Cross Reference Up

Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Alexander, J (2009). Remarks on the use of Benford's law. Social Science Research Network (November 13, 2009). Available at SSRN: http://ssrn.com/abstract=1505147 or . DOI:10.2139/ssrn.1505147. View Complete Reference Online information Works that this work references Works that reference this work
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005. View Complete Reference Online information Works that this work references Works that reference this work
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. View Complete Reference Online information Works that this work references Works that reference this work
Ausloos, M, Cerqueti, R and Mir, TA (2017). Data science for assessing possible tax income manipulation: The case of Italy. Chaos, Solitons and Fractals 104, pp. 238–256. DOI:10.1016/j.chaos.2017.08.012. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. View Complete Reference Online information Works that this work references Works that reference this work
Birajdar, GK and Mankar, VH (2013). Digital image forgery detection using passive techniques: A survey. Digital Investigation, Vol. 10, No. 3, pp. 226–245. DOI:10.1016/j.diin.2013.04.007. View Complete Reference Online information Works that this work references Works that reference this work
Chen, W and Shi, YQ (2009). Detection of Double MPEG Compression Based on First Digit Statistics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 16-30). Berlin: Springer-Verlag. View Complete Reference No online information available Works that this work references Works that reference this work
Clippe, P and Ausloos, M (2012). Benford's law and Theil transform of financial data. Physica A: Statistical Mechanics and its Applications, 2012, Vol. 391, No. 24, 6556–6567. View Complete Reference Online information Works that this work references Works that reference this work
Egghe, L and Guns, R (2012). Applications of the generalized law of Benford to informetric data. Journal of the American Society for Information Science and Technology, Volume 63, Issue 8, 1662-1665, August 2012, doi: 10.1002/asi.22690. ISSN/ISBN:1532-2882. View Complete Reference Online information Works that this work references Works that reference this work
Fellman, J (2014). The Benford paradox. Journal of statistical and econometric methods 3(4), pp. 1-20. ISSN/ISBN:2241-0384 . View Complete Reference Online information Works that this work references Works that reference this work
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169. View Complete Reference Online information Works that this work references Works that reference this work
Hürlimann, W (2015). Prime powers and generalized Benford law. Pioneer Journal of Algebra, Number Theory and its Applications 12/2015; 10(1-2):51-70. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Jasak, Z (2010). Benfordov zakon i reinforcement učenje (Benford's Law and reinforcment learning) . MSc Thesis, University of Tuzla, Bosnia. SRP View Complete Reference Online information Works that this work references No Bibliography works reference this work
Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171. View Complete Reference Online information Works that this work references Works that reference this work
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190. View Complete Reference Online information Works that this work references Works that reference this work
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. View Complete Reference Online information Works that this work references Works that reference this work
Mir, TA (2016). Citations to articles citing Benford's law: a Benford analysis. arXiv:1602.01205; posted Feb 3, 2016. View Complete Reference Online information Works that this work references Works that reference this work
Piva, A (2013). An Overview on Image Forensics. ISRN Signal Processing, vol. 2013, Article ID 496701, 22 pages, 2013. doi:10.1155/2013/496701. ISSN/ISBN:2090-5041. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 -77230J10. DOI:10.1117/12.855085. View Complete Reference Online information Works that this work references Works that reference this work
Qadir, G, Zhao, X, Ho, ATS and Casey, M (2011). Image forensic of glare feature for improving image retrieval using Benford's Law. Proceedings of 2011 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2661--2664. ISSN/ISBN:0271-4302. DOI:10.1109/ISCAS.2011.5938152. View Complete Reference Online information Works that this work references Works that reference this work
Shao, L and Ma, BQ (2009). First Digit Distribution of Hadron full width. Modern Physics Letters A, 24(40), 3275-3282. ISSN/ISBN:0217-7323. DOI:10.1142/S0217732309031223. View Complete Reference Online information Works that this work references Works that reference this work
Shi, YQ (2009). First digit law and its application to digital forensics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 444–456). Berlin: Springer-Verlag. ISSN/ISBN:978-3-642-04437-3. DOI:10.1007/978-3-642-04438-0_37. View Complete Reference Online information Works that this work references Works that reference this work
Tong, S, Zhang, Z, Xie, Y and Wu, X (2013). Image Splicing Detection Based on Statistical Properties of Benford Model. Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 0792-0795. ISSN/ISBN:978-90-78677-61-1. DOI:10.2991/iccsee.2013.200. View Complete Reference Online information Works that this work references Works that reference this work
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811. View Complete Reference Online information Works that this work references Works that reference this work
Winter, C, Schneider, M and Yannikos, Y (2012). Model-Based Digit Analysis for Fraud Detection overcomes Limitations of Benford Analysis. Availability, Reliability and Security (ARES 2012), Seventh International Conference, August 20–24, 2012, Prague, Czech Republic. IEEE CS volume E4775, pages 255–261. IEEE Computer Society. ISSN/ISBN:978-1-4673-2244-7 . DOI:10.1109/ARES.2012.37. View Complete Reference Online information Works that this work references Works that reference this work
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. View Complete Reference Online information Works that this work references Works that reference this work
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261. View Complete Reference Online information Works that this work references Works that reference this work