Forensic Camera Model Identification, Handbook of Digital Forensics of Multimedia Data and Devices, p.2015 ,
DOI : 10.1002/9781118705773.ch9
Blind source camera identification, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.709-712, 2004. ,
DOI : 10.1109/ICIP.2004.1418853
Blind Identification of Source Cell-Phone Model, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, pp.553-566, 2008. ,
DOI : 10.1109/TIFS.2008.926993
Using sensor pattern noise for camera model identification, 2008 15th IEEE International Conference on Image Processing, pp.1296-1299, 2008. ,
DOI : 10.1109/ICIP.2008.4712000
Feature-Based Forensic Camera Model Identification, Transactions on Data Hiding and Multimedia Security VIII, pp.42-62, 2012. ,
DOI : 10.1007/978-3-642-31971-6_3
Camera Model Identification Using Local Binary Patterns, 2012 IEEE International Conference on Multimedia and Expo, pp.392-397, 2012. ,
DOI : 10.1109/ICME.2012.87
Intercamera model image source identication with conditional probability features, Proc. of the 3rd IIEEJ Image Electronics and Visual Computing Workshop, 2012. ,
Evaluation of Residual-Based Local Features for Camera Model Identification, New Trends in Image Analysis and Processing -ICIAP Workshop : BioFor, pp.11-18, 2015. ,
DOI : 10.1007/978-3-319-23222-5_2
Improvements on source camera model identification based on cfa interpolation, Advances in Digital Forensics II, IFIP International Conference on Digital Forensics, pp.289-299, 2006. ,
Digital Camera Identification From Sensor Pattern Noise, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.205-214, 2006. ,
DOI : 10.1109/TIFS.2006.873602
Source camera identification using footprints from lens aberration, Digital Photography II, pp.60690-60690, 2006. ,
DOI : 10.1117/12.649775
Source camera identification based on sensor dust characteristics, IEEE Workshop on Signal Processing Applications for Public Security and Forensics, SAFE '07, pp.1-6, 2007. ,
Digital image forensics, IEEE Signal Processing Magazine, vol.26, issue.2, pp.26-37, 2009. ,
DOI : 10.1109/MSP.2008.931078
A universal image forensic strategy based on steganalytic model, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, IH&MMSec '14, pp.165-170, 2014. ,
DOI : 10.1145/2600918.2600941
A featurebased approach for image tampering detection and localization, IEEE International Workshop on Information Forensics and Security (WIFS), pp.149-154, 2014. ,
Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012. ,
DOI : 10.1109/TIFS.2012.2190402
The 'Dresden Image Database' for benchmarking digital image forensics, Proceedings of the 25th Symposium On Applied Computing (ACM SAC 2010), pp.1585-1591, 2010. ,
LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, pp.1-27, 2011. ,
DOI : 10.1145/1961189.1961199