[1] Kee E, Johnson M K, and Farid H. Digital image authentication from JPEG headers[J]. IEEE Transactions on Information Forensics and Security, 2011,7(3):1066-1075. [2] Fan Jiayuan, Cao Hong, Kot A C. Estimating EXIF parameters based on noise features for image manipulation detection[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(4): 608 – 618. [3] Kee E, O’Brien J, Farid H. Exposing photo manipulation with inconsistent shadows[J]. ACM Transaction on Graphics, 2013, 32(4): 1-11.[4] Abrams A, Miskell K, Pless R. The episolar constraint. monocular shape from shadow correspondence[C]//2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013:1404-1414.[5] Rang M H, Nguyen, Minh N L, Light source estimation from a single image[J]. International Conference on Control, Automation, Robotics&Vision, 2012,5(3): 1358-1363.[6] 李叶舟, 吴小媚, 牛少彰, 孟宪哲. 基于相机标定的文字变造篡改鉴定[J].北京邮电大学学报, 2012,35(6):16-19.LI Yezhou, WU Xiaomei, NIU Shaozhang, MENG Xianzhe. Forgeries of chinese character detecting based on camera calibration[J]. Journal of Beijing University of Posts and Telecommunications, 2012,35(6): 16-19 .[7] Chierchia G, Poggi G, Sansone C, Verdoliva L. .A Bayesian-MRF approach for PRNU-based image forgery detection[J].IEEE Transactions on Information Forensics and Security, 2014,9(4):554-567. [8] Riess C, Angelopoulou E. Scene illumination as an indicator of image manipulation[C]//12th Information Hiding. Springer Berlin Heidelberg, 2010: 66-80.[9] Asatryan D, Asatryan N, Lanina N. Method for detection of image tampering and partial recovery[C]//Computer Science and Information Technologies (CSIT), 2013: 1-6.[10] Muhammad G, Al-Hammadi M H, Hussain M. Copy move image forgery detection method using steerable pyramid transform and texture descriptor[C]//EUROCON, 2013: 1586-1592.[11] Jaberi M, Bebis G, Hussain M. Improving the detection and localization of duplicated regions in copy-move image forgery[C]// 18th International Conference on Digital Signal Processing (DSP), 2013: 1-6.[12] Hany Farid, exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics and Security archive, 2009,4(1):154~160.[13] Puglisi G, Bruna A R, Galvan F. First JPEG quantization matrix estimation based on histogram analysis[C]//ICIP, 2013: 4502-4506.[14] Galvan F, Puglisi G, Bruna A R, Battiato S. First quantization matrix estimation from double compressed JPEG images [J], Information Forensics and Security, IEEE Transactions on ,2014,9(8):1299-1310.[15] Lukáš J, Fridrich J. Estimation of primary quantization matrix in double compressed JPEG images[C]//Processing of Digital Forensic Research Workshop, 2003: 5-8.[16] Peng Y, Liu B. Accurate estimation of primary quantization table with applications to tampering detection [J]. Electronics Letters, 2013, 49(23): 1452-1454.[17] Bianchi T, Piva A. Image forgery localization via block-grained analysis of JPEG artifacts [J]. Information Forensics and Security, IEEE Transactions on, 2012, 7(3): 1003-1017.[18] 孟宪哲, 牛少彰, 李叶舟, 朱艳玲, 胡静. 基于双重JPEG压缩特征的数字图像篡改取证技术[J]. 四川大学学报(自然科学版),2010, 47(增刊):225-231.Meng Xianzhe, Niu Shaozhang, Li Yezhou, Zhu Yanling, Hu Jing . Tamper Detection Based on the Statistical CharacteristicsCaused by Double JPEG Compression [J]. Journal of Sichuan University(Natural Science Edition), 2010, 47(Suppl.): 225-231. |