1. Cellphone popcorn viral videos (2008). Avaliable on: ., [
http://www.wired.com/underwire/2008/06/cellphones-cant/
] Cellphone popcorn viral videos (2008). Avaliable on: .
2. Iran ‘Modifies’ pictures of missile test (2008). Avaliable on: ., [
http://www.switched.com/2008/07/11/iran-photoshops-pictures-of-missile-test/
] Iran ‘Modifies’ pictures of missile test (2008). Avaliable on: .
3. Farid H: A survey of image forgery detection. IEEE Signal Process. Mag 2009, 2(26):16–25. 10.1109/MSP.2008.931079
4. Gupta S, Cho S, Kuo CC: Current developments and future trends in audio authentication. IEEE Multimedia 2012, 19: 50–59. 10.1109/MMUL.2011.74
5. C Grigoras, A Cooper, M Michalek, in European Network of Forensic Science Institutes. Forensic speech and audio analysis working group - best practice guidelines for ENF analysis in forensic authentication of digital evidence, (2009).
http://www.cs.dartmouth.edu/~farid/dfd/index.php/publications/show/103
]