Amruthnath, N (2020). Benford’s Law: Applying to Existing Data. Posted on Rbloggers.com, last accessed August 29, 2020.





Barbancho, I, Tardón, LJ, Barbancho, AM and Sbert, M (2016). Benford's Law for Music Analysis. Proceedings of the 16th ISMIR Conference, Malaga, Spain, pp. 735741.





Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062.





Bonettini, N, Bestagini, P, Milani, S and Tubaro, S (2020). On the use of Benford's law to detect GANgenerated images. Preprint arXiv:arXiv:2004.07682 [cs.CV]; last accessed April 21, 2020.





den Heijer, E and Eiben, AE (2014). Investigating aesthetic measures for unsupervised evolutionary art. Swarm and Evolutionary Computation, Vol. 16, pp. 52–68. DOI:10.1016/j.swevo.2014.01.002.





Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28  February 1, 2007, pp. 65051L65051L11. DOI:10.1117/12.704723.





Giles, DE (2013). Exact Asymptotic GoodnessofFit Testing for Discrete Circular Data, With Applications. Chilean Journal of Statistics 4(1), pp.1934. ISSN/ISBN:07187912.





Grabowski, F and Trojanowski, P (2006). Benford's law in image analysis. Proceedings of the 1st Conference on Tools of Information Technology, Rzeszów, Poland, 15 September 2006, pp. 7278.





Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261.





Iorliam, A, Ho, ATS, Waller, A and Zhao, X (2017). Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images. In: Shi Y., Kim H., PerezGonzalez F., Liu F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham, pp. 88105. DOI:10.1007/9783319534657_7.





Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017.





Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171.





Mainusch, NM (2020). On Benford's law  Computing a Bayes factor with the SavageDickey method to quantify conformance of numerical data to Benford's law. Bachelor's Thesis, University of Osnabrueck, Institute of Cognitive Science, Germany.





Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:9780691147611.





Moin, SS and Islam, S (2017). Benford's law for detecting contrast enhancement. Proceedings of 2017 Fourth International Conference on Image Information Processing (ICIIP), Dec 2123, pp. 14. DOI:10.1109/ICIIP.2017.8313717.





PerezGonzalez, F, Heileman, GL and Abdallah, CT (2007). Benford's Law in Image Processing. Image Processing, pp I405  I408. ICIP 2007. IEEE International Conference. ISSN/ISBN:15224880. DOI:10.1109/ICIP.2007.4378977.





Pinchas, M (2016). Inspection of the Output of a Convolution and Deconvolution Process from the Leading Digit Point of View—Benford’s Law. Journal of Signal and Information Processing 7, pp. 227251. DOI:10.4236/jsip.2016.74020.





Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the
Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 77230J10. DOI:10.1117/12.855085.





Qadir, G, Zhao, X, Ho, ATS and Casey, M (2011). Image forensic of glare feature for improving image retrieval using Benford's Law. Proceedings of 2011 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 26612664. ISSN/ISBN:02714302. DOI:10.1109/ISCAS.2011.5938152.





Sahu, SK, Java, A and Shaikh, A (2021). On The Connection of Benford’s Law and Neural Networks. Preprint arXiv:2102.03313 [cs.LG]; last accessed February 21, 2021.





Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242246. DOI:10.1109/ASPCON49795.2020.9276660.





Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 AsiaPacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864872. DOI:10.1109/APSIPA.2017.8282154.





Tariq, J and Ijaz, A (2020). HEVC Intra Mode Selection Using Benford’s Law. Circuits, Systems, and Signal Processing. DOI:10.1007/s0003402001482y.





Tong, SF, Zhang, Z, Xie, Y and Wu, X (2013). Image Splicing Detection Based on Statistical Properties of Benford Model. Proceedings of the 2nd
International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 07920795. ISSN/ISBN:9789078677611. DOI:10.2991/iccsee.2013.200.





Wang, J, Cha, BH, Cho, SH and Kuo, CCJ (2009). Understanding Benford’s Law and its Vulnerability in Image Forensics. IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1568  1571. ISSN/ISBN:19457871. DOI:10.1109/ICME.2009.5202811.





Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95100. DOI:10.1007/s1176701104743.





Zaharis, A, Martini, A, Tryfonas, T, Ilioudis, C and Pangalos, G (2011). Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis. nternational Journal of Digital Crime and Forensics 3(4), pp. 2941. DOI:10.4018/jdcf.2011100103.




