Cross Reference Up

Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Al-Bandawi, H and Deng, G (2019). Classification of image distortion based on the generalized Benford’s law. Multimedia Tools and Applications, pp. 1-18. DOI:10.1007/s11042-019-7668-3. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Alexander, J (2009). Remarks on the use of Benford's law. Social Science Research Network (November 13, 2009). Available at SSRN: http://ssrn.com/abstract=1505147 or . DOI:10.2139/ssrn.1505147. View Complete Reference Online information Works that this work references Works that reference this work
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005. View Complete Reference Online information Works that this work references Works that reference this work
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. View Complete Reference Online information Works that this work references Works that reference this work
Ausloos, M, Cerqueti, R and Mir, TA (2017). Data science for assessing possible tax income manipulation: The case of Italy. Chaos, Solitons and Fractals 104, pp. 238–256. DOI:10.1016/j.chaos.2017.08.012. View Complete Reference Online information Works that this work references Works that reference this work
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. View Complete Reference Online information Works that this work references Works that reference this work
Birajdar, GK and Mankar, VH (2013). Digital image forgery detection using passive techniques: A survey. Digital Investigation, Vol. 10, No. 3, pp. 226–245. DOI:10.1016/j.diin.2013.04.007. View Complete Reference Online information Works that this work references Works that reference this work
Chen, W and Shi, YQ (2009). Detection of Double MPEG Compression Based on First Digit Statistics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 16-30). Berlin: Springer-Verlag. DOI:10.1007/978-3-642-04438-0_2. View Complete Reference Online information Works that this work references Works that reference this work
Clippe, P and Ausloos, M (2012). Benford's law and Theil transform of financial data. Physica A: Statistical Mechanics and its Applications 391(24), pp. 6556–6567. View Complete Reference Online information Works that this work references Works that reference this work
Cong, M, Li, C and Ma, BQ (2019). First digit law from Laplace transform. Phys. Lett. A, 383(16), pp. 1836-1844. DOI:10.1016/j.physleta.2019.03.017 . View Complete Reference Online information Works that this work references No Bibliography works reference this work
Egghe, L and Guns, R (2012). Applications of the generalized law of Benford to informetric data. Journal of the American Society for Information Science and Technology 63(8), pp. 1662-1665. ISSN/ISBN:1532-2882. DOI:10.1002/asi.22690. View Complete Reference Online information Works that this work references Works that reference this work
Fellman, J (2014). The Benford paradox. Journal of statistical and econometric methods 3(4), pp. 1-20. ISSN/ISBN:2241-0384 . View Complete Reference Online information Works that this work references Works that reference this work
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169. View Complete Reference Online information Works that this work references Works that reference this work
Hürlimann, W (2015). Prime powers and generalized Benford law. Pioneer Journal of Algebra, Number Theory and its Applications 12/2015; 10(1-2):51-70. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/978-3-030-15210-9_3. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using 
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on 
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., Perez-Gonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88-105. DOI:10.1007/978-3-319-53465-7_7. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references Works that reference this work
Jasak, Z (2010). Benfordov zakon i reinforcement učenje (Benford's Law and reinforcment learning) . MSc Thesis, University of Tuzla, Bosnia. SRP View Complete Reference Online information Works that this work references Works that reference this work
Jiang, W, Ho, ATS, Treharne, H and Shi, YQ (2010). A Novel Multi-size Block Benford's Law Scheme for Printer Identification. In: Qiu G., Lam K.M., Kiya H., Xue XY., Kuo CC.J., Lew M.S. (eds) Advances in Multimedia Information Processing - PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg, pp. 643-652. DOI:10.1007/978-3-642-15702-8_59. View Complete Reference Online information Works that this work references Works that reference this work
Joksimović, D, Knežević, G, Pavlović, V, Ljubić, M and Surovy, V (2017). Some Aspects of the Application of Benford’s Law in the Analysis of the Data Set Anomalies. In: Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling. New York: Nova Science Publishers, pp. 85–120. ISSN/ISBN:978-1-53610-566-7. View Complete Reference Online information Works that this work references Works that reference this work
Kaiser, M (2019). Benford’s Law As An Indicator Of Survey Reliability—Can We Trust Our Data?. Journal of Economic Surveys Vol. 00, No. 0, pp. 1–17. DOI:10.1111/joes.12338. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171. View Complete Reference Online information Works that this work references Works that reference this work
Li, F, Han, S, Zhang, H, Ding, J, Zhang, J and Wu, J (2019). Application of Benford’s law in Data Analysis. Journal of Physics: Conference Series 1168, pp. 032133. DOI:10.1088/1742-6596/1168/3/032133. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190. View Complete Reference Online information Works that this work references Works that reference this work
