Cross Reference Up

Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Al-Bandawi, H and Deng, G (2018). Blind image quality assessment based on Benford's law. IET Image Processing 12(11), pp. 1983 – 1993. DOI:10.1049/iet-ipr.2018.5385 . View Complete Reference Online information Works that this work references Works that reference this work
Al-Bandawi, H and Deng, G (2019). Classification of image distortion based on the generalized Benford’s law. Multimedia Tools and Applications, pp. 1-18. DOI:10.1007/s11042-019-7668-3. View Complete Reference Online information Works that this work references Works that reference this work
Alexander, J (2009). Remarks on the use of Benford's law. Social Science Research Network (November 13, 2009). Available at SSRN: http://ssrn.com/abstract=1505147 or . DOI:10.2139/ssrn.1505147. View Complete Reference Online information Works that this work references Works that reference this work
Amruthnath, N (2020). Benford’s Law: Applying to Existing Data. Posted on R-bloggers.com, last accessed August 29, 2020. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Andriotis, P, Oikonomou, G and Tryfonas, T (2013). JPEG steganography detection with Benford's law. Digital Investigation 9(3-4), pp. 246-57. DOI:10.1016/j.diin.2013.01.005. View Complete Reference Online information Works that this work references Works that reference this work
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. View Complete Reference Online information Works that this work references Works that reference this work
Asadi, AN (2015). An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's law. 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 257-262. DOI:10.1109/KBEI.2015.7436057. View Complete Reference Online information Works that this work references Works that reference this work
Ausloos, M, Cerqueti, R and Mir, TA (2017). Data science for assessing possible tax income manipulation: The case of Italy. Chaos, Solitons and Fractals 104, pp. 238–256. DOI:10.1016/j.chaos.2017.08.012. View Complete Reference Online information Works that this work references Works that reference this work
Azevedo, CdS, Gonçalves, RF, Gava, VL and Spinola, MdM (2021). A Benford’s Law based methodology for fraud detection in social welfare programs: Bolsa Familia analysis. Physica A 567, p. 125626. DOI:10.1016/j.physa.2020.125626. View Complete Reference Online information Works that this work references Works that reference this work
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. View Complete Reference Online information Works that this work references Works that reference this work
Birajdar, GK and Mankar, VH (2013). Digital image forgery detection using passive techniques: A survey. Digital Investigation, Vol. 10, No. 3, pp. 226–245. DOI:10.1016/j.diin.2013.04.007. View Complete Reference Online information Works that this work references Works that reference this work
Chen, W and Shi, YQ (2009). Detection of Double MPEG Compression Based on First Digit Statistics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 16-30). Berlin: Springer-Verlag. DOI:10.1007/978-3-642-04438-0_2. View Complete Reference Online information Works that this work references Works that reference this work
Clippe, P and Ausloos, M (2012). Benford's law and Theil transform of financial data. Physica A: Statistical Mechanics and its Applications 391(24), pp. 6556–6567. View Complete Reference Online information Works that this work references Works that reference this work
Cole, MA, Maddison, DJ and Zhang, L (2020). Testing the emission reduction claims of CDM projects using the Benford's Law. Climatic Change 160 (3), pp. 407–426. DOI:10.1007/s10584-019-02593-5. View Complete Reference Online information Works that this work references Works that reference this work
Cong, M, Li, C and Ma, B-Q (2019). First digit law from Laplace transform. Phys. Lett. A, 383(16), pp. 1836-1844. DOI:10.1016/j.physleta.2019.03.017 . View Complete Reference Online information Works that this work references Works that reference this work
Crisan, D and Gota, DI (2023). The First-Digit Law application in digital forensics in crystal forgery research. Proceedings of 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Canary Islands, Spain, pp. 1-7. DOI:10.1109/ICECCME57830.2023.10253354. View Complete Reference Online information Works that this work references No Bibliography works reference this work
da Silva, AJ, Floquet, S, Santos, DOC and Lima, RF (2020). On the validation of the Newcomb-Benford Law and the Weibull distribution in neuromuscular transmission. Physica A 553, 1 September 2020, 124606. DOI:10.1016/j.physa.2020.124606. View Complete Reference Online information Works that this work references Works that reference this work
Egghe, L and Guns, R (2012). Applications of the generalized law of Benford to informetric data. Journal of the American Society for Information Science and Technology 63(8), pp. 1662-1665. ISSN/ISBN:1532-2882. DOI:10.1002/asi.22690. View Complete Reference Online information Works that this work references Works that reference this work
