Browse and search a list of publications and products both published by NIJ and resulting from NIJ funding. This list includes reports submitted by grantees, NIJ reports and other publications, NIJ Journal issues and articles, products published by grantees, and articles appearing in peer review and other publications.
Exposing Image Tampering with the Same Quantization Matrix
Toward the Identification of Marijuana Varieties by Headspace Chemical Forensics
Improved Approaches With Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images
Development and Qualitative Evaluation of Steganalysis and Digital Forgery Systems
An improved approach to detecting content-aware scaling-based tampering in JPEG images
Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation
MP3 audio steganalysis
Detection of Double MPEG-2 Compression Based on Distributions of DCT Coefficients
Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery
Steganalysis of DCT-embedding based adaptive steganography and YASS
A Method to Detect JPEG-Based Double Compression
Research Forensic Library
We invite you to also search the Research Forensic Library, a curated collection of publicly-accessible material relating to every discipline of the forensic sciences.