Piva, A.: An overview on image forensics. ISRN Signal Processing, 2013, 2013, article ID 496701.
et al. : An overview on video forensics. APSIPA Trans. Signal Inf. Process., 1 (12) (2012).
Farid, H.: Exposing digital forgeries in scientific images, in Proc. of the 8th Workshop on Multimedia and Security (MM&Sec 2006), September 26–27, 2006, pp. 29–36.
Lukás, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images, in Proc. DFRWS, Cleveland, OH, USA, August 2003.
Wallace, G.: The JPEG Still Picture Compression Standard, Commun.
ACM, 34 (4) (1991), 30–44.
Milani, S.; Tagliasacchi, M.; Tubaro, M.: Discriminating multiple JPEG compression using first digit features, in Proc. 37th Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2012), Kyoto, Japan, March 25–30, 2012, pp. 2253–2256.
Pevny, T.; Fridrich, J.: Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images, in Proc. SPIE, 6819, San Jose, CA, USA, January 2008, pp. 11-1–11-13.
Galvan, F.; Puglisi, G.; Bruna, A.R.; Battiato, S.: First quantization matrix estimation from double compressed JPEG images. IEEE Trans. Inf. Forensics Security, 9 (8) (2014) 1299–1310.
Benford, F.: The law of anomalous numbers. Proc. Am. Philos. Soc., 78 (4) (1938) 551–572, jSTOR 984802.
Pérez-González, F., Heileman, G.L.; Abdallah, C.T.: Benford's law in image processing, in Proc. of IEEE Int. Conf. Image Processing (ICIP 2007), San Antonio, TX, USA, September 2007.
Lam, E.Y.; Goodman, J.W.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process., 9 (10) (2000) 1661–1666.
Wang, W.; Farid, H.: Exposing digital forgeries in video by detecting double JPEG compression, in Proc. of ACM MM&Sec 2006, Geneva, Switzerland, September 2006, pp. 37–47.
Lin, Z.; He, J.; Tang, X.; Tang, C.-K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit., 42 (11) (2009) 2492–2501.
Fu, D.; Shi, Y.Q.; Su, W.: A generalized Benford's law for JPEG coefficients and its applications in image forensics, in Proc. of SPIE, 6505, January 28–Februbay 1, 2009, pp. 39–48.
Shao-Zhang, , Jian-Chen, Z.: Tamper detection for shifted double JPEG compression, in Proc. IIH-MSP 2010, Darmstadt, Germany, October 2010, pp. 434–437.
Barni, M.; Costanzo, A.; Sabatini, L.: Identification of cut & paste tampering by means of double-JPEG detection and image segmentation, in Proc. of ISCAS 2010, Paris, France, May 30–June 2, 2010, pp. 1687–1690.
Qu, Z.; Luo, W.; Huang, J.: A convolutive mixing model for shifted double JPEG compression with application to passive image authentication,' in ICASSP. IEEE, 2008, pp. 1661–1664. [Online]. Available: http://dx.doi.org/10.1109/ICASSP.2008.4517946
Li, B.; Shi, Y.Q.; Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features,' in Proc. of MMSP 2008, Cairns, Queensland, Australia, October 2008, pp. 730–735.
Bianchi, T.; Rosa, A.D.; Piva, A.: Improved dct coefficient analysis for forgery localization in JPEG images, in Proc. of the 36th Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, March 22–27, 2011, pp. 2444–2447.
Wang, J.; Cha, B.; Cho, S.; Kuo, C.: Understanding Benford's law and its vulnerability in image forensics, in Proc. of the 2009 IEEE Int. Conf. on Multimedia and Expo (ICME 2009), June 28–July 1, 2009, pp. 1568–1571.
Battersby, S.: Statistics hint at fraud in Iranian election. New Scientist, no. 2714, June 2009. [Online]. Available: http://www. newscientist.com/article/mg20227144.000-statistics-hint-at-fraud-in-iranian-election.html
Deckert, J.; Myagkov, M.; Ordeshook, P.C.: The irrelevance of Benford's law for detecting fraud in elections. Caltech/MIT Voting Technology Project, no. Working paper no. 9, September 2010. [Online]. Available: http://www.vote.caltech.edu/drupal/node/327
Schaefer, G.; Stich, M.: UCID – An uncompressed colour image database, in Proc. SPIE, vol. 5307, San Jose, CA, USA, January 2004, pp. 472–480.