This work is cited by the following items of the Benford Online Bibliography:
Al-Bandawi, H and Deng, G (2018). Blind image quality assessment based on Benford's law. IET Image Processing 12(11), pp. 1983 – 1993. DOI:10.1049/iet-ipr.2018.5385 . | ||||
Al-Bandawi, H and Deng, G (2019). Classification of image distortion based on the generalized Benford’s law. Multimedia Tools and Applications, pp. 1-18. DOI:10.1007/s11042-019-7668-3. | ||||
Alexander, J (2009). Remarks on the use of Benford's law. Social Science Research Network (November 13, 2009). Available at SSRN: http://ssrn.com/abstract=1505147 or . DOI:10.2139/ssrn.1505147. | ||||
Amruthnath, N (2020). Benford’s Law: Applying to Existing Data. Posted on R-bloggers.com, last accessed August 29, 2020. | ||||
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005. | ||||
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. | ||||
Asadi, AN (2015). An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's law. 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 257-262. DOI:10.1109/KBEI.2015.7436057. | ||||
Ausloos, M, Cerqueti, R and Mir, TA (2017). Data science for assessing possible tax income manipulation: The case of Italy. Chaos, Solitons and Fractals 104, pp. 238–256. DOI:10.1016/j.chaos.2017.08.012. | ||||
Azevedo, CdS, Gonçalves, RF, Gava, VL and Spinola, MdM (2021). A Benford’s Law based methodology for fraud detection in social welfare programs: Bolsa Familia analysis. Physica A 567, p. 125626. DOI:10.1016/j.physa.2020.125626. | ||||
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. | ||||
Birajdar, GK and Mankar, VH (2013). Digital image forgery detection using passive techniques: A survey. Digital Investigation, Vol. 10, No. 3, pp. 226–245. DOI:10.1016/j.diin.2013.04.007. | ||||
Chen, W and Shi, YQ (2009). Detection of Double MPEG Compression Based on First Digit Statistics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 16-30). Berlin: Springer-Verlag. DOI:10.1007/978-3-642-04438-0_2. | ||||
Clippe, P and Ausloos, M (2012). Benford's law and Theil transform of financial data. Physica A: Statistical Mechanics and its Applications 391(24), pp. 6556–6567. | ||||
Cole, MA, Maddison, DJ and Zhang, L (2020). Testing the emission reduction claims of CDM projects using the Benford's Law. Climatic Change 160 (3), pp. 407–426. DOI:10.1007/s10584-019-02593-5. | ||||
Cong, M, Li, C and Ma, B-Q (2019). First digit law from Laplace transform. Phys. Lett. A, 383(16), pp. 1836-1844. DOI:10.1016/j.physleta.2019.03.017 . | ||||
Crisan, D and Gota, DI (2023). The First-Digit Law application in digital forensics in crystal forgery research. Proceedings of 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Canary Islands, Spain, pp. 1-7. DOI:10.1109/ICECCME57830.2023.10253354. | ||||
da Silva, AJ, Floquet, S, Santos, DOC and Lima, RF (2020). On the validation of the Newcomb-Benford Law and the Weibull distribution in neuromuscular transmission. Physica A 553, 1 September 2020, 124606. DOI:10.1016/j.physa.2020.124606. | ||||
Egghe, L and Guns, R (2012). Applications of the generalized law of Benford to informetric data. Journal of the American Society for Information Science and Technology 63(8), pp. 1662-1665. ISSN/ISBN:1532-2882. DOI:10.1002/asi.22690. | ||||
Evsutin, O, Melman, A and Meshcheryakov, R (2020). Algorithm of error-free information embedding into the DCT domain of digital images based on the QIM method using adaptive masking of distortions. Signal Processing. DOI:10.1016/j.sigpro.2020.107811. | ||||
Fang, G (2022). Investigating Hill’s question for some probability distributions. AIP Advances 12, 095004. DOI:10.1063/5.0100429. | ||||
