Alipour, A and Alipour, S (2019). Application of Benford’s Law in Analyzing Geotechnical Data. Civil Engineering Infrastructures Journal 52(2), pp. 323 – 334. DOI:10.22059/ceij.2019.272005.1534.
|
 |
|
|
|
Amruthnath, N (2020). Benford’s Law: Applying to Existing Data. Posted on R-bloggers.com, last accessed August 29, 2020.
|
 |
|
|
|
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005.
|
 |
|
|
|
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007.
|
 |
|
|
|
Becker, T, Burt, D, Corcoran, TC, Greaves-Tunnell, A, Iafrate, JR, Jing, J, Miller, SJ, Porfilio, JD, Ronan, R, Samranvedhya, J, Strauch, FW and Talbut, B (2018). Benford's Law and Continuous Dependent Random Variables. Annals of Physics 388, pp. 350–381. DOI:10.1016/j.aop.2017.11.013.
|
 |
|
|
|
Becker, T, Corcoran, TC, Greaves-Tunnell, A, Iafrate, JR, Jing, J, Miller, SJ, Porfilio, JD, Ronan, R, Samranvedhya, J and Strauch, FW (2013). Benford's Law and Continuous Dependent Random Variables. Preprint arXiv:1309.5603 [math.PR]; last accessed October 23, 2018. DOI:10.1016/j.aop.2017.11.013.
|
 |
|
|
|
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062.
|
 |
|
|
|
Bhattacharya, S and Kumar, K (2008). Forensic Accounting and Benford’s Law. IEEE Signal Processing Magazine, 25(2), p. 152. DOI:10.1109/MSP.2007.914724.
|
 |
|
|
|
Bodke, M, Mishra, D, Vasani, K and Janjua, J (2021). Analysis of Benford’s Law for Image Processing. International Journal of Creative research Thoughts 9(6), pp. h202-h208.
|
 |
|
|
|
Bonettini, N, Bestagini, P, Milani, S and Tubaro, S (2020). On the use of Benford's law to detect GAN-generated images. Preprint arXiv:arXiv:2004.07682 [cs.CV]; last accessed April 21, 2020
(2020 25th International Conference on Pattern Recognition (ICPR), pp. 5495-5502)
.
|
 |
|
|
|
Campanelli, L (2022). Monkeypox Obeys the (Benford's) Law: A Dynamic Analysis of Daily Case Counts in the United States of America. Preprint submitted to Statistics in Tran-
sition new series..
|
 |
|
|
|
Campanelli, L (2022). Tuning up the Kolmogorov-Smirnov test for testing Benford’s law. Preprint on ResearchGate; published in Comnunications in Statistics - Theory and Methods 2024.
|
 |
|
|
|
Corazza, M, Ellero, A and Zorzi, A (2018). The importance of being “one” (or Benford’s law). Lettera Matematica 6(1), pp. 33–39. DOI:10.1007/s40329-018-0218-4.
|
 |
|
|
|
Fang, X, Miller, SJ, Sun, M and Verga, A (2023). Generalized Continuous and Discrete Stick Fragmentation and Benford’s Law. Preprint arXiv:2309.00766 [math.PR]; last accessed September 12, 2023.
|
 |
|
|
|
Fang, X, Miller, SJ, Sun, M and Verga, A (2024). Benford’s Law and Random Integer Decomposition with Congruence Stopping Condition. Preprint.
|
 |
|
|
|
Gabhane, P, Rahangdale, P, Raipure, P, Sinde, S and Rathod, S.C. (2023). Analyzing the Effectiveness of Benford's Law in Detecting Image Forgery: A Systematic Review. International Research Journal of Modernization in Engineering Technology and Science 5(5). DOI:0.56726/IRJMETS38131.
|
 |
|
|
|
Hildebrandt, M and Dittmann, J (2015). Benford’s Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes. In: Proceedings SPIE 9409, Media Watermarking, Security, and Forensics 94090A (4 March 2015). DOI:10.1117/12.2077531.
|
 |
|
|
|
Iorliam, A (2016). Application of power laws to biometrics, forensics and network traffic analysis. PhD Thesis, University of Surrey.
|
 |
|
|
|
Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/978-3-030-15210-9_3.
|
 |
|
|
|
Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2.
|
 |
|
|
|
Iorliam, A, Ho, AT, Poh, N, Zhao, X and Xia, Z (2017). Benford's law for classification of biometric images. In: User-Centric Privacy and Security in Biometrics, Claus Vielhauer (Ed.). ISSN/ISBN:9781785612077. DOI:10.1049/PBSE004E_ch11.
|
 |
|
|
|
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261.
|
 |
|
|
|
Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., Perez-Gonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88-105. DOI:10.1007/978-3-319-53465-7_7.
|
 |
|
|
|
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016.
|
 |
|
|
|
Jiang, W, Ho, ATS, Treharne, H and Shi, YQ (2010). A Novel Multi-size Block Benford's Law Scheme for Printer Identification. In: Qiu G., Lam K.M., Kiya H., Xue XY., Kuo CC.J., Lew M.S. (eds) Advances in Multimedia Information Processing - PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg, pp. 643-652. DOI:10.1007/978-3-642-15702-8_59.
