This work is cited by the following items of the Benford Online Bibliography:
Amruthnath, N (2020). Benford’s Law: Applying to Existing Data. Posted on R-bloggers.com, last accessed August 29, 2020. | ||||
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005. | ||||
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. | ||||
Campanario, JM and Coslado, MA (2011). Benford's law and citations, articles and impact factors of scientific journals. Scientometrics 88(2), pp. 421-432. DOI:10.1007/s11192-011-0387-9. | ||||
Cong, M, Li, C and Ma, BQ (2019). First digit law from Laplace transform. Phys. Lett. A, 383(16), pp. 1836-1844. DOI:10.1016/j.physleta.2019.03.017 . | ||||
Del Acebo, E and Sbert, M (2005). Benford's Law for Natural and Synthetic Images. Proc. of the First Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, L. Neumann, M. Sbert, B. Gooch, and W. Purgathofer, Eds., Girona, Spain, May 2005, pp. 169–176. ISSN/ISBN:1816-0859. DOI:10.2312/COMPAESTH/COMPAESTH05/169-176. | ||||
den Heijer, E and Eiben, AE (2014). Investigating aesthetic measures for unsupervised evolutionary art. Swarm and Evolutionary Computation, Vol. 16, pp. 52–68. DOI:10.1016/j.swevo.2014.01.002. | ||||
Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11. DOI:10.1117/12.704723. | ||||
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169. | ||||
Grabowski, F and Trojanowski, P (2006). Benford's law in image analysis. Proceedings of the 1st Conference on Tools of Information Technology, Rzeszów, Poland, 15 September 2006, pp. 72-78. | ||||
Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs). | ||||
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261. | ||||
Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., Perez-Gonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88-105. DOI:10.1007/978-3-319-53465-7_7. | ||||
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. | ||||
Li, F, Han, S, Zhang, H, Ding, J, Zhang, J and Wu, J (2019). Application of Benford’s law in Data Analysis. Journal of Physics: Conference Series 1168, pp. 032133. DOI:10.1088/1742-6596/1168/3/032133. | ||||
Li, Z, Cong, L and Wang, H (2004). Discussion on Benford’s law and its application. posted on arXiv:math/0408057, Aug 4, 2004. | ||||
Manoochehrnia, P, Rachidi, F, Rubinstein, M, Schulz, W and Diefendorfer, G (2010). Benford’s Law and Its Application to Lightning Data. IEEE Transactions on Electromagnetic Compatibility 52(4), pp. 956-961. | ||||
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. | ||||
Pasquini, C and Boato, G (2013). JPEG compression anti-forensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339. | ||||
Pasquini, C, Comesana-Alfaro, P, Perez-Gonzalez, F and Boato, G (2014). Transportation-theoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090. | ||||
Pérez-González, F, Heileman, G and Abdallah, CT (2007). A generalization of Benford’s Law and its application to images. European Control Conference’2007, Kos, Greece, July 2007, pp. 3613 - 3619. ISSN/ISBN:9783952417386. | ||||
Perez-Gonzalez, F, Heileman, GL and Abdallah, CT (2007). Benford's Law in Image Processing. Image Processing, pp I-405 - I-408. ICIP 2007. IEEE International Conference. ISSN/ISBN:1522-4880. DOI:10.1109/ICIP.2007.4378977. | ||||
Posch, PN (2005). Ziffernanalyse in Theorie und Praxis. Testverfahren zur Fälschungsaufspürung mit Benfords Gesetz. Diploma thesis, Universität Bonn, Germany, 2003. Published by Shaker Verlag, Aachen. GER | ||||
Posch, PN (2010). Ziffernanalyse mit dem Newcomb-Benford Gesetz in Theorie und Praxis. VEW Verlag Europäische Wirtschaft: Munich 2nd edition. GER | ||||
Sahu, SK, Java, A and Shaikh, A (2021). On The Connection of Benford’s Law and Neural Networks. Preprint arXiv:2102.03313 [cs.LG]; last accessed February 21, 2021. | ||||
Sanches, J and Marques, JS (2006). Image reconstruction using the Benford law. Proceedings of the IEEE International Conference on Image Processing, Atlanta, GA, October 2006, pp. 2029-2032. ISSN/ISBN:1522-4880. DOI:10.1109/ICIP.2006.312845. | ||||
Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242-246. DOI:10.1109/ASPCON49795.2020.9276660. | ||||
Shao, L and Ma, BQ (2009). First Digit Distribution of Hadron full width. Modern Physics Letters A, 24(40), 3275-3282. ISSN/ISBN:0217-7323. DOI:10.1142/S0217732309031223. | ||||
Shi, L-F, Yan, B, Pan, J-S and Sun, X-H (2019). Generalized Benford’s Distribution for Data Defined on Irregular Grid. In: Genetic and Evolutionary Computing, Proceedings of the Twelfth International Conference on Genetic and Evolutionary Computing, pp.383--391. DOI:10.1007/978-981-13-5841-8_40. | ||||
Strzałka, D (2010). On some properties of Benford's law. Journal of the Korean Math. Soc. 47(5), pp. 1055-1075. | ||||
Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and Babaie-Zadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240-000244. DOI:10.1109/ISSPIT.2012.6621294. | ||||
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811. | ||||
Wu, T (2018). Image-Guided Rendering with an Evolutionary Algorithm Based on Cloud Model. Computational Intelligence and Neuroscience Volume 2018, Article ID 4518265. DOI:10.1155/2018/4518265. | ||||
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. | ||||
Zago, JG, Baldissera, FL, Antonelo, EA and Saad, RT (2021). Benford’s law: what does it say on adversarial images?. Preprint arXiv:2102.04615 [cs.CV]; last accessed February 21, 2021. | ||||
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261. |