Fellman, J (2014). The Benford paradox. Journal of statistical and econometric methods 3(4), pp. 1-20. ISSN/ISBN:2241-0384 . | ||||
Gao, J, Zhao, Y and Cui, R (2020). Research on the Applicability of Benford’s Law in Chinese Texts. Proceedings of 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM), Manchester, United Kingdom, pp. 13-17. DOI:10.1109/AIAM50918.2020.00009. | ||||
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169. | ||||
Hao, X, Li, X, Wu, J, Wei, B, Song, Y and Li, B (2024). A No-Reference Quality Assessment Method for Hyperspectral Sharpened Images via Benford’s Law. Remote Sensing, 16(7):1167. | ||||
Hürlimann, W (2015). Prime powers and generalized Benford law. Pioneer Journal of Algebra, Number Theory and its Applications 12/2015; 10(1-2):51-70. | ||||
Hussain, SA (2010). The Application of Benford's Law in Forensic Accounting: An Analysis of Credit Bureau Data. Available at SSRN 1626696; last accessed Mar 10, 2021. DOI:10.2139/ssrn.1626696. | ||||
Iorliam, A (2016). Application of power laws to biometrics, forensics and network traffic analysis. PhD Thesis, University of Surrey. | ||||
Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/978-3-030-15210-9_3. | ||||
Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2. | ||||
Iorliam, A, Emmanual, O and Shehu, YI (2021). An Investigation of "Benford's" Law Divergence and Machine Learning Techniques for "Intra-Class" Separability of Fingerprint Images. Preprint arXiv:2201.01699 [cs.CV]; last accessed January 12, 2022. | ||||
Iorliam, A, Ho, AT, Poh, N, Zhao, X and Xia, Z (2017). Benford's law for classification of biometric images. In: User-Centric Privacy and Security in Biometrics, Claus Vielhauer (Ed.). ISSN/ISBN:9781785612077. DOI:10.1049/PBSE004E_ch11. | ||||
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261. | ||||
Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238. | ||||
Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., Perez-Gonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88-105. DOI:10.1007/978-3-319-53465-7_7. | ||||
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. | ||||
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. | ||||
Jasak, Z (2010). Benfordov zakon i reinforcement učenje (Benford's Law and reinforcment learning) . MSc Thesis, University of Tuzla, Bosnia. SRP | ||||
Jiang, W, Ho, ATS, Treharne, H and Shi, YQ (2010). A Novel Multi-size Block Benford's Law Scheme for Printer Identification. In: Qiu G., Lam K.M., Kiya H., Xue XY., Kuo CC.J., Lew M.S. (eds) Advances in Multimedia Information Processing - PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg, pp. 643-652. DOI:10.1007/978-3-642-15702-8_59. | ||||
Joksimović, D, Knežević, G, Pavlović, V, Ljubić, M and Surovy, V (2017). Some Aspects of the Application of Benford’s Law in the Analysis of the Data Set Anomalies. In: Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling. New York: Nova Science Publishers, pp. 85–120. ISSN/ISBN:978-1-53610-566-7. | ||||
Kaiser, M (2019). Benford’s Law As An Indicator Of Survey Reliability—Can We Trust Our Data?. Journal of Economic Surveys Vol. 00, No. 0, pp. 1–17. DOI:10.1111/joes.12338. | ||||
Kirchner, M and Chakraborty, S (2015). A second look at first significant digit histogram restoration. Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, pp. 1-6. DOI:10.1109/WIFS.2015.7368578. | ||||
Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171. | ||||
Li, F, Han, S, Zhang, H, Ding, J, Zhang, J and Wu, J (2019). Application of Benford’s law in Data Analysis. Journal of Physics: Conference Series 1168, pp. 032133. DOI:10.1088/1742-6596/1168/3/032133. | ||||
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190. | ||||
