{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:58:17Z","timestamp":1775296697614,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030051709","type":"print"},{"value":"9783030051716","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_17","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"318-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Re\u2013compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency"],"prefix":"10.1007","author":[{"given":"Jamimamul","family":"Bakas","sequence":"first","affiliation":[]},{"given":"Praneta","family":"Rawat","sequence":"additional","affiliation":[]},{"given":"Kalyan","family":"Kokkalla","sequence":"additional","affiliation":[]},{"given":"Ruchira","family":"Naskar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"17_CR1","unstructured":"Conotter, V.: Active and passive multimedia forensics. Ph.D. thesis, University of Trento (2011)"},{"key":"17_CR2","volume-title":"JPEG: Still Image Data Compression Standard","author":"WB Pennebaker","year":"1992","unstructured":"Pennebaker, W.B., Mitchell, J.L.: JPEG: Still Image Data Compression Standard. Springer, Berlin (1992)"},{"issue":"3","key":"17_CR3","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226\u2013245 (2013)","journal-title":"Digit. Investig."},{"issue":"10","key":"17_CR4","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1109\/TIFS.2014.2345479","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang, W., Dong, J., Tan, T.: Exploring DCT coefficient quantization effects for local tampering detection. IEEE Trans. Inf. Forensics Secur. 9(10), 1653\u20131666 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 159\u2013164. ACM (2017)","DOI":"10.1145\/3082031.3083247"},{"key":"17_CR6","doi-asserted-by":"publisher","unstructured":"Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136, December 2016. https:\/\/doi.org\/10.1109\/WIFS.2016.7823911","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Bianchi, T., De Rosa, A., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2444\u20132447. IEEE (2011)","DOI":"10.1109\/ICASSP.2011.5946978"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Lin, Z., Wang, R., Tang, X., Shum, H.Y.: Detecting doctored images using camera response normality and consistency. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 1087\u20131092. IEEE (2005)","DOI":"10.1109\/CVPR.2005.125"},{"key":"17_CR9","unstructured":"Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technology report TR2004-515, Department Computer Science, Dartmouth College (2004)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: Electronic Imaging 2006, p. 60720Y. International Society for Optics and Photonics (2006)","DOI":"10.1117\/12.640109"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, W.: A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 65051L. International Society for Optics and Photonics (2007)","DOI":"10.1117\/12.704723"},{"key":"17_CR12","unstructured":"Li, W., Yuan, Y., Yu, N.: Detecting copy-paste forgery of JPEG image via block artifact grid extraction. In: International Workshop on Local and Non-Local Approximation in Image Processing, pp. 1\u20136 (2008)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Mahdian, B., Saic, S.: Detecting double compressed JPEG images. In: 3rd International Conference on Crime Detection and Prevention (ICDP 2009), pp. 1\u20136. IET (2009)","DOI":"10.1049\/ic.2009.0240"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-3-319-13841-1_25","volume-title":"Information Systems Security","author":"P Malviya","year":"2014","unstructured":"Malviya, P., Naskar, R.: Digital forensic technique for double compression based JPEG image forgery detection. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 437\u2013447. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13841-1_25"},{"key":"17_CR15","unstructured":"Fridrich, A.J., Soukal, B.D., Luk\u00e1\u0161, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop. Citeseer (2003)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Gopi, E., Lakshmanan, N., Gokul, T., KumaraGanesh, S., et al.: Digital image forgery detection using artificial neural network and auto regressive coefficients. In: Canadian Conference on Electrical and Computer Engineering, (CCECE 2006), pp. 194\u2013197. IEEE (2006)","DOI":"10.1109\/CCECE.2006.277398"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5\u201310. ACM (2016)","DOI":"10.1145\/2909827.2930786"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"Barni, M., et al.: Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49, 153\u2013163 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Schaefer, G., Stich, M.: UCID: an uncompressed color image database. In: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472\u2013481. International Society for Optics and Photonics (2003)","DOI":"10.1117\/12.525375"},{"key":"17_CR20","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105 (2012)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:20:11Z","timestamp":1775294411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}