Cross Reference Up

Perez-Gonzalez, F, Heileman, GL and Abdallah, CT (2007). Benford's Law in Image Processing. Image Processing, pp I-405 - I-408. ICIP 2007. IEEE International Conference.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Alipour, A and Alipour, S (2019). Application of Benford’s Law in Analyzing Geotechnical Data. Civil Engineering Infrastructures Journal 52(2), pp. 323 – 334. DOI:10.22059/ceij.2019.272005.1534. View Complete Reference Online information Works that this work references Works that reference this work
Amruthnath, N (2020). Benford’s Law: Applying to Existing Data. Posted on R-bloggers.com, last accessed August 29, 2020. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005. View Complete Reference Online information Works that this work references Works that reference this work
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. View Complete Reference Online information Works that this work references Works that reference this work
Becker, T, Burt, D, Corcoran, TC, Greaves-Tunnell, A, Iafrate, JR, Jing, J, Miller, SJ, Porfilio, JD, Ronan, R, Samranvedhya, J, Strauch, FW and Talbut, B (2018). Benford's Law and Continuous Dependent Random Variables. Annals of Physics 388, pp. 350–381. DOI:10.1016/j.aop.2017.11.013. View Complete Reference Online information Works that this work references Works that reference this work
Becker, T, Corcoran, TC, Greaves-Tunnell, A, Iafrate, JR, Jing, J, Miller, SJ, Porfilio, JD, Ronan, R, Samranvedhya, J and Strauch, FW (2013). Benford's Law and Continuous Dependent Random Variables. Preprint arXiv:1309.5603 [math.PR]; last accessed October 23, 2018. DOI:10.1016/j.aop.2017.11.013. View Complete Reference Online information Works that this work references Works that reference this work
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. View Complete Reference Online information Works that this work references Works that reference this work
Bhattacharya, S and Kumar, K (2008). Forensic Accounting and Benford’s Law. IEEE Signal Processing Magazine, 25(2), p. 152. DOI:10.1109/MSP.2007.914724. View Complete Reference Online information Works that this work references Works that reference this work
Bonettini, N, Bestagini, P, Milani, S and Tubaro, S (2020). On the use of Benford's law to detect GAN-generated images. Preprint arXiv:arXiv:2004.07682 [cs.CV]; last accessed April 21, 2020 (2020 25th International Conference on Pattern Recognition (ICPR), pp. 5495-5502) . View Complete Reference Online information Works that this work references Works that reference this work
Campanelli, L (2022). Monkeypox Obeys the (Benford's) Law: A Dynamic Analysis of Daily Case Counts in the United States of America. Preprint submitted to Statistics in Tran- sition new series.. View Complete Reference Online information Works that this work references Works that reference this work
Campanelli, L (2022). Tuning up the Kolmogorov-Smirnov test for testing Benford’s law. Preprint on ResearchGate. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Corazza, M, Ellero, A and Zorzi, A (2018). The importance of being “one” (or Benford’s law). Lettera Matematica 6(1), pp. 33–39. DOI:10.1007/s40329-018-0218-4. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Fang, X, Miller, SJ, Sun, M and Verga, A (2023). Generalized Continuous and Discrete Stick Fragmentation and Benford’s Law. Preprint arXiv:2309.00766 [math.PR]; last accessed September 12, 2023. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Fang, X, Miller, SJ, Sun, M and Verga, A (2024). Benford’s Law and Random Integer Decomposition with Congruence Stopping Condition. Preprint. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Gabhane, P, Rahangdale, P, Raipure, P, Sinde, S and Rathod, S.C. (2023). Analyzing the Effectiveness of Benford's Law in Detecting Image Forgery: A Systematic Review. International Research Journal of Modernization in Engineering Technology and Science 5(5). DOI:0.56726/IRJMETS38131. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Hildebrandt, M and Dittmann, J (2015). Benford’s Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes. In: Proceedings SPIE 9409, Media Watermarking, Security, and Forensics 94090A (4 March 2015). DOI:10.1117/12.2077531. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A (2016). Application of power laws to biometrics, forensics and network traffic analysis. PhD Thesis, University of Surrey. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/978-3-030-15210-9_3. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, AT, Poh, N, Zhao, X and Xia, Z (2017). Benford's law for classification of biometric images. In: User-Centric Privacy and Security in Biometrics, Claus Vielhauer (Ed.). ISSN/ISBN:9781785612077. DOI:10.1049/PBSE004E_ch11. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., Perez-Gonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88-105. DOI:10.1007/978-3-319-53465-7_7. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. View Complete Reference Online information Works that this work references Works that reference this work
Jiang, W, Ho, ATS, Treharne, H and Shi, YQ (2010). A Novel Multi-size Block Benford's Law Scheme for Printer Identification. In: Qiu G., Lam K.M., Kiya H., Xue XY., Kuo CC.J., Lew M.S. (eds) Advances in Multimedia Information Processing - PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg, pp. 643-652. DOI:10.1007/978-3-642-15702-8_59. View Complete Reference Online information Works that this work references Works that reference this work