Makrushin, A, Kraetzer, C, Neubert, T and Dittmann, J (2018). Generalized Benford's Law for Blind Detection of Morphed Face Images. In: IH&MMSec '18 Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 49-54 . DOI:10.1145/3206004.3206018. | ||||
Maza-Quiroga, R, Thurnhofer-Hemsi, K, Lopez-Rodrıguez, D and Lopez-Rubio, E (2021). Rician Noise Estimation for 3D Magnetic Resonance Images Based on Benford’s Law. In: de Bruijne M. et al. (eds) Medical Image Computing and Computer Assisted Intervention – MICCAI 2021. MICCAI 2021. Lecture Notes in Computer Science, vol 12906. Springer, Cham.. DOI:10.1007/978-3-030-87231-1_33. | ||||
McCarville, D (2020). Analyzing Network Traffic with Benford's Law. LinkedIn blog. | ||||
McCarville, D (2021). A data transformation process for using Benford’s Law with bounded data. Preprint [version 1; peer review: awaiting peer review], Emerald Open Research 3(29). DOI:10.35241/emeraldopenres.14374.1. | ||||
Milani, S, Tagliasacchi, M and Tubaro, S (2012). Discriminating multiple JPEG compression using first digit features. Proceedings of 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Mar 25-30, pp. 2253-2256. DOI:10.1109/ICASSP.2012.6288362. | ||||
Milani, S, Tagliasacchi, M and Tubaro, S (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3, e19. DOI:10.1017/ATSIP.2014.19. | ||||
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. | ||||
Mir, TA (2016). Citations to articles citing Benford's law: a Benford analysis. arXiv:1602.01205; posted Feb 3, 2016. | ||||
Mire, A, Dhok, SB, Mistry, NJ and Porey, PD (2016). Tampering Localization in Digital Image Using First Two Digit Probability Features. In: Satapathy, S., Mandal, J., Udgata, S., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 435. Springer, New Delhi, pp. 133-151. DOI:10.1007/978-81-322-2757-1_15. | ||||
Moin, SS and Islam, S (2017). Benford's law for detecting contrast enhancement. Proceedings of 2017 Fourth International Conference on Image Information Processing (ICIIP), Dec 21-23, pp. 1-4. DOI:10.1109/ICIIP.2017.8313717. | ||||
Özkan, K (2021). Benford Kanunu ve Genelleştirilmiş Benford Kanunu ile ekosistem doğallığının hesaplanması [Estimating ecosystem naturalness using Benford’s Law and Generalized Benford’s Law]. Turkish Journal of Forestry 22(2), pp. 73-82 . DOI:10.18182/tjf.907217. TUR | ||||
Pahuja, D (2021). Application of Benford’s Law to Detect if COVID-19 Data is under Reported or Manipulated. In: Rahul Srivastava & Aditya Kumar Singh Pundir (eds.), New Frontiers in Communication and Intelligent Systems, pp. 85–91. Computing & Intelligent Systems, SCRS, India . DOI:10.52458/978-81-95502-00-4-11. | ||||
Parnak, A, Baleghi, Y, Kazemitabar, J and (2020). A Novel Forgery Detection Algorithm Based on Mantissa Distribution in Digital Images. Proceedings of 6th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), pp. 1-4. DOI:10.1109/ICSPIS51611.2020.9349611. | ||||
Pasquini, C and Boato, G (2013). JPEG compression anti-forensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339. | ||||
Pasquini, C, Boato, G and Pérez-González, F (2017). Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats. IEEE Transactions on Information Forensics and Security 12(12), pp. 2890-2905. DOI:10.1109/TIFS.2017.2725201. | ||||
Pasquini, C, Comesana-Alfaro, P, Perez-Gonzalez, F and Boato, G (2014). Transportation-theoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090. | ||||
Pasquini, C, Pérez-González, F and Boato, G (2014). A Benford-Fourier JPEG compression detector. 2014 IEEE International Conference on Image Processing (ICIP), Paris, pp. 5322-5326. DOI:10.1109/ICIP.2014.7026077. | ||||
