TY - STD TI - A Piva, An overview on image forensics. ISRN Signal Proc 2013, 22 (2013). https://doi.org/10.1155/2013/496701. Article ID 496701 ID - ref1 ER - TY - STD TI - H Farid, Image forgery detection, a survey. IEEE Signal Process. Mag. (2009) ID - ref2 ER - TY - STD TI - Muhammad Ali Qureshi, Mohamed Deriche, A bibliography of pixel-based blind image forgery detection techniques, In Signal Processing: Image Communication, Volume 39, Part A, 2015, Pages 46–74, , https://doi.org/10.1016/j.image.2015.08.008. ID - ref3 ER - TY - STD TI - C-T Li, X Lin, A fast source-oriented image clustering method for digital forensics. EURASIP J Image Video Proc 69 (2017) https://doi.org/10.1186/s13640-017-0217-y ID - ref4 ER - TY - BOOK AU - Yao, H. AU - Cao, F. AU - Tang, Z. AU - Wang, J. AU - Qiao, T. PY - 2017 DA - 2017// TI - Expose Noise Level Inconsistency Incorporating the Inhomogeneity Scoring Strategy, Article in Multimedia Tools and Applications ID - Yao2017 ER - TY - STD TI - MM Isaac, M Wilscy, Multiscale local gabor phase quantization for image forgery detection. Multimedia Tools and Applications, 1–22 (2017) https://doi.org/10.1007/s11042-017-5189-5 UR - https://link.springer.com/journal/11042 ID - ref6 ER - TY - JOUR AU - Mire, A. V. AU - Dhok, S. B. AU - Mistry, N. J. AU - Porey, P. D. PY - 2015 DA - 2015// TI - Factor histogram based forgery localization in double compressed JPEG images JO - Procedia Comput Sci VL - 54 UR - https://doi.org/10.1016/j.procs.2015.06.081 DO - 10.1016/j.procs.2015.06.081 ID - Mire2015 ER - TY - JOUR AU - Farid, H. PY - 2009 DA - 2009// TI - Exposing digital forgeries from JPEG ghosts, IEEE transactions on information forensics and security JO - Vol. VL - 4 ID - Farid2009 ER - TY - JOUR AU - Lin, Z. AU - He, J. AU - Tang, X. AU - Tang, C. -. K. PY - 2009 DA - 2009// TI - Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis JO - Pattern Recognition, Vol VL - 42 UR - https://doi.org/10.1016/j.patcog.2009.03.019 DO - 10.1016/j.patcog.2009.03.019 ID - Lin2009 ER - TY - JOUR AU - Bianchi, T. AU - Piva, A. PY - 2012 DA - 2012// TI - Image forgery localization via block-grained analysis of JPEG artifacts JO - IEEE Transactions on Information Forensics Security VL - 7 UR - https://doi.org/10.1109/TIFS.2012.2187516 DO - 10.1109/TIFS.2012.2187516 ID - Bianchi2012 ER - TY - JOUR AU - Li, X. H. AU - Zhao, Y. Q. AU - Liao, M. AU - Shih, F. Y. AU - Shi, Y. Q. PY - 2012 DA - 2012// TI - Detection of the tampered region for JPEG images by using mode-based first digit features JO - EURASIP Journal on Advances in Signal Processing VL - 190 ID - Li2012 ER - TY - STD TI - I Amerini, R Becarelli, R Caldelli, A Del Mastio, Splicing forgeries localization through the use of first digit features. proceedings of IEEE International Workshop on Information Forensics and Security(WIFS),143-148 (2014). https://doi.org/10.1109/WIFS.2014.7084318 ID - ref12 ER - TY - STD TI - Z Fan, RL de Queiroz, Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transaction on Image Processing, Vol 12(2), 230–235 (2003). https://doi.org/10.1109/TIP.2002.807361 ID - ref13 ER - TY - STD TI - W Luo, Z Qu, J Huang, G Qiu, A novel