Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco).
This work is cited by the following items of the Benford Online Bibliography:
Note that this list may be incomplete, and is currently being updated. Please check again at a later date.
Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/9783030152109_3.





Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238.





Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240256. DOI:10.4236/jis.2017.83016.





Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242246. DOI:10.1109/ASPCON49795.2020.9276660.




