This work is cited by the following items of the Benford Online Bibliography:
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005. | ||||
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. | ||||
Campanario, JM and Coslado, MA (2011). Benford's law and citations, articles and impact factors of scientific journals. Scientometrics 88(2), pp. 421-432. DOI:10.1007/s11192-011-0387-9. | ||||
Cong, M, Li, C and Ma, BQ (2019). First digit law from Laplace transform. Phys. Lett. A, 383(16), pp. 1836-1844. DOI:10.1016/j.physleta.2019.03.017 . | ||||
Del Acebo, E and Sbert, M (2005). Benford's Law for Natural and Synthetic Images. Proc. of the First Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, L. Neumann, M. Sbert, B. Gooch, and W. Purgathofer, Eds., Girona, Spain, May 2005, pp. 169–176. ISSN/ISBN:1816-0859. DOI:10.2312/COMPAESTH/COMPAESTH05/169-176. | ||||
den Heijer, E and Eiben, AE (2014). Investigating aesthetic measures for unsupervised evolutionary art. Swarm and Evolutionary Computation, Vol. 16, pp. 52–68. DOI:10.1016/j.swevo.2014.01.002. | ||||
Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11. DOI:10.1117/12.704723. | ||||
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169. | ||||
Grabowski, F and Trojanowski, P (2006). Benford's law in image analysis. Proceedings of the 1st Conference on Tools of Information Technology, Rzeszów, Poland, 15 September 2006, pp. 72-78. | ||||
Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs). | ||||
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261. | ||||
Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., Perez-Gonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88-105. DOI:10.1007/978-3-319-53465-7_7. | ||||
Li, F, Han, S, Zhang, H, Ding, J, Zhang, J and Wu, J (2019). Application of Benford’s law in Data Analysis. Journal of Physics: Conference Series 1168, pp. 032133. DOI:10.1088/1742-6596/1168/3/032133. | ||||
Li, Z, Cong, L and Wang, H (2004). Discussion on Benford’s law and its application. posted on arXiv:math/0408057, Aug 4, 2004. | ||||
Manoochehrnia, P, Rachidi, F, Rubinstein, M, Schulz, W and Diefendorfer, G (2010). Benford’s Law and Its Application to Lightning Data. IEEE Transactions on Electromagnetic Compatibility 52(4), pp. 956-961. | ||||
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. | ||||
Pérez-González, F, Heileman, G and Abdallah, CT (2007). A generalization of Benford’s Law and its application to images. European Control Conference’2007, Kos, Greece, July 2007, pp. 3613 - 3619. ISSN/ISBN:9783952417386. | ||||
Perez-Gonzalez, F, Heileman, GL and Abdallah, CT (2007). Benford's Law in Image Processing. Image Processing, pp I-405 - I-408. ICIP 2007. IEEE International Conference. ISSN/ISBN:1522-4880. DOI:10.1109/ICIP.2007.4378977. | ||||
Posch, PN (2010). Ziffernanalyse mit dem Newcomb-Benford Gesetz in Theorie und Praxis. VEW Verlag Europäische Wirtschaft: Munich 2nd edition. GER | ||||
Sanches, J and Marques, JS (2006). Image reconstruction using the Benford law. Proceedings of the IEEE International Conference on Image Processing, Atlanta, GA, October 2006, pp. 2029-2032. ISSN/ISBN:1522-4880. DOI:10.1109/ICIP.2006.312845. | ||||
Shao, L and Ma, BQ (2009). First Digit Distribution of Hadron full width. Modern Physics Letters A, 24(40), 3275-3282. ISSN/ISBN:0217-7323. DOI:10.1142/S0217732309031223. | ||||
Strzałka, D (2010). On some properties of Benford's law. Journal of the Korean Math. Soc. 47(5), pp. 1055-1075. | ||||
Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and Babaie-Zadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240-000244. DOI:10.1109/ISSPIT.2012.6621294. | ||||
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811. | ||||
Wu, T (2018). Image-Guided Rendering with an Evolutionary Algorithm Based on Cloud Model. Computational Intelligence and Neuroscience Volume 2018, Article ID 4518265. DOI:10.1155/2018/4518265. | ||||
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. | ||||
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261. |