This work is cited by the following items of the Benford Online Bibliography:
Alexander, J (2009). Remarks on the use of Benford's law. Social Science Research Network (November 13, 2009). Available at SSRN: http://ssrn.com/abstract=1505147 or . DOI:10.2139/ssrn.1505147. | ||||
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005. | ||||
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. | ||||
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. | ||||
Birajdar, GK and Mankar, VH (2013). Digital image forgery detection using passive techniques: A survey. Digital Investigation, Vol. 10, No. 3, pp. 226–245. DOI:10.1016/j.diin.2013.04.007. | ||||
Chen, W and Shi, YQ (2009). Detection of Double MPEG Compression Based on First Digit Statistics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 16-30). Berlin: Springer-Verlag. | ||||
Clippe, P and Ausloos, M (2012). Benford's law and Theil transform of financial data. Physica A: Statistical Mechanics and its Applications, 2012, Vol. 391, No. 24, 6556–6567. | ||||
Egghe, L and Guns, R (2012). Applications of the generalized law of Benford to informetric data. Journal of the American Society for Information Science and Technology, Volume 63, Issue 8, 1662-1665, August 2012, doi: 10.1002/asi.22690. ISSN/ISBN:1532-2882. | ||||
Fellman, J (2014). The Benford paradox. Journal of statistical and econometric methods 3(4), pp. 1-20. ISSN/ISBN:2241-0384 . | ||||
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169. | ||||
Hürlimann, W (2015). Prime powers and generalized Benford law. Pioneer Journal of Algebra, Number Theory and its Applications 12/2015; 10(1-2):51-70. | ||||
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261. | ||||
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. | ||||
Jasak, Z (2010). Benfordov zakon i reinforcement učenje (Benford's Law and reinforcment learning) . MSc Thesis, University of Tuzla, Bosnia. SRP | ||||
Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171. | ||||
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190. | ||||
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. | ||||
Mir, TA (2016). Citations to articles citing Benford's law: a Benford analysis. arXiv:1602.01205; posted Feb 3, 2016. | ||||
Piva, A (2013). An Overview on Image Forensics. ISRN Signal Processing, vol. 2013, Article ID 496701, 22 pages, 2013. doi:10.1155/2013/496701. ISSN/ISBN:2090-5041. | ||||
Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 -77230J10. DOI:10.1117/12.855085. | ||||
Qadir, G, Zhao, X, Ho, ATS and Casey, M (2011). Image forensic of glare feature for improving image retrieval using Benford's Law. Proceedings of 2011 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2661--2664. ISSN/ISBN:0271-4302. DOI:10.1109/ISCAS.2011.5938152. | ||||
Shao, L and Ma, BQ (2009). First Digit Distribution of Hadron full width. Modern Physics Letters A, 24(40), 3275-3282. ISSN/ISBN:0217-7323. DOI:10.1142/S0217732309031223. | ||||
Shi, YQ (2009). First digit law and its application to digital forensics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 444–456). Berlin: Springer-Verlag. ISSN/ISBN:978-3-642-04437-3. DOI:10.1007/978-3-642-04438-0_37. | ||||
Tong, S, Zhang, Z, Xie, Y and Wu, X (2013). Image Splicing Detection Based on Statistical Properties of Benford Model. Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 0792-0795. ISSN/ISBN:978-90-78677-61-1. DOI:10.2991/iccsee.2013.200. | ||||
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811. | ||||
Winter, C, Schneider, M and Yannikos, Y (2012). Model-Based Digit Analysis for Fraud Detection overcomes Limitations of Benford Analysis. Availability, Reliability and Security (ARES 2012), Seventh International Conference, August 20–24, 2012, Prague, Czech Republic. IEEE CS volume E4775, pages 255–261. IEEE Computer Society. ISSN/ISBN:978-1-4673-2244-7 . DOI:10.1109/ARES.2012.37. | ||||
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. | ||||
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261. |