[1] 李晟, 张新鹏. 利用JPEG 压缩特性的合成图像检测[J]. 应用科学学报, 2008, 26(3): 281-287.[2] 李晟. 基于JPEG 特性与小波域共生矩阵特征的被动图像取证[D]. 上海: 上海大学, 2008.[3] Kee E, Johnson M K, Farid H. Digital image authentication from JPEG headers [J]. IEEE Trans Inf Forensics Security, 2011, 6(3): 1066-1075.[4] 扈文斌, 刘凯. 基于量化表不一致性的JPEG 图像篡改盲检测[J]. 中国图象图形学报, 2011, 16(3): 316-323.[5] Chen Y L, Hsu C T. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection [J]. IEEE Trans Inf Forensics Security, 2011, 6(2): 396-406.[6] Huang F J, Huang J W, Shi Y Q. Detecting double JPEG compression with the same quantization matrix [J]. IEEE Trans Inf Forensics Security, 2010, 5(4): 848-856.[7] Farid H. Exposing digital forgeries from JPEG ghosts [J]. IEEE Trans Inf Forensics Security, 2009, 4(1): 154-160.[8] Luo W Q, Huang J W, Qiu G P. JPEG error analysis and its application to digital image forensics [J]. IEEE Trans Inf Forensics Security, 2010, 5(3): 480-491.[9] Fu D, Shi Y Q, Su Q. A generalized Benford’s law for JPEG coefficients and its applications in image forensics [C]// SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents Ⅸ. 2007: 1L1-1L11.[10] Ye S M, Sun Q B, Chang E C. Detecting digital image forgeries by measuring inconsistencies of blocking artifact [C]// 2007 IEEE International Conference on Multimedia and Expo. 2007: 12-15.[11] 孙文颗, 张新鹏, 王朔中. 基于直方图差异的模型隐写分析[J]. 上海大学学报: 自然科学版, 2008, 14(2): 111-115.[12] 唐跃林, 肖沙里, 姚富光, 等. 一种反映人眼视觉特性的JPEG 压缩编码[J]. 微型机与应用, 2004(2): 49-50.[13] Wang C Y, Lee S M, Chang L W. Designing JPEG quantization tables based on human visual system [J]. Signal Process: Image Comm, 2001, 16: 501-506. |