[1] De Rosa A, Fontani M, Massai M, Piva A, Barni M. Second-order statistics analysis to cope with contrast enhancement counter-forensics[J]. IEEE Signal Processing Letters, 2015, 22(8):1132-1136.
[2] Stamm M, Liu K J R. Blind forensics of contrast enhancement in digital images[C]//200815th IEEE International Conference on Image Processing, 2008:3112-3115.
[3] Cao G, Zhao Y, Ni R, Forensic estimation of gamma correction in digital images[C]//IEEE International Conference on Image Processing, 2010:2097-2100.
[4] Lin X, Li C T, Hu Y. Exposing image forgery through the detection of contrast enhancement[C]//2013 IEEE International Conference on Image Processing, 2013:4467-4471.
[5] Cao G, Zhao Y, Ni R, Li X. Contrast enhancement-based forensics in digital images[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(3):515-525.
[6] Fan Z, De Queiroz R L. Identification of bitmap compression history:JPEG detection and quantizer estimation[J]. IEEE Transactions on Image Processing, 2003, 12(2):230-235.
[7] Luo W, Qu Z, Huang J, Qiu G. A novel method for detecting cropped and recompressed image block[C]//2007 IEEE International Conference on Acoustics, Speech and Signal Processing-ICASSP'07, 2007(2):Ⅱ-217-Ⅱ-220.
[8] Farid H. Exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(1):154-160.
[9] Huang F, Huang J, Shi Y Q. Detecting double JPEG compression with the same quantization matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):848-856.
[10] Luo W, Huang J, Qiu G. JPEG error analysis and its applications to digital image forensics[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3):480-491.
[11] Kirchner M, Fridrich J. On detection of median filtering in digital images[C]//SPIE Proceeding of Electronic Imaging, Media Forensics and Security Ⅱ, 2010, 7541(1):1-12.
[12] Chen C, Ni J, Huang R, Huang J. Blind median filtering detection using statistics in difference domain[C]//International Workshop on Information Hiding. Springer Berlin Heidelberg, 2012:1-15.
[13] Kang X, Stamm M C, Peng A, Liu K R. Robust median filtering forensics using an autoregressive model[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(9):1456-1468.
[14] Zhang Y, Li S, Wang S, Shi Y Q. Revealing the traces of median filtering using high-order local ternary patterns[J]. IEEE Signal Processing Letters, 2014, 21(3):275-279.
[15] Chen J, Kang X, Liu Y, Wang Z J. Median filtering forensics based on convolutional neural networks[J]. IEEE Signal Processing Letters, 2015, 22(11):1849-1853.
[16] Popescu A C, Farid H. Exposing digital forgeries by detecting traces of resampling[J]. IEEE Transactions on Signal Processing, 2005, 53(2):758-767.
[17] Barni M, Fontani M, Tondi B. A universal attack against histogram-based image forensics[J]. International Journal of Digital Crime and Forensics (IJDCF), 2013, 5(3):35-52.
[18] Ravi H, Subramanyam A V, Emmanuel S. ACE-an effective anti-forensic contrast enhancement technique[J]. IEEE Signal Processing Letters, 2016, 23(2):212-216.
[19] Lecun Y, Bottou L, Bengio Y, Haffner P. Gradient-based learning applied to document recognition[J]. Proceedings of the IEEE, 1998, 86(11):2278-2324.
[20] Lawrence S, Giles C L, Tsoi A C, Back A D. Face recognition:a convolutional neural-network approach[J]. IEEE Transactions on Neural Networks, 1997, 8(1):98-113.
[21] Wang P, Xu J, Xu B, Liu C L, Zhang H, Wang F, Hao H. Semantic clustering and convolutional neural network for short text categorization[C]//Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing. 2015(2):352-357.
[22] Hinton G E, Srivastava N, Krizhevsky A, Sutskever I, Salakhutdinov R R. Improving neural networks by preventing co-adaptation of feature detectors[J]. Computer Science, 2012, 3(4):212-223.
[23] Bas P, Filler T, Pevný T. "Break our steganographic system":the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding. Springer Berlin Heidelberg, 2011:59-70.
[24] Code[Online]. Available:http://iapp.dinfo.unifi.it/index.php?page=source-codeen.
[25] Jia Y, Shelhamer E, Donahue J, Karayev S, Long J, Girshick R, Darrell T. Caffe:convolutional architecture for fast feature embedding[C]//Proceedings of the 22nd ACM International Conference on Multimedia. ACM, 2014:675-678. |