Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(34), pp. 24657. DOI:10.1016/j.diin.2013.01.005.





Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:10848045. DOI:10.1016/j.jnca.2013.09.007.





Becker, T, Corcoran, TC, GreavesTunnell, A, Iafrate, JR, Jing, J, Miller, SJ, Porfilio, JD, Ronan, R, Samranvedhya, J and Strauch, FW (2013). Benford's Law and Continuous Dependent Random Variables. eprint arXiv:1309.5603, last revised 27 Dec 2013.





Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062.





Bhattacharya, S and Kumar, K (2008). Forensic Accounting and Benford’s Law. IEEE Signal Processing Magazine, 25(2), p. 152.





Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261.





Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:9780691147611.





Wang, J, Cha, BH, Cho, SH and Kuo, CCJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568  1571. ISSN/ISBN:19457871. DOI:10.1109/ICME.2009.5202811.





Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95100. DOI:10.1007/s1176701104743.





Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 18. DOI:10.1109/ICDSP.2009.5201261.




