Cross Reference Up

Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., Perez-Gonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88-105. DOI:10.1007/978-3-319-53465-7_7. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references Works that reference this work
Jiang, W, Ho, ATS, Treharne, H and Shi, YQ (2010). A Novel Multi-size Block Benford's Law Scheme for Printer Identification. In: Qiu G., Lam K.M., Kiya H., Xue XY., Kuo CC.J., Lew M.S. (eds) Advances in Multimedia Information Processing - PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg, pp. 643-652. DOI:10.1007/978-3-642-15702-8_59. View Complete Reference Online information Works that this work references Works that reference this work
Kirchner, M and Chakraborty, S (2015). A second look at first significant digit histogram restoration. Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, pp. 1-6. DOI:10.1109/WIFS.2015.7368578. View Complete Reference Online information Works that this work references Works that reference this work
Milani, S, Tagliasacchi, M and Tubaro, S (2012). Discriminating multiple JPEG compression using first digit features. Proceedings of 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Mar 25-30, pp. 2253-2256. DOI:10.1109/ICASSP.2012.6288362. View Complete Reference Online information Works that this work references Works that reference this work
Milani, S, Tagliasacchi, M and Tubaro, S (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3, e19. DOI:10.1017/ATSIP.2014.19. View Complete Reference Online information Works that this work references Works that reference this work
Parnak, A, Baleghi, Y, Kazemitabar, J and (2020). A Novel Forgery Detection Algorithm Based on Mantissa Distribution in Digital Images. Proceedings of 6th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), pp. 1-4. DOI:10.1109/ICSPIS51611.2020.9349611. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Pasquini, C and Boato, G (2013). JPEG compression anti-forensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Boato, G and Perez-Gonzalez, F (2014). Multiple JPEG compression detection by means of Benford-Fourier coefficients. 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, pp. 113-118. DOI:10.1109/WIFS.2014.7084313. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Comesana-Alfaro, P, Perez-Gonzalez, F and Boato, G (2014). Transportation-theoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872. DOI:10.1109/APSIPA.2017.8282154. View Complete Reference Online information Works that this work references Works that reference this work
Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and Babaie-Zadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240-000244. DOI:10.1109/ISSPIT.2012.6621294. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and Babaie-Zadeh, M (2021). A part-level learning strategy for JPEG image recompression detection. Multimedia Tools and Applications. DOI:10.1007/s11042-020-10200-4. View Complete Reference Online information Works that this work references No Bibliography works reference this work