|
 |
|
|
|
Joksimović, D, Knežević, G, Pavlović, V, Ljubić, M and Surovy, V (2017). Some Aspects of the Application of Benford’s Law in the Analysis of the Data Set Anomalies. In: Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling. New York: Nova Science Publishers, pp. 85–120. ISSN/ISBN:978-1-53610-566-7.
|
 |
|
|
|
Kirchner, M and Chakraborty, S (2015). A second look at first significant digit histogram restoration. Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, pp. 1-6. DOI:10.1109/WIFS.2015.7368578.
|
 |
|
|
|
Kobiela, J and Dzierwa, P (2024). Application of Benford’s Law to the Identification of Non-authentic Digital Images. Proceedings of the 22nd International Conference on Advances in Mobile Computing and Multimedia Intelligence, MoMM 2024, held in Bratislava, Slovak Republic, pp. 115-129 . DOI:10.1007/978-3-031-78049-3_12.
|
 |
|
|
|
Mari, D, Latora, F and Milani, S (2022). The Sound of Silence: Efficiency of First Digit Features in Synthetic Audio Detection. Preprint arXiv:2210.02746 [cs.SD]; last accessed November 2, 2022.
|
 |
|
|
|
Milani, S, Tagliasacchi, M and Tubaro, S (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3, e19. DOI:10.1017/ATSIP.2014.19.
|
 |
|
|
|
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1.
|
 |
|
|
|
Mocnik, F-J (2021). Benford's law and geographical information - the example of OpenStreetMap. International Journal of Geographical Information Science 35, pp. 1746-1772. DOI:10.1080/13658816.2020.1829627.
|
 |
|
|
|
O'Mahony, L, O'Sullivan, DJP and Nikolov, NS (2023). On the Detection of Anomalous or Out-of-Distribution Data in Vision Models Using Statistical Techniques.. In: Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision (AICV2023), March 5–7, 2023. AICV 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 164. Springer, Cham.. DOI:10.1007/978-3-031-27762-7_40.
|
 |
|
|
|
Pasquini, C and Boato, G (2013). JPEG compression anti-forensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339.
|
 |
|
|
|
Pasquini, C, Boato, G and Perez-Gonzalez, F (2014). Multiple JPEG compression detection by means of Benford-Fourier coefficients. 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, pp. 113-118. DOI:10.1109/WIFS.2014.7084313.
|
 |
|
|
|
Pasquini, C, Boato, G and Pérez-González, F (2017). Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats. IEEE Transactions on Information Forensics and Security 12(12), pp. 2890-2905. DOI:10.1109/TIFS.2017.2725201.
|
 |
|
|
|
Pasquini, C, Comesana-Alfaro, P, Perez-Gonzalez, F and Boato, G (2014). Transportation-theoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090.
|
 |
|
|
|
Pasquini, C, Pérez-González, F and Boato, G (2014). A Benford-Fourier JPEG compression detector. 2014 IEEE International Conference on Image Processing (ICIP), Paris, pp. 5322-5326. DOI:10.1109/ICIP.2014.7026077.
|
 |
|
|
|
Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242-246. DOI:10.1109/ASPCON49795.2020.9276660.
|
 |
|
|
|
Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and Babaie-Zadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240-000244. DOI:10.1109/ISSPIT.2012.6621294.
|
 |
|
|
|
Varga, D (2021). Analysis of Benford’s Law for No-Reference Quality Assessment of Natural, Screen-Content, and Synthetic Images . Electronics 10(19), p. 2378. DOI:10.3390/electronics10192378.
|
 |
|
|
|
Vishnu, U (2021). Deepfake Detection using Benford’s Law and Distribution Variance Statistic. International Research Journal of Engineering and Technology(IRJET) 08(10), pp. 712-719.
|
 |
|
|
|
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811.
|
 |
|
|
|
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3.
|
 |
|
|
|
Zago, JG (2021). Defense Methods for Convolutional Neural Networks Against Adversarial Attacks. Masters Thesis, Federal University of Santa Catarina, Florianópolis, Brazil.
|
 |
|
|
|
Zago, JG, Antonelo, EA, Baldissera, FL and Saad, RT (2023). Benford’s law: What does it say on adversarial images?. Journal of Visual Communication and Image Representation 93, pp.103818 . DOI:10.1016/j.jvcir.2023.103818.
|
 |
|
|
|
Zago, JG, Baldissera, FL, Antonelo, EA and Saad, RT (2021). Benford’s law: what does it say on adversarial images?. Preprint arXiv:2102.04615 [cs.CV]; last accessed February 21, 2021. .
|
 |
|
|
|
Zaharis, A, Martini, A, Tryfonas, T, Ilioudis, C and Pangalos, G (2011). Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. nternational Journal of Digital Crime and Forensics 3(4), pp. 29-41. DOI:10.4018/jdcf.2011100103.
|
 |
|
|
|
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261.
|
 |
|
|
|