Evsutin, O, Melman, A and Meshcheryakov, R (2020). Algorithm of error-free information embedding into the DCT domain of digital images based on the QIM method using adaptive masking of distortions. Signal Processing. DOI:10.1016/j.sigpro.2020.107811. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Fang, G (2022). Investigating Hill’s question for some probability distributions. AIP Advances 12, 095004. DOI:10.1063/5.0100429. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Fellman, J (2014). The Benford paradox. Journal of statistical and econometric methods 3(4), pp. 1-20. ISSN/ISBN:2241-0384 . View Complete Reference Online information Works that this work references Works that reference this work
Gao, J, Zhao, Y and Cui, R (2020). Research on the Applicability of Benford’s Law in Chinese Texts. Proceedings of 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM), Manchester, United Kingdom, pp. 13-17. DOI:10.1109/AIAM50918.2020.00009. View Complete Reference Online information Works that this work references Works that reference this work
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169. View Complete Reference Online information Works that this work references Works that reference this work
Hao, X, Li, X, Wu, J, Wei, B, Song, Y and Li, B (2024). A No-Reference Quality Assessment Method for Hyperspectral Sharpened Images via Benford’s Law. Remote Sensing, 16(7):1167. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Hürlimann, W (2015). Prime powers and generalized Benford law. Pioneer Journal of Algebra, Number Theory and its Applications 12/2015; 10(1-2):51-70. View Complete Reference Online information Works that this work references Works that reference this work
Hussain, SA (2010). The Application of Benford's Law in Forensic Accounting: An Analysis of Credit Bureau Data. Available at SSRN 1626696; last accessed Mar 10, 2021. DOI:10.2139/ssrn.1626696. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A (2016). Application of power laws to biometrics, forensics and network traffic analysis. PhD Thesis, University of Surrey. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/978-3-030-15210-9_3. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Emmanual, O and Shehu, YI (2021). An Investigation of "Benford's" Law Divergence and Machine Learning Techniques for "Intra-Class" Separability of Fingerprint Images. Preprint arXiv:2201.01699 [cs.CV]; last accessed January 12, 2022. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A, Ho, AT, Poh, N, Zhao, X and Xia, Z (2017). Benford's law for classification of biometric images. In: User-Centric Privacy and Security in Biometrics, Claus Vielhauer (Ed.). ISSN/ISBN:9781785612077. DOI:10.1049/PBSE004E_ch11. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using 
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on 
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., Perez-Gonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88-105. DOI:10.1007/978-3-319-53465-7_7. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references Works that reference this work
Jasak, Z (2010). Benfordov zakon i reinforcement učenje (Benford's Law and reinforcment learning) . MSc Thesis, University of Tuzla, Bosnia. SRP View Complete Reference Online information Works that this work references Works that reference this work
Jiang, W, Ho, ATS, Treharne, H and Shi, YQ (2010). A Novel Multi-size Block Benford's Law Scheme for Printer Identification. In: Qiu G., Lam K.M., Kiya H., Xue XY., Kuo CC.J., Lew M.S. (eds) Advances in Multimedia Information Processing - PCM 2010. PCM 2010. Lecture Notes in Computer Science, vol 6297. Springer, Berlin, Heidelberg, pp. 643-652. DOI:10.1007/978-3-642-15702-8_59. View Complete Reference Online information Works that this work references Works that reference this work
Joksimović, D, Knežević, G, Pavlović, V, Ljubić, M and Surovy, V (2017). Some Aspects of the Application of Benford’s Law in the Analysis of the Data Set Anomalies. In: Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling. New York: Nova Science Publishers, pp. 85–120. ISSN/ISBN:978-1-53610-566-7. View Complete Reference Online information Works that this work references Works that reference this work
Kaiser, M (2019). Benford’s Law As An Indicator Of Survey Reliability—Can We Trust Our Data?. Journal of Economic Surveys Vol. 00, No. 0, pp. 1–17. DOI:10.1111/joes.12338. View Complete Reference Online information Works that this work references Works that reference this work
Kirchner, M and Chakraborty, S (2015). A second look at first significant digit histogram restoration. Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, pp. 1-6. DOI:10.1109/WIFS.2015.7368578. View Complete Reference Online information Works that this work references Works that reference this work
Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171. View Complete Reference Online information Works that this work references Works that reference this work
Li, F, Han, S, Zhang, H, Ding, J, Zhang, J and Wu, J (2019). Application of Benford’s law in Data Analysis. Journal of Physics: Conference Series 1168, pp. 032133. DOI:10.1088/1742-6596/1168/3/032133. View Complete Reference Online information Works that this work references Works that reference this work
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190. View Complete Reference Online information Works that this work references Works that reference this work
Makrushin, A, Kraetzer, C, Neubert, T and Dittmann, J (2018). Generalized Benford's Law for Blind Detection of Morphed Face Images. In: IH&MMSec '18 Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 49-54 . DOI:10.1145/3206004.3206018. View Complete Reference Online information Works that this work references Works that reference this work
