Kornblum J D. Using JPEG quantization tables to identify imagery processed by software [J]. Digital Investigation, 2008, 5(s):21-25.
[2]
Fridrich J, Doljan M, Du R. Steganalysis based on JPEG compatibility [C]//Proceedings of the SPIE Multimedia Systems and Applications.Washington DC: SPIE Press, 2001:275-280.
[3]
Ye S, Sun Q, Chang E C. Detecting digital image forgeries by measuring inconsistencies of blocking artifact [C]//Proceedings of the IEEE International Conference on Multimedia and Expo. Beijing,China: IEEE Press, 2007:12-15.
[4]
Wortley R, Smallbone S. Child pornography on the internet [EB/OL]. (2006-05-01)[2011-12-30]. http://www.cops.usdoj.gov/Publications/ e04062000.pdf.
Karresand M, Shahmehri N. Oscar-?le type identi?cation of binary data in disk clusters and RAM pages [C]//Proceedings of the IFIP International Information Security Conference: Security and Privacy in Dynamic Environments. Berlin: Springer Verlag, 2006: 413-424.
[7]
Garfinkel S. Carving contiguous and fragmented files with fast object validation [J]. Digital Investigation, 2007, 4(s): 2-12.
[8]
Digital Assembly LLC. SmartCarving [EB/OL]. [2010-06-30]. http://digital-assembly.com/products/adroit-photo-forensics/features/smartcarving.html.
[9]
Mikus N. An analysis of disc carving techniques [D]. Monterey, California, USA: Naval Postgraduate School, 2005.
[10]
Golden G R Ⅲ, Vassil R. Scalpel: A frugal, high performance file carver [C]//Proceedings of the 2005 Digital Forensic Research Workshop. New Orleans: Elsevier Press, 2005: 1-10.
[11]
Pal A, Shanmugasundaram K, Menmon N. Automated reassembling images fragments [C]//Proceedings of the IEEE Interna-tional Conference on Acoustics, Speech, and Signal Processing. New York: IEEE Press, 2003: 732-735.
[12]
Pal A, Sencar H T, Memon N. Detecting file fragmentation point using sequential hypothesis testing [J]. Digital Investigation, 2008, 5(s): 2-13.
[13]
Memon N, Pal A. Automated reassembly of file fragmented images using greedy algorithms [J]. IEEE Transactions on Image Processing, 2006, 15(2): 385-393.
[14]
Karresand M, Shahmehri N. Reassembly of fragmented JPEG images containing restart markers [C]//Proceedings of the European Conference on Computer Network Defense. Washington DC: IEEE Press, 2008: 25-32.
[15]
Sencar H T, Memon N. Identification and recovery of JPEG files with missing fragments [J]. Digital Investigation, 2009, 6(s):88-98.
[16]
Xu Y, Xu M. Width extraction of JPEG fragment via frequency coefficients scale similarity measuring[C]//Proceedings of the 2nd International Conference on Future Computer and Communication.Wuhan,China: IEEE Press, 2010: 513-517.
[17]
Huffman D A. A method for the construction of minimum redundancy codes [J]. Proceedings of the IRE, 1952, 40(9): 1098-1101.
[18]
Ferguson T, Rabinowitz J H. Self-synchronizing Huffman codes [J]. IEEE Transactions on Information Theory, 1984, 30(4): 687-693.
[19]
Klein S T, Wiseman Y. Parallel Huffman decoding with applications to JPEG files [J]. The Computer Journal, 2003, 46(5):487-497.
[20]
Wallace G K. The JPEG still picture compression standard [J]. IEEE Transactions on Consumer Electronics, 1991, 34(4): 30-44.
[21]
Lu Y, Wong T T, Heng P A. Digital photo similarity analysis in frequency domain and photo album compression [C]//Procee-dings of the 3rd international conference on Mobile and ubiquitous multimedia. New York: ACM, 2004: 237-244.
[22]
Popovici I, Withers W D. Locating edges and removing ringing artifacts in JPEG images by frequency-domain analysis [J]. IEEE Transactions on Image Processing, 2007, 16(5): 1470-1474.
[23]
Lin Z C, He J F, Tang X O, et al. Fast, automatic and fine-grained tampered JPEG iamge detection via coefficient analysis [J]. Pattern Recognition, 2009, 42(11): 2492-2501.
[24]
更多...
[25]
Calvin H. JPEG compression quality from quantization tables [EB/OL]. (2006-01-01)[2011-12-30].http://www.impulseadventure.com/photo/jpeg-quantization.html.