Edge-based blur metric for tamper detection, Journal of Information Hiding and Multimedia Signal Processing, 2010. ,
Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions, Multimedia and Expo, 2007 IEEE International Conference on, pp.1123-1126, 2007. ,
DOI : 10.1109/ICME.2007.4284852
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.2635
Analysis and Extension of the PCA Method, Estimating a Noise Curve from a Single Image, Image Processing On Line, vol.5, 2014. ,
DOI : 10.5201/ipol.2016.124
?, SIGGRAPH Asia 2012 Technical Briefs on, SA '12, p.17, 2012. ,
DOI : 10.1145/2407746.2407763
Exposing Digital Forgeries From JPEG Ghosts, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, 2009. ,
DOI : 10.1109/TIFS.2008.2012215
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.306.6446
Higher-order Wavelet Statistics and their Application to Digital Forensics, 2003 Conference on Computer Vision and Pattern Recognition Workshop, p.94, 2003. ,
DOI : 10.1109/CVPRW.2003.10093
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4175
Heads-join: Efficient earth movers distance join on hadoop, IEEE Transactions on Parallel and Distributed Systems, 2015. ,
DOI : 10.1109/tpds.2015.2462354
Image Noise and Digital Image Forensics, Digital Forensics and Watermarking, 2015. ,
DOI : 10.1007/978-3-319-31960-5_1
URL : https://hal.archives-ouvertes.fr/hal-01510076
Automatic Image Splicing Detection Based on Noise Density Analysis in Raw Images, 2016. ,
DOI : 10.1007/11744078_33
URL : https://hal.archives-ouvertes.fr/hal-01510074
Tamper Hiding: Defeating Image Forensics, 2007. ,
DOI : 10.1007/10719724_16
Synthesis of color filter array pattern in digital images. Media Forensics and Security, 2009. ,
An Analysis and Implementation of the BM3D Image Denoising Method, Image Processing On Line, vol.2, pp.175-213, 2012. ,
DOI : 10.5201/ipol.2012.l-bm3d
automatic and fine-grained tampered jpeg images detection via dct coefficient analysis, Pattern Recognition ,
Using noise inconsistencies for blind image forensics, Image and Vision Computing, vol.27, issue.10, 2009. ,
DOI : 10.1016/j.imavis.2009.02.001
Mémoire sur la théorie des déblais et des remblais, Histoire de l'Académie Royale des Sciences de Paris, avec les Mémoires de Mathématique et de Physique pour la même année, pp.666-704, 1781. ,
Discrimination of Computer Synthesized or Recaptured Images from Real Images, Digital image forensics, pp.275-309, 2013. ,
DOI : 10.1007/978-1-4614-0757-7_10
Exposing image splicing with inconsistent local noise variances, 2012 IEEE International Conference on Computational Photography (ICCP), 2012. ,
DOI : 10.1109/ICCPhot.2012.6215223
A unified approach to the change of resolution: space and gray-level, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.11, issue.7, 1989. ,
DOI : 10.1109/34.192468
Exposing digital forgeries in color filter array interpolated images, IEEE Transactions on Signal Processing, vol.53, issue.10, 2005. ,
DOI : 10.1109/TSP.2005.855406
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.7144
Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach, Journal of Visual Communication and Image Representation, vol.24, issue.8, pp.24-1276, 2013. ,
DOI : 10.1016/j.jvcir.2013.08.009
Calculation of the wasserstein distance between probability distributions on the line. Theory of Probability & Its Applications, pp.784-786, 1974. ,
Effective image splicing detection based on image chroma, 2009 16th IEEE International Conference on Image Processing (ICIP), 2009. ,
DOI : 10.1109/ICIP.2009.5413549
Identifying computer generated graphics VIA histogram features, 2011 18th IEEE International Conference on Image Processing, pp.1933-1936, 2011. ,
DOI : 10.1109/ICIP.2011.6115849
Efficient similarity join based on earth movers distance using mapreduce, IEEE Transactions on Knowledge and Data Engineering, 2015. ,
DOI : 10.1109/icde.2016.7498372
Blur Detection of Digital Forgery Using Mathematical Morphology, Agent and Multi-Agent Systems: Technologies and Applications, 2007. ,
DOI : 10.1109/TSP.2004.839932