method for detecting cropped and recompressed image block. IEEE Int Conference Acoustics Speech Signal Proc (2007) ID - ref14 ER - TY - BOOK AU - Dongdong, F. AU - Shi, Y. Q. AU - Su, W. PY - 2007 DA - 2007// TI - A Generalized Benford’s Law for JPEG Coefficients and its Applications in Image Forensics, SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents ID - Dongdong2007 ER - TY - BOOK AU - Li, B. AU - Shi, Y. Q. AU - Huang, J. PY - 2008 DA - 2008// TI - Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features PB - IEEE International Workshop on Multimedia Signal Processing CY - Queensland ID - Li2008 ER - TY - STD TI - F Zhao, YU Zhenhua, S Li, Detecting double compressed JPEG images by using moment features of mode based DCT histograms. proceedings of 2010 International Conference on Multimedia Technology,1-4 (2010). https://doi.org/10.1109/ICMULT.2010.5631476 ID - ref17 ER - TY - BOOK AU - Yang, J. AU - Zhu, G. PY - 2011 DA - 2011// TI - Detecting Doubly Compressed JPEG Images by Factor Histogram PB - Proceeding of APSIPA CY - ASC ID - Yang2011 ER - TY - STD TI - H Ghaffari-Hadigheh, GB Sulong, Annual Iranian mathematics conference (Hamedan, 2017) ID - ref19 ER - TY - JOUR AU - Barni, M. AU - Bondi, L. AU - Bonettini, N. AU - Bestagini, P. AU - Costanzo, A. AU - Maggini, M. AU - Tondi, B. AU - Tubaro, S. PY - 2017 DA - 2017// TI - Aligned and non-aligned double JPEG detection using convolutional neural networks JO - J. Vis. Commun. Image Represent. VL - 49 UR - https://doi.org/10.1016/j.jvcir.2017.09.003 DO - 10.1016/j.jvcir.2017.09.003 ID - Barni2017 ER - TY - JOUR AU - Benford, F. PY - 1938 DA - 1938// TI - The law of anomalous numbers JO - Proc. Amer. Phil. Soc. VL - 78 ID - Benford1938 ER - TY - STD TI - J Lukas, J Fridrich, Estimation of primary quantization matrix in double compressed JPEG images. Proc Digital Forensic Res Workshop, 1–17 (2003) ID - ref22 ER - TY - STD TI - D Zoran, Y Weiss, Scale invariance and noise in natural images. IEEE 12th Int Conference Comput Vision, 2209–2216 (2009) ID - ref23 ER - TY - STD TI - R Zhang, X-g YUJ Zhao, JY Liu, Symmetric Alpha Stable Distribution Model Application in Detecting Double JPEG Compression. Proc International Conference on Artificial Intelligence and Software Engineering(AISE2014), 462-467(2014) ID - ref24 ER - TY - STD TI - M Nigrini, JT Wells, Benford’s Law: Applications for Forensic Accounting, Auditing, and Fraud Detection,Wiley Publication, 19-21(2012) ISBN: 978-1-118-15285-0  ID - ref25 ER - TY - STD TI - G Schaefer, M Stich, UCID—An Uncompressed Colour Image Database (Technical Report, School of Computing and Mathematics, Nottingham Trent University, U.K, 2003) ID - ref26 ER - TY - STD TI - P. Sallee, Matlab JPEG toolbox 1.4, [online], Available: http://dde.binghamton.edu/download/jpeg_toolbox.zip UR - http://dde.binghamton.edu/download/jpeg_toolbox.zip ID - ref27 ER - TY - STD TI - CASIA Tampered image detection evaluation database http ://forensics.idealtest.org:8080/ index_v2.htm UR - http://idealtest.org ID - ref28 ER - TY - STD TI - PIXLR online image editing tool. https://pixlr.com/editor/ UR - https://pixlr.com/editor/ ID - ref29 ER -