Joksimović, D, Knežević, G, Pavlović, V, Ljubić, M and Surovy, V (2017). Some Aspects of the Application of Benford’s Law in the Analysis of the Data Set Anomalies. In: Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling. New York: Nova Science Publishers, pp. 85–120. ISSN/ISBN:978-1-53610-566-7. View Complete Reference Online information Works that this work references Works that reference this work
Kirchner, M and Chakraborty, S (2015). A second look at first significant digit histogram restoration. Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, pp. 1-6. DOI:10.1109/WIFS.2015.7368578. View Complete Reference Online information Works that this work references Works that reference this work
Mari, D, Latora, F and Milani, S (2022). The Sound of Silence: Efficiency of First Digit Features in Synthetic Audio Detection. Preprint arXiv:2210.02746 [cs.SD]; last accessed November 2, 2022. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Milani, S, Tagliasacchi, M and Tubaro, S (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3, e19. DOI:10.1017/ATSIP.2014.19. View Complete Reference Online information Works that this work references Works that reference this work
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. View Complete Reference Online information Works that this work references Works that reference this work
Mocnik, F-J (2021). Benford's law and geographical information - the example of OpenStreetMap. International Journal of Geographical Information Science 35, pp. 1746-1772. DOI:10.1080/13658816.2020.1829627. View Complete Reference Online information Works that this work references Works that reference this work
O'Mahony, L, O'Sullivan, DJP and Nikolov, NS (2023). On the Detection of Anomalous or Out-of-Distribution Data in Vision Models Using Statistical Techniques.. In: Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision (AICV2023), March 5–7, 2023. AICV 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 164. Springer, Cham.. DOI:10.1007/978-3-031-27762-7_40. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Pasquini, C and Boato, G (2013). JPEG compression anti-forensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Boato, G and Perez-Gonzalez, F (2014). Multiple JPEG compression detection by means of Benford-Fourier coefficients. 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, pp. 113-118. DOI:10.1109/WIFS.2014.7084313. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Boato, G and Pérez-González, F (2017). Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats. IEEE Transactions on Information Forensics and Security 12(12), pp. 2890-2905. DOI:10.1109/TIFS.2017.2725201. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Comesana-Alfaro, P, Perez-Gonzalez, F and Boato, G (2014). Transportation-theoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Pérez-González, F and Boato, G (2014). A Benford-Fourier JPEG compression detector. 2014 IEEE International Conference on Image Processing (ICIP), Paris, pp. 5322-5326. DOI:10.1109/ICIP.2014.7026077. View Complete Reference Online information Works that this work references Works that reference this work
Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242-246. DOI:10.1109/ASPCON49795.2020.9276660. View Complete Reference Online information Works that this work references Works that reference this work
Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and Babaie-Zadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240-000244. DOI:10.1109/ISSPIT.2012.6621294. View Complete Reference Online information Works that this work references Works that reference this work
Varga, D (2021). Analysis of Benford’s Law for No-Reference Quality Assessment of Natural, Screen-Content, and Synthetic Images . Electronics 10(19), p. 2378. DOI:10.3390/electronics10192378. View Complete Reference Online information Works that this work references Works that reference this work
Vishnu, U (2021). Deepfake Detection using Benford’s Law and Distribution Variance Statistic. International Research Journal of Engineering and Technology(IRJET) 08(10), pp. 712-719. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811. View Complete Reference Online information Works that this work references Works that reference this work
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. View Complete Reference Online information Works that this work references Works that reference this work
Zago, JG (2021). Defense Methods for Convolutional Neural Networks Against Adversarial Attacks. Masters Thesis, Federal University of Santa Catarina, Florianópolis, Brazil. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Zago, JG, Baldissera, FL, Antonelo, EA and Saad, RT (2021). Benford’s law: what does it say on adversarial images?. Preprint arXiv:2102.04615 [cs.CV]; last accessed February 21, 2021. View Complete Reference Online information Works that this work references Works that reference this work
Zaharis, A, Martini, A, Tryfonas, T, Ilioudis, C and Pangalos, G (2011). Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. nternational Journal of Digital Crime and Forensics 3(4), pp. 29-41. DOI:10.4018/jdcf.2011100103. View Complete Reference Online information Works that this work references Works that reference this work
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261. View Complete Reference Online information Works that this work references Works that reference this work