Balado, F and Silvestre, GCM (2018). Towards Optimum Counterforensics of Multiple Significant Digits Using MajorisationMinimisation. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, 2018, pp. 21162120.
This work cites the following items of the Benford Online Bibliography:
Hill, TP (1995). The SignificantDigit Phenomenon. American Mathematical Monthly 102(4), pp. 322327. DOI:10.2307/2974952.





Kirchner, M and Chakraborty, S (2015). A second look at first significant digit histogram restoration. Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, pp. 16. DOI:10.1109/WIFS.2015.7368578.





Knuth, DE (1997). The Art of Computer Programming. pp. 253264, vol. 2, 3rd ed, AddisonWesley, Reading, MA.





Milani, S, Tagliasacchi, M and Tubaro, S (2013). Antiforensics attacks to Benford’s Law for the detection of double compressed images. Proceedings of 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, May 2631, pp. 3053–3057. DOI:10.1109/ICASSP.2013.6638219.





Pasquini, C and Boato, G (2013). JPEG compression antiforensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339.





Pasquini, C, ComesanaAlfaro, P, PerezGonzalez, F and Boato, G (2014). Transportationtheoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090.