Maza-Quiroga, R, Thurnhofer-Hemsi, K, Lopez-Rodrıguez, D and Lopez-Rubio, E (2021). Rician Noise Estimation for 3D Magnetic Resonance Images Based on Benford’s Law. In: de Bruijne M. et al. (eds) Medical Image Computing and Computer Assisted Intervention – MICCAI 2021. MICCAI 2021. Lecture Notes in Computer Science, vol 12906. Springer, Cham.. DOI:10.1007/978-3-030-87231-1_33. View Complete Reference Online information Works that this work references Works that reference this work
McCarville, D (2020). Analyzing Network Traffic with Benford's Law. LinkedIn blog. View Complete Reference Online information Works that this work references No Bibliography works reference this work
McCarville, D (2021). A data transformation process for using Benford’s Law with bounded data. Preprint [version 1; peer review: awaiting peer review], Emerald Open Research 3(29). DOI:10.35241/emeraldopenres.14374.1. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Milani, S, Tagliasacchi, M and Tubaro, S (2012). Discriminating multiple JPEG compression using first digit features. Proceedings of 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Mar 25-30, pp. 2253-2256. DOI:10.1109/ICASSP.2012.6288362. View Complete Reference Online information Works that this work references Works that reference this work
Milani, S, Tagliasacchi, M and Tubaro, S (2014). Discriminating multiple JPEG compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3, e19. DOI:10.1017/ATSIP.2014.19. View Complete Reference Online information Works that this work references Works that reference this work
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. View Complete Reference Online information Works that this work references Works that reference this work
Mir, TA (2016). Citations to articles citing Benford's law: a Benford analysis. arXiv:1602.01205; posted Feb 3, 2016. View Complete Reference Online information Works that this work references Works that reference this work
Mire, A, Dhok, SB, Mistry, NJ and Porey, PD (2016). Tampering Localization in Digital Image Using First Two Digit Probability Features. In: Satapathy, S., Mandal, J., Udgata, S., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 435. Springer, New Delhi, pp. 133-151. DOI:10.1007/978-81-322-2757-1_15. View Complete Reference Online information Works that this work references Works that reference this work
Moin, SS and Islam, S (2017). Benford's law for detecting contrast enhancement. Proceedings of 2017 Fourth International Conference on Image Information Processing (ICIIP), Dec 21-23, pp. 1-4. DOI:10.1109/ICIIP.2017.8313717. View Complete Reference Online information Works that this work references Works that reference this work
Özkan, K (2021). Benford Kanunu ve Genelleştirilmiş Benford Kanunu ile ekosistem doğallığının hesaplanması [Estimating ecosystem naturalness using Benford’s Law and Generalized Benford’s Law]. Turkish Journal of Forestry 22(2), pp. 73-82 . DOI:10.18182/tjf.907217. TUR View Complete Reference Online information Works that this work references Works that reference this work
Pahuja, D (2021). Application of Benford’s Law to Detect if COVID-19 Data is under Reported or Manipulated. In: Rahul Srivastava & Aditya Kumar Singh Pundir (eds.), New Frontiers in Communication and Intelligent Systems, pp. 85–91. Computing & Intelligent Systems, SCRS, India . DOI:10.52458/978-81-95502-00-4-11. View Complete Reference Online information Works that this work references Works that reference this work
Parnak, A, Baleghi, Y, Kazemitabar, J and (2020). A Novel Forgery Detection Algorithm Based on Mantissa Distribution in Digital Images. Proceedings of 6th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), pp. 1-4. DOI:10.1109/ICSPIS51611.2020.9349611. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C and Boato, G (2013). JPEG compression anti-forensics based on first significant digit distribution. Proceedings of IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). DOI:10.1109/MMSP.2013.6659339. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Boato, G and Pérez-González, F (2017). Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats. IEEE Transactions on Information Forensics and Security 12(12), pp. 2890-2905. DOI:10.1109/TIFS.2017.2725201. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Comesana-Alfaro, P, Perez-Gonzalez, F and Boato, G (2014). Transportation-theoretic image counterforensics to First Significant Digit histogram forensics. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). DOI:10.1109/ICASSP.2014.6854090. View Complete Reference Online information Works that this work references Works that reference this work
Pasquini, C, Pérez-González, F and Boato, G (2014). A Benford-Fourier JPEG compression detector. 2014 IEEE International Conference on Image Processing (ICIP), Paris, pp. 5322-5326. DOI:10.1109/ICIP.2014.7026077. View Complete Reference Online information Works that this work references Works that reference this work
Pavlović, V, Knežević, G, Joksimović, M and Joksimović, D (2019). Fraud Detection in Financial Statements Applying Benford's Law with Monte Carlo Simulation. Acta oeconomica 69(2), pp.217-239. DOI:10.1556/032.2019.69.2.4. View Complete Reference Online information Works that this work references Works that reference this work
