Semi-Blind Image Resampling Factor Estimation for PRNU Computation. | 0 | 0.34 | 2020 |
Blind Detection of Image Rotation and Angle Estimation. | 0 | 0.34 | 2018 |
Image Manipulation Detection Using Sensor Linear Pattern. | 0 | 0.34 | 2018 |
Effect of Compression on Sensor-Fingerprint Based Camera Identification. | 8 | 0.51 | 2016 |
CFA-aware features for steganalysis of color images | 10 | 0.50 | 2015 |
Estimation of lens distortion correction from single images | 4 | 0.44 | 2014 |
Sensor fingerprint digests for fast camera identification from geometrically distorted images | 9 | 0.52 | 2013 |
Sensor-fingerprint based identification of images corrected for lens distortion | 11 | 0.65 | 2012 |
Steganalysis of content-adaptive steganography in spatial domain | 24 | 1.94 | 2011 |
Breaking HUGO: the process discovery | 11 | 1.44 | 2011 |
Determining approximate age of digital images using sensor defects | 4 | 0.49 | 2011 |
Sensor noise camera identification: countering counter-forensics | 11 | 0.73 | 2010 |
Managing a large database of camera fingerprints | 23 | 1.07 | 2010 |
Large scale test of sensor fingerprint camera identification | 24 | 1.41 | 2009 |
Secure Steganography in Multimedia Content | 0 | 0.34 | 2009 |
Camera Identification from Cropped and Scaled Images | 31 | 1.65 | 2008 |
Camera Identification from Printed Images | 14 | 1.16 | 2008 |
Digital Camera Identification from Images --- Estimating False Acceptance Probability | 10 | 0.75 | 2008 |
Digital Imaging Sensor Identification (Further Study) | 44 | 3.47 | 2007 |
Source Digital Camcorder Identification Using Sensor Photo Response Non-Uniformity | 41 | 3.11 | 2007 |
Imaging sensor noise as digital X-ray for revealing forgeries | 29 | 1.46 | 2007 |
Wet paper codes with improved embedding efficiency | 54 | 3.37 | 2006 |
New Blind Steganalysis and its Implications | 100 | 5.93 | 2006 |
Detecting digital image forgeries using sensor pattern noise. | 0 | 0.34 | 2006 |
Digital "Bullet Scratches" For Images | 24 | 1.87 | 2005 |
Forensic steganalysis: determining the stego key in spatial domain steganography | 24 | 1.41 | 2005 |
Perturbed quantization steganography | 38 | 2.58 | 2005 |
Efficient wet paper codes | 19 | 1.76 | 2005 |
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain | 32 | 3.03 | 2005 |
Handling uneven embedding capacity in binary images: a revisit | 8 | 0.66 | 2005 |
Perturbed quantization steganography with wet paper codes | 80 | 5.38 | 2004 |
On estimation of secret message length in LSB steganography in spatial domain | 102 | 5.43 | 2004 |
Searching for the stego-key | 34 | 2.19 | 2004 |
Lossless data embedding with file size preservation | 18 | 1.74 | 2004 |
Digital image steganography using stochastic modulation | 50 | 4.29 | 2003 |
Quantitative steganalysis of digital images: estimating the secret message length | 66 | 6.43 | 2003 |
Steganalysis of JPEG Images: Breaking the F5 Algorithm | 164 | 12.39 | 2002 |
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique. | 45 | 2.01 | 2002 |
Lossless data embedding--new paradigm in digital watermarking | 268 | 27.89 | 2002 |
Practical Steganalysis of Digital Images - State of the Art | 134 | 13.92 | 2002 |
Distortion-Free Data Embedding for Images | 100 | 27.27 | 2001 |
Reliable detection of LSB steganography in color and grayscale images | 208 | 25.92 | 2001 |
Detecting LSB steganography in color, and gray-scale images | 253 | 18.90 | 2001 |
Invertible authentication. | 0 | 0.34 | 2001 |
Robust Hash Functions for Digital Watermarking | 152 | 9.86 | 2000 |
New Fragile Authentication Watermark for Images | 65 | 5.32 | 2000 |
Images with Self-Correcting Capabilities | 84 | 9.01 | 1999 |