Makrushin, A, Kraetzer, C, Neubert, T and Dittmann, J (2018). Generalized Benford's Law for Blind Detection of Morphed Face Images. In: IH&MMSec '18 Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 49-54 . DOI:10.1145/3206004.3206018. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Milani, S, Tagliasacchi, M and Tubaro, S (2012). Discriminating multiple JPEG compression using first digit features. Proceedings of 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Mar 25-30, pp. 2253-2256. DOI:10.1109/ICASSP.2012.6288362. View Complete Reference Online information Works that this work references Works that reference this work
Milani, S, Tagliasacchi, M and Tubaro, S (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3, e19. DOI:10.1017/ATSIP.2014.19. View Complete Reference Online information Works that this work references Works that reference this work
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. View Complete Reference Online information Works that this work references Works that reference this work
Mir, TA (2016). Citations to articles citing Benford's law: a Benford analysis. arXiv:1602.01205; posted Feb 3, 2016. View Complete Reference Online information Works that this work references Works that reference this work
Moin, SS and Islam, S (2017). Benford's law for detecting contrast enhancement. Proceedings of 2017 Fourth International Conference on Image Information Processing (ICIIP), Dec 21-23, pp. 1-4. DOI:10.1109/ICIIP.2017.8313717. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Pasquini, C and Boato, G (2013). JPEG compression anti-forensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Comesana-Alfaro, P, Perez-Gonzalez, F and Boato, G (2014). Transportation-theoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090. View Complete Reference Online information Works that this work references Works that reference this work
Pavlović, V, Knežević, G, Joksimović, M and Joksimović, D (2019). Fraud Detection in Financial Statements Applying Benford's Law with Monte Carlo Simulation. Acta oeconomica 69(2), pp.217-239. DOI:10.1556/032.2019.69.2.4. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Piva, A (2013). An Overview on Image Forensics. ISRN Signal Processing, vol. 2013, Article ID 496701. ISSN/ISBN:2090-5041. DOI:10.1155/2013/496701. View Complete Reference Online information Works that this work references Works that reference this work
Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 -77230J10. DOI:10.1117/12.855085. View Complete Reference Online information Works that this work references Works that reference this work
Qadir, G, Zhao, X, Ho, ATS and Casey, M (2011). Image forensic of glare feature for improving image retrieval using Benford's Law. Proceedings of 2011 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2661--2664. ISSN/ISBN:0271-4302. DOI:10.1109/ISCAS.2011.5938152. View Complete Reference Online information Works that this work references Works that reference this work
Shao, L and Ma, BQ (2009). First Digit Distribution of Hadron full width. Modern Physics Letters A, 24(40), 3275-3282. ISSN/ISBN:0217-7323. DOI:10.1142/S0217732309031223. View Complete Reference Online information Works that this work references Works that reference this work
Shi, YQ (2009). First digit law and its application to digital forensics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 444–456). Berlin: Springer-Verlag. ISSN/ISBN:978-3-642-04437-3. DOI:10.1007/978-3-642-04438-0_37. View Complete Reference Online information Works that this work references Works that reference this work
Singh, N and Bansal, R (2015). Analysis of Benford's law in digital image forensics. Proceedings of 2015 International Conference on Signal Processing and Communication (ICSC), pp. 413-418. DOI:10.1109/ICSPCom.2015.7150688. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Tong, SF, Yang, YH and Xie, YJ (2013). Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics. Applied Mechanics and Materials, Vols. 380-384, pp. 1306-1309. DOI:10.4028/www.scientific.net/AMM.380-384.1306. View Complete Reference Online information Works that this work references Works that reference this work
Tong, SF, Zhang, Z, Xie, Y and Wu, X (2013). Image Splicing Detection Based on Statistical Properties of Benford Model. Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 0792-0795. ISSN/ISBN:978-90-78677-61-1. DOI:10.2991/iccsee.2013.200. View Complete Reference Online information Works that this work references Works that reference this work
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811. View Complete Reference Online information Works that this work references Works that reference this work
Winter, C, Schneider, M and Yannikos, Y (2012). Model-Based Digit Analysis for Fraud Detection overcomes Limitations of Benford Analysis. Availability, Reliability and Security (ARES 2012), Seventh International Conference, August 20–24, 2012, Prague, Czech Republic. IEEE CS volume E4775, pages 255–261. IEEE Computer Society. ISSN/ISBN:978-1-4673-2244-7 . DOI:10.1109/ARES.2012.37. View Complete Reference Online information Works that this work references Works that reference this work
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. View Complete Reference Online information Works that this work references Works that reference this work
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261. View Complete Reference Online information Works that this work references Works that reference this work