Pinheiro, MF (2024). Newcomb-Benford Law in public procurement contracts. Master Thesis, NOVA Information Management School, Instituto Superior de Estatística e Gestão de Informação, Universidade Nova de Lisboa. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Piva, A (2013). An Overview on Image Forensics. ISRN Signal Processing, vol. 2013, Article ID 496701. ISSN/ISBN:2090-5041. DOI:10.1155/2013/496701. View Complete Reference Online information Works that this work references Works that reference this work
Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 -77230J10. DOI:10.1117/12.855085. View Complete Reference Online information Works that this work references Works that reference this work
Qadir, G, Zhao, X, Ho, ATS and Casey, M (2011). Image forensic of glare feature for improving image retrieval using Benford's Law. Proceedings of 2011 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2661--2664. ISSN/ISBN:0271-4302. DOI:10.1109/ISCAS.2011.5938152. View Complete Reference Online information Works that this work references Works that reference this work
Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242-246. DOI:10.1109/ASPCON49795.2020.9276660. View Complete Reference Online information Works that this work references Works that reference this work
Shao, L and Ma, BQ (2009). First Digit Distribution of Hadron full width. Modern Physics Letters A, 24(40), 3275-3282. ISSN/ISBN:0217-7323. DOI:10.1142/S0217732309031223. View Complete Reference Online information Works that this work references Works that reference this work
Shi, YQ (2009). First digit law and its application to digital forensics. In H. J. Kim, S. Katzenbeisser, & A.T.S. Ho (Eds.), Digital watermarking: Seventh International Workshop (IWDW ’08) (pp. 444–456). Berlin: Springer-Verlag. ISSN/ISBN:978-3-642-04437-3. DOI:10.1007/978-3-642-04438-0_37. View Complete Reference Online information Works that this work references Works that reference this work
Singh, N and Bansal, R (2015). Analysis of Benford's law in digital image forensics. Proceedings of 2015 International Conference on Signal Processing and Communication (ICSC), pp. 413-418. DOI:10.1109/ICSPCom.2015.7150688. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, A, Xia, Z, Chen, J and Zhang, M (2019). Development of an Early Warning System for Network Intrusion Detection Using Benford’s Law Features. In: Meng W., Furnell S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore. DOI:10.1007/978-981-15-0758-8_5. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872. DOI:10.1109/APSIPA.2017.8282154. View Complete Reference Online information Works that this work references Works that reference this work
Tong, SF, Yang, YH and Xie, YJ (2013). Distinguishing Computer Graphics from Natural Images Based on Statistical Characteristics. Applied Mechanics and Materials, Vols. 380-384, pp. 1306-1309. DOI:10.4028/www.scientific.net/AMM.380-384.1306. View Complete Reference Online information Works that this work references Works that reference this work
Tong, SF, Zhang, Z, Xie, Y and Wu, X (2013). Image Splicing Detection Based on Statistical Properties of Benford Model. Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 0792-0795. ISSN/ISBN:978-90-78677-61-1. DOI:10.2991/iccsee.2013.200. View Complete Reference Online information Works that this work references Works that reference this work
Vishnu, U (2021). Deepfake Detection using Benford’s Law and Distribution Variance Statistic. International Research Journal of Engineering and Technology(IRJET) 08(10), pp. 712-719. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Wang, H, Liu, T, Zhang, Y, Wu, Y, Sun, Y, Dong, J and Huang, W (2023). Last Digit Tendency: Lucky Numbers and Psychological Rounding in Mobile Transactions. Fundamental Research. DOI:10.1016/j.fmre.2023.11.011. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Wang, J, Cha, B-H, Cho, S-H and Kuo, C-CJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568 - 1571. ISSN/ISBN:1945-7871. DOI:10.1109/ICME.2009.5202811. View Complete Reference Online information Works that this work references Works that reference this work
Wang, Q, Zhang, R and Qing, K (2015). Passive Detection of Tampered JPEG Image Based on First Digit Statistics. Proceedings of 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Adelaide, SA, Australia, pp. 401-404 . DOI:10.1109/IIH-MSP.2015.42. View Complete Reference Online information Works that this work references Works that reference this work
Winter, C, Schneider, M and Yannikos, Y (2012). Model-Based Digit Analysis for Fraud Detection overcomes Limitations of Benford Analysis. Availability, Reliability and Security (ARES 2012), Seventh International Conference, August 20–24, 2012, Prague, Czech Republic. IEEE CS volume E4775, pages 255–261. IEEE Computer Society. ISSN/ISBN:978-1-4673-2244-7 . DOI:10.1109/ARES.2012.37. View Complete Reference Online information Works that this work references Works that reference this work
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. View Complete Reference Online information Works that this work references Works that reference this work
Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 1-8. DOI:10.1109/ICDSP.2009.5201261. View Complete Reference Online information Works that this work references Works that reference this work