Pavlović, V, Knežević, G, Joksimović, M and Joksimović, D (2019). Fraud Detection in Financial Statements Applying Benford's Law with Monte Carlo Simulation. Acta oeconomica 69(2), pp.217-239. DOI:10.1556/032.2019.69.2.4. | ||||
Pinheiro, MF (2024). Newcomb-Benford Law in public procurement contracts. Master Thesis, NOVA Information Management School, Instituto Superior de Estatística e Gestão de Informação, Universidade Nova de Lisboa. | ||||
Piva, A (2013). An Overview on Image Forensics. ISRN Signal Processing, vol. 2013, Article ID 496701. ISSN/ISBN:2090-5041. DOI:10.1155/2013/496701. | ||||
Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 -77230J10. DOI:10.1117/12.855085. | ||||
Qadir, G, Zhao, X, Ho, ATS and Casey, M (2011). Image forensic of glare feature for improving image retrieval using Benford's Law. Proceedings of 2011 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2661--2664. ISSN/ISBN:0271-4302. DOI:10.1109/ISCAS.2011.5938152. | ||||
Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242-246. DOI:10.1109/ASPCON49795.2020.9276660. | ||||
Shao, L and Ma, BQ (2009). First Digit Distribution of Hadron full width. Modern Physics Letters A, 24(40), 3275-3282. ISSN/ISBN:0217-7323. DOI:10.1142/S0217732309031223. | ||||
Shi, YQ (2009). First digit law and its application to digital forensics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 444–456). Berlin: Springer-Verlag. ISSN/ISBN:978-3-642-04437-3. DOI:10.1007/978-3-642-04438-0_37. | ||||
Singh, N and Bansal, R (2015). Analysis of Benford's law in digital image forensics. Proceedings of 2015 International Conference on Signal Processing and Communication (ICSC), pp. 413-418. DOI:10.1109/ICSPCom.2015.7150688. | ||||
Sun, L, Ho, A, Xia, Z, Chen, J and Zhang, M (2019). Development of an Early Warning System for Network Intrusion Detection Using Benford’s Law Features. In: Meng W., Furnell S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore. DOI:10.1007/978-981-15-0758-8_5. | ||||
Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872. DOI:10.1109/APSIPA.2017.8282154. | ||||
Tong, SF, Yang, YH and Xie, YJ (2013). Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics. Applied Mechanics and Materials, Vols. 380-384, pp. 1306-1309. DOI:10.4028/www.scientific.net/AMM.380-384.1306. | ||||
Tong, SF, Zhang, Z, Xie, Y and Wu, X (2013). Image Splicing Detection Based on Statistical Properties of Benford Model. Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 0792-0795. ISSN/ISBN:978-90-78677-61-1. DOI:10.2991/iccsee.2013.200. | ||||
Vishnu, U (2021). Deepfake Detection using Benford’s Law and Distribution Variance Statistic. International Research Journal of Engineering and Technology(IRJET) 08(10), pp. 712-719. | ||||
Wang, H, Liu, T, Zhang, Y, Wu, Y, Sun, Y, Dong, J and Huang, W (2023). Last Digit Tendency: Lucky Numbers and Psychological Rounding in Mobile Transactions. Fundamental Research. DOI:10.1016/j.fmre.2023.11.011. | ||||
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811. | ||||
Wang, Q, Zhang, R and Qing, K (2015). Passive Detection of Tampered JPEG Image Based on First Digit Statistics. Proceedings of 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Adelaide, SA, Australia, pp. 401-404 . DOI:10.1109/IIH-MSP.2015.42. | ||||
Winter, C, Schneider, M and Yannikos, Y (2012). Model-Based Digit Analysis for Fraud Detection overcomes Limitations of Benford Analysis. Availability, Reliability and Security (ARES 2012), Seventh International Conference, August 20–24, 2012, Prague, Czech Republic. IEEE CS volume E4775, pages 255–261. IEEE Computer Society. ISSN/ISBN:978-1-4673-2244-7 . DOI:10.1109/ARES.2012.37. | ||||
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. | ||||
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261. |