{"id":141,"date":"2016-10-06T09:19:18","date_gmt":"2016-10-06T14:19:18","guid":{"rendered":"http:\/\/misl.ece.drexel.edu\/?page_id=141"},"modified":"2020-05-04T11:08:48","modified_gmt":"2020-05-04T16:08:48","slug":"publications","status":"publish","type":"page","link":"https:\/\/research.coe.drexel.edu\/ece\/misl\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p><strong>Journal Publications<\/strong><\/p>\n<ol>\n<li>O. Mayer, M. C. Stamm, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/1912.02861.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exposing Fake Images with Forensic Similarity Graphs<\/a>,&#8221; under review, 2020. (<a href=\"https:\/\/omayer.gitlab.io\/forensicgraph\/\">Website<\/a>)<\/li>\n<li>C. Chen, X. Zhao, M. C. Stamm, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8854834\/\" target=\"_blank\" rel=\"noopener noreferrer\">Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, 2019.<\/li>\n<li>O. Mayer, M. C. Stamm, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=8744262\" target=\"_blank\" rel=\"noopener noreferrer\">Forensic Similarity for Digital Images<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, 2019. (<a href=\"https:\/\/omayer.gitlab.io\/forensicsimilarity\/\">Website<\/a>)<\/li>\n<li>B. Bayar, M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/04\/BayarStammTIFS01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, 2018.<\/li>\n<li>O. Mayer, M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/02\/Mayer_TIFS_2018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, 2018.<\/li>\n<li>T. Huang, N. Kandasamy, H. Sethu, and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Huang_TCC_2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An Efficient Strategy for Online Performance Monitoring of Datacenters via Adaptive Sampling<\/a>,&#8221; IEEE Transactions on Cloud Computing, 2017.<\/li>\n<li>X. Chu, Y. Chen, M. C. Stamm, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Chu_TIFS_2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Information Theoretical Limit of Operation Forensics: The Forensicability<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 774-788, April 2016.<\/li>\n<li>X. Chu, M. C. Stamm, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Chu_TIFS_2015.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Compressive Sensing Forensics<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1416-1431, Jul. 2015.<\/li>\n<li>X. Chu, M. C. Stamm, Y. Chen, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Chu_TIP_2015.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Antiforensic Concealability with Rate-Distortion Tradeoff<\/a>,&#8221; IEEE Transactions on Image Processing, vol. 24, no. 3, pp. 1087-1100, Mar. 2015.<\/li>\n<li>X. Kang, M. C. Stamm, A. Peng, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Kang_TIFS_2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust Median Filtering Forensics Using an Autoregressive Model<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, vol. 8, no. 9, pp. 1456_1468, Sep. 2013.<\/li>\n<li>M. C. Stamm, M. Wu, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_IEEEAccess_2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Information Forensics: An Overview of the First Decade<\/a>,&#8221; IEEE Access, vol. 1, pp. 167-200, 2013.<\/li>\n<li>M. C. Stamm, W. S. Lin, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_TIFS_2012.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Temporal Forensics and Anti-Forensics in Digital Videos<\/a>,&#8221; IEEE Trans. on Information Forensics and Security, vol. 7, no. 4, pp. 1315 &#8211; 1329, Aug. 2012.<\/li>\n<li>M. C. Stamm and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_TIFS_2011.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Anti-Forensics of Digital Image Compression<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1050 &#8211; 1065, Sep. 2011.<\/li>\n<li>M. C. Stamm and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_TIFS_2010.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints<\/a>,&#8221; IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 492 &#8211; 506, Sep. 2010.<\/li>\n<\/ol>\n<p><strong>Conference Publications<\/strong><\/p>\n<ol>\n<li>C. Chen<sup>*<\/sup>, X. Zhao<sup>*<\/sup>, and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/08\/ChenZhaoICIP2018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">MISLGAN: An Anti-Forensic Camera Model Falsification Framework Using A Generative Adversarial Network<\/a>,&#8221; IEEE International Conference on Image Processing (ICIP), Athens, Greece, Oct. 2018. (* Both authors contributed equally to this publication)<\/li>\n<li>M. Barni, M. C. Stamm, and B. Tondi, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/08\/BarniStammTondiEUSIPCO2018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Adversarial Multimedia Forensics: Overview and Challenges Ahead<\/a>,&#8221; European Signal Processing Conference (EUSIPCO), Rome, Italy, Sep. 2018.<\/li>\n<li>O. Mayer, B. Bayar, and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/04\/Mayer_IHMMSec2018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Learning Unified Deep-Features for Multiple Forensic Tasks<\/a>,&#8221; ACM Workshop on Information Hiding and Multimedia Security (IH&amp;MMSec), Innsbruck, Austria, Jun. 2018.<\/li>\n<li>O. Mayer and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/05\/Mayer_ICASSP18_CameraReady_13Feb2018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Learned Forensic Source Similarity For Unknown Camera Models<\/a>,&#8221; IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Alberta, Canada, Apr. 2018.<\/li>\n<li>B. Bayar and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/06\/BayarStammICASSP2018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards Open Set Camera Model Identification Using A Deep Learning Framework<\/a>,&#8221; IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Alberta, Canada, Apr. 2018.