Wang, J, Cha, BH, Cho, SH and Kuo, CCJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568  1571.
This work is cited by the following items of the Benford Online Bibliography:
Note that this list may be incomplete, and is currently being updated. Please check again at a later date.
Amruthnath, N (2020). Benford’s Law: Applying to Existing Data. Posted on Rbloggers.com, last accessed August 29, 2020.





Bonetti, N, Bestagini, P, Milani, S and Tubaro, S (2020). On the use of Benford's law to detect GANgenerated images. Preprint arXiv:arXiv:2004.07682 [cs.CV]; last accessed April 21, 2020.





Karavardar, A (2014). Benford’s Law and an Analysis in Istanbul Stock Exchange (BIST). International Journal of Business and Management, 9(4), pp. 160172. DOI:10.5539/ijbm.v9n4p160.





Milani, S, Tagliasacchi, M and Tubaro, S (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3, e19. DOI:10.1017/ATSIP.2014.19.





Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and BabaieZadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240000244. DOI:10.1109/ISSPIT.2012.6621294.




