

Source camera identification forensics based on wavelet features

B Wang, Y Guo, X Kong, F Meng - 2009 Fifth International …, 2009 - ieeexplore.ieee.org
Source camera identification forensics aims at determining and authenticating the original
sources of digital images to support forensics and get the trace of digital images. This paper …

Feature-based camera model identification works in practice: Results of a comprehensive evaluation study

T Gloe, K Borowka, A Winkler - … , IH 2009, Darmstadt, Germany, June 8-10 …, 2009 - Springer
Feature-based camera model identification plays an important role in the toolbox for image
source identification. It enables the forensic investigator to discover the probable source …