<\/li>\n<li>B. Bayar and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/04\/BayarStammEI18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards Order of Processing Operations Detection in JPEG-compressed Images with Convolutional Neural Networks<\/a>,&#8221;IS&amp;T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics, CA, Jan. 2018.<\/li>\n<li>B. Bayar and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/04\/Bayar_ICIP_2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Augmented Convolutional Feature Maps for Robust CNN-Based Camera Model Identification<\/a>,&#8221; IEEE International Conference on Image Processing (ICIP), Beijing, China, Sep. 2017.<\/li>\n<li>C. Chen and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/06\/ChenStammICIP2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Image Filter Identification Using Demosaicing Residual Features<\/a>,&#8221; IEEE International Conference on Image Processing (ICIP), Beijing, China, Sep. 2017.<\/li>\n<li>C. Chen<sup>*<\/sup>, X. Zhao<sup>*<\/sup>, and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/06\/ChenZhaoStammICIP2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detecting Anti-Forensic Attacks on Demosaicing-Based Camera Model Identification<\/a>,&#8221; IEEE International Conference on Image Processing (ICIP), Beijing, China, Sep. 2017. (* Both authors contributed equally to this publication)<\/li>\n<li>B. Bayar and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/08\/Bayar_IHMMSec_2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks<\/a>,&#8221; ACM Workshop on Information Hiding and Multimedia Security (IH&amp;MMSec), Philadelphia, PA, pp. 147-157, Jun. 2017.<\/li>\n<li>O. Mayer and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/08\/Mayer_IHMMSec_2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Countering Anti-Forensics of Lateral Chromatic Aberration<\/a>,&#8221; ACM Workshop on Information Hiding and Multimedia Security (IH&amp;MMSec), Philadelphia, PA, pp. 15-20, Jun. 2017.<\/li>\n<li>B. Bayar and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/08\/Bayar_ICASSP_2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On the Robustness of Constrained Convolutional Neural Networks to JPEG Post-Compression for Image Resampling Detection<\/a>,&#8221; IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, pp. 2152-2156, Mar. 2017.<\/li>\n<li>B. Bayar and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2018\/04\/Bayar_EI_2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design Principles of Convolutional Neural Networks for Multimedia Forensics<\/a>,&#8221; IS&amp;T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics, Burlingame, CA, Jan. 2017.<\/li>\n<li>X. Zhao and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Zhao_ICIP_2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Computationally Efficient Demosaicing Filter Estimation for Forensic Camera Model IOdentification<\/a>,&#8221; IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, Sep. 2016.<\/li>\n<li>B. Bayar and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Bayar_IHMMSec_2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer<\/a>,&#8221; ACM Workshop on Information Hiding and Multimedia Security, Vigo, Spain, Jun. 2016.<\/li>\n<li>S. DeCelles, T. Huang, M. C. Stamm, N. Kandasamy, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/DeCelles_CLOUD_2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detecting Incipient Faults in Software Systems: A Compressed Sampling-Based Approach<\/a>,&#8221; IEEE International Conference on Cloud Computing (CLOUD), (15% acceptance rate), San Francisco, CA, Jun. 2016.<\/li>\n<li>O. Mayer and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Mayer_ICASSP_2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Improved Forgery Detection With Lateral Chromatic Aberration<\/a>,&#8221; IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, Mar. 2016.<\/li>\n<li>S. Decelles, M. C. Stamm, and N. Kandasamy, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/DeCelles_UCC2015.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Efficient Online Performance Monitoring of Computing Systems Using Predictive Models<\/a>,&#8221; IEEE\/ACM International Conference on Utility &amp; Cloud Computing (UCC) (27.5% acceptance rate), Limassol, Cyprus, Dec. 2015, pp. 152-161.<\/li>\n<li>C. Chen and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Chen_WIFS2015.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Camera Model Identification Framework Using an Ensemble of Demosaicing Features<\/a>,&#8221; IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, Nov. 2015, pp. 1-6.<\/li>\n<li>O. Mayer and M. C. Stamm, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Mayer_SPIE2015.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Anti-Forensics of Chromatic Aberration<\/a>,&#8221; Proc. IS&amp;T SPIE Electronic Imaging, Media Watermarking, Security, and Forensics, San Francisco, CA, Feb. 2015, pp. 94 090M-94 090M.<\/li>\n<li>X. Chu, Y. Chen, M. C. Stamm, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Chu_ICASSP_2014.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Information Theoretical Limit of Compression Forensics<\/a>,&#8221; IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, May 2014, pp. 2689-2693.<\/li>\n<li>M. C. Stamm, X. Chu, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_WIFS_201311.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Forensically Determining the Order of Signal Processing Operations<\/a>,&#8221; IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, Nov. 2013, pp. 162-167.<\/li>\n<li>M. C. Stamm and and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_ICASSP_2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Protection Against Reverse Engineering in Digital Cameras<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Vancouver, Canada, May 2013. [Invited for Special Session on Adversarial Signal Processing]<\/li>\n<li>X. Chu, M. C. Stamm, and and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Chu_ICASSP_2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Concealability-Rate-Distortion Tradeoff in Image Compression Anti-Forensics<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Vancouver, Canada, May 2013.