Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., PerezGonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88105. DOI:10.1007/9783319534657_7.





Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240256. DOI:10.4236/jis.2017.83016.





Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017.





Jiang, W, Ho, ATS, Treharne, H and Shi, YQ (2010). A Novel Multisize Block Benford's Law Scheme for Printer Identification. In: Qiu G., Lam K.M., Kiya H., Xue XY., Kuo CC.J., Lew M.S. (eds) Advances in Multimedia Information Processing  PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg, pp. 643652. DOI:10.1007/9783642157028_59.





Milani, S, Tagliasacchi, M and Tubaro, S (2012). Discriminating multiple JPEG compression using first digit features. Proceedings of 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Mar 2530, pp. 22532256. DOI:10.1109/ICASSP.2012.6288362.





Milani, S, Tagliasacchi, M and Tubaro, S (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3, e19. DOI:10.1017/ATSIP.2014.19.





Pasquini, C and Boato, G (2013). JPEG compression antiforensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339.





Pasquini, C, Boato, G and PerezGonzalez, F (2014). Multiple JPEG compression detection by means of BenfordFourier coefficients. 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, pp. 113118. DOI:10.1109/WIFS.2014.7084313.





Pasquini, C, ComesanaAlfaro, P, PerezGonzalez, F and Boato, G (2014). Transportationtheoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090.





Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and BabaieZadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240000244. DOI:10.1109/ISSPIT.2012.6621294.




