Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572.
|
|
|
|
|
Del Acebo, E and Sbert, M (2005). Benford's Law for Natural and Synthetic Images. Proc. of the First Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, L. Neumann, M. Sbert, B. Gooch, and W. Purgathofer, Eds., Girona, Spain, May 2005, pp. 169–176. ISSN/ISBN:1816-0859. DOI:10.2312/COMPAESTH/COMPAESTH05/169-176.
|
|
|
|
|
Durtschi, C, Hillison, W and Pacini, C (2004). The effective use of Benford’s law to assist in detecting fraud in accounting data. Journal of Forensic Accounting 1524-5586/Vol. V, pp. 17-34.
|
|
|
|
|
Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11. DOI:10.1117/12.704723.
|
|
|
|
|
Hildebrandt, M and Dittmann, J (2015). Benford’s Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes. In: Proceedings SPIE 9409, Media Watermarking, Security, and Forensics 94090A (4 March 2015). DOI:10.1117/12.2077531.
|
|
|
|
|
Hill, TP (1995). A Statistical Derivation of the Significant-Digit Law. Statistical Science 10(4), pp. 354-363. ISSN/ISBN:0883-4237.
|
|
|
|
|
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261.
|
|
|
|
|
Jolion, JM (2001). Images and Benford's Law. Journal of Mathematical Imaging and Vision 14(1), pp. 73-81. ISSN/ISBN:0924-9907. DOI:10.1023/A:1008363415314.
|
|
|
|
|
Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171.
|
|
|
|
|
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190.
|
|
|
|
|
Perez-Gonzalez, F, Heileman, GL and Abdallah, CT (2007). Benford's Law in Image Processing. Image Processing, pp I-405 - I-408. ICIP 2007. IEEE International Conference. ISSN/ISBN:1522-4880. DOI:10.1109/ICIP.2007.4378977.
|
|
|
|
|
Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the
Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 -77230J10. DOI:10.1117/12.855085.
|
|
|
|
|
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3.
|
|
|
|
|