<\/li>\n<li>Z.-H. Wu, M. C. Stamm, and and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Wu_ICASSP2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Anti-Forensics of Median Filtering<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Vancouver, Canada, May 2013.<\/li>\n<li>X. Kang, M. C. Stamm, A. Peng, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Kang_APSIPA_2012.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust Median Filtering Forensics Based on the Autoregressive Model of Median Filtered Residual<\/a>,&#8221; Proc. APSIPA Annual Summit and Conference, Hollywood, California, pp. 1-9, December 2012.<\/li>\n<li>X. Chu, M. C. Stamm, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Chu_ICIP_2012.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Forensic Identification of Compressive Sensing in Nearly Sparse Signals<\/a>,&#8221; IEEE International Conference on Image Processing (ICIP), Orlando, Florida, pp. 257-260, October 2012.<\/li>\n<li>M. C. Stamm, W. S. Lin, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_ICASSP_2012.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Forensics vs. Anti-Forensics: A Decision And Game Theoretic Framework<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Kyoto, Japan, March 2012, pp. 1749 &#8211; 1752.<\/li>\n<li>X. Chu, M. C. Stamm, W. S. Lin, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Chu_ICASSP_2012.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Forensic Identification of Compressively Sensed Images<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Kyoto, Japan, March 2012, pp. 1837 &#8211; 1840.<\/li>\n<li>M. C. Stamm and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_Icassp2011.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Anti-Forensics for Frame Deletion\/Addition in MPEG Video<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Prague, Czech Republic, May 2011, pp. 1876 &#8211; 1879.<\/li>\n<li>M. C. Stamm and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_ICIP_201009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Wavelet-Based Image Compression Anti-Forensics<\/a>,&#8221; IEEE International Conference on Image Processing (ICIP), Hong Kong, China, September 2010, pp. 1737 &#8211; 1740.<\/li>\n<li>M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_ICIP_2_201009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Undetectable Image Tampering Through JPEG Compression Anti-Forensics<\/a>,&#8221; IEEE International Conference on Image Processing (ICIP), Hong Kong, China, September 2010, pp. 2109 &#8211; 2112.<\/li>\n<li>M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_ICASSP_201003.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Anti-Forensics of JPEG Compression<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Dallas, March 2010, pp. 1694 &#8211; 1697.<\/li>\n<li>M. C. Stamm and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_ICASSP2_201003.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Forensic Estimation and Reconstruction of a Contrast Enhancement Mapping<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Dallas, March 2010, pp. 1698 &#8211; 1701.<\/li>\n<li>S. K. Tjoa, M. C. Stamm, W. S. Lin, and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Tjoa_ICASSP_201003.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Harmonic Variable-Size Dictionary Learning for Music Source Separation<\/a>,&#8221; IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP), Dallas, Mar. 2010, pp. 413 &#8211; 416.<\/li>\n<li>M. C. Stamm and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_APSIPA_200910.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Forensic Detection of Image Tampering Using Intrinsic Statistical Fingerprints in Histograms<\/a>,&#8221; Proc. APSIPA Annual Summit and Conference, Sapporo, Japan, October 2009.<\/li>\n<li>M. C. Stamm and K. J. R. Liu, &#8220;Anti-Forensic Signal Processing,&#8221; Proc. ARO Workshop on Digital Forensics, Arlington, VA, September 2009.<\/li>\n<li>M. Stamm and K. J. R. Liu, &#8220;<a href=\"http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2017\/07\/Stamm_ICIP08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Blind Forensics of Contrast Enhancement in Digital Images<\/a>,&#8221; IEEE Int. Conf. Image Processing (ICIP), San Diego, USA, October 2008, pp. 3112 &#8211; 3115.<\/li>\n<\/ol>\n<p><!-- [tplist style=std] --><\/p>\n<p><!-- [bibtex file=http:\/\/research.coe.drexel.edu\/ece\/misl\/wp-content\/uploads\/2016\/10\/OMBib.bib group=year format=ieee key_format=cite] ---><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Publications O. Mayer, M. C. Stamm, &#8220;Exposing Fake Images with Forensic Similarity Graphs,&#8221; under review, 2020. (Website) C. Chen, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-141","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/research.coe.drexel.edu\/ece\/misl\/wp-json\/wp\/v2\/pages\/141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.coe.drexel.edu\/ece\/misl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.coe.drexel.edu\/ece\/misl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.coe.drexel.edu\/ece\/misl\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/research.coe.drexel.edu\/ece\/misl\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":75,"href":"https:\/\/research.coe.drexel.edu\/ece\/misl\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":2896,"href":"https:\/\/research.coe.drexel.edu\/ece\/misl\/wp-json\/wp\/v2\/pages\/141\/revisions\/2896"}],"wp:attachment":[{"href":"https:\/\/research.coe.drexel.edu\/ece\/misl\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}