{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:52Z","timestamp":1740099172929,"version":"3.37.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000202"},{"type":"electronic","value":"9783030000219"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00021-9_23","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:21:11Z","timestamp":1537874471000},"page":"243-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multichannel Convolutional Neural Network Based Forensics-Aware Scheme for Cyber-Physical-Social Systems"],"prefix":"10.1007","author":[{"given":"Bin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xianyi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Bappy, J.H., Roychowdhury, A.K., Bunk, J., et al.: Exploiting spatial structure for localizing manipulated image regions. In: IEEE International Conference on Computer Vision, pp. 4980\u20134989. IEEE Computer Society (2017)","DOI":"10.1109\/ICCV.2017.532"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 5\u201310. ACM (2016)","DOI":"10.1145\/3082031.3083249"},{"issue":"3","key":"23_CR3","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.patrec.2013.09.028","volume":"36","author":"SJ Ryu","year":"2014","unstructured":"Ryu, S.J., Lee, H.K.: Estimation of linear transformation by analyzing the periodicity of interpolation. Pattern Recogn. Lett. 36(3), 89\u201399 (2014)","journal-title":"Pattern Recogn. Lett."},{"issue":"5","key":"23_CR4","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(5), 758\u2013767 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: ACM Workshop on Multimedia and Security, pp. 11\u201320. ACM (2008)","DOI":"10.1145\/1411328.1411333"},{"issue":"4","key":"23_CR6","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"HD Yuan","year":"2011","unstructured":"Yuan, H.D.: Blind forensics of median filtering in digital images. IEEE Trans. Inf. Forensics Secur. 6(4), 1335\u20131345 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Liu, A., Zhao, Z., Zhang, C., Su, Y.: Smooth filtering identification based on convolutional neural networks. Multimed. Tools Appl. 1\u201315 (2016)","DOI":"10.1007\/s11042-016-4251-z"},{"issue":"5","key":"23_CR8","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X Kang","year":"2013","unstructured":"Kang, X., Stamm, M.C., Peng, A., Liu, K.J.R.: Robust median filtering forensics using an autoregressive model. IEEE Trans. Inf. Forensics Secur. 8(5), 1456\u20131468 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"23_CR9","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Signal Process. Lett. 22(3), 1849\u20131853 (2015)","journal-title":"IEEE Signal Process. Lett."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Xu, J., Ling, Y., Zheng, X.: Forensic detection of Gaussian low-pass filtering in digital images. In: 2015 8th International Congress on Image and Signal Processing (CISP), pp. 819\u2013823 (2015)","DOI":"10.1109\/CISP.2015.7407990"},{"issue":"11","key":"23_CR11","doi-asserted-by":"publisher","first-page":"2647","DOI":"10.1016\/j.mcm.2011.06.026","volume":"57","author":"G Liu","year":"2013","unstructured":"Liu, G., Wang, J., Lian, S., Dai, Y.: Detect image splicing with artificial blurred boundary. Math. Comput. Model. 57(11), 2647\u20132659 (2013)","journal-title":"Math. Comput. Model."},{"issue":"3","key":"23_CR12","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","volume":"23","author":"B Mahdian","year":"2008","unstructured":"Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 23(3), 529\u2013538 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR13","volume-title":"Network In Network","author":"M Lin","year":"2013","unstructured":"Lin, M., Chen, Q., Yan, S.: Network In Network. Computer Science, Pittsburgh (2013)"},{"key":"23_CR14","volume-title":"Gradient Based Learning Applied to Document Recognition","author":"S Haykin","year":"2009","unstructured":"Haykin, S., Kosko, B.: Gradient Based Learning Applied to Document Recognition. Wiley-IEEE Press, New York (2009)"},{"issue":"2","key":"23_CR15","first-page":"417","volume":"18","author":"B Yang","year":"2017","unstructured":"Yang, B., Qiu, X., Hu, W., Guo, H., Song, C.: Exposing copy-move forgery based on improved SIFT descriptor. J. Internet Technol. 18(2), 417\u2013425 (2017)","journal-title":"J. Internet Technol."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Yang, B., Sun, X., Cao, E., Hu, W., Chen, X.: Convolutional neural network for smooth filtering detection. IET Image Process. (2018)","DOI":"10.1049\/iet-ipr.2017.0683"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00021-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:59:17Z","timestamp":1571936357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00021-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000202","9783030000219"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00021-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}