JPEG

Known as: JPG, JPEG Interchange Format, JPEG file format 
JPEG (/ˈdʒeɪpɛɡ/ JAY-peg) is a commonly used method of lossy compression for digital images, particularly for those images produced by digital… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
It is often desirable to determine if an image has been modified in any way from its original recording. The JPEG format affords… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The widespread availability of photo editing software has made it easy to create visually convincing digital image forgeries. To… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
  • Hany Farid
  • IEEE Transactions on Information Forensics and…
  • 2009
When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person's head… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table I
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Blind steganalysis based on classifying feature vectors derived from images is becoming increasingly more powerful. For… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We routinely encounter digital color images that were previously compressed using the Joint Photographic Experts Group (JPEG… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper, a new steganalysis scheme is presented to effectively detect the advanced JPEG steganography. For this purpose, we… (More)
  • figure 1
  • table 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Human observers can easily assess the quality of a distorted image without examining the original image as a reference. By… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Image authentication veri es the originality of an image by detecting malicious manipulations. This goal is di erent from that of… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
2001
Highly Cited
2001
* Correspondence: Email: fridrich@binghamton.edu; WWW: http://www.ssie.binghamton.edu/fridrich; Telephone: 607 777 2577; Fax: 607… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?