{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T06:34:42Z","timestamp":1763620482924,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030113889"},{"type":"electronic","value":"9783030113896"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11389-6_1","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:51:03Z","timestamp":1548348663000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images"],"prefix":"10.1007","author":[{"given":"Jingyu","family":"Ye","sequence":"first","affiliation":[]},{"given":"Yuxi","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Guanshuo","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Piva, A.: An overview on image forensics. ISRN Sig. Process. 2013 (2013). Article ID 496701","DOI":"10.1155\/2013\/496701"},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1276377.1276390","volume":"26","author":"Shai Avidan","year":"2007","unstructured":"Avidan, S., Shamir, A.: Seam carving for content-aware image resizing. ACM Trans. Graphics, 26(3) (2007)","journal-title":"ACM Transactions on Graphics"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Sarkar, A., Nataraj, L., Manjunath, B.S.: Detection of seam carving and localization of seam insertions in digital images. In: Proceedings of 11th ACM Workshop on Multimedia and Security, MM&Sec 2009, New York, NY, USA, pp. 107\u2013116 (2009)","DOI":"10.1145\/1597817.1597837"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Fillion, C., Sharma, G.: Detecting content adaptive scaling of images for forensic applications. In: Media Forensics and Security, SPIE Proceedings, p. 75410. SPIE (2010)","DOI":"10.1117\/12.838647"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Lu, W., Wu, M.: Seam carving estimation using forensic hash. In: Proceedings of 13th ACM multimedia workshop on Multimedia and Security, MM&Sec 2011, New York, NY, USA, pp. 9\u201314 (2011)","DOI":"10.1145\/2037252.2037255"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Chang, W., Shih, T.K., Hsu, H.: Detection of seam carving in JPEG images. In: Proceedings of iCAST-UMEDIA (2013)","DOI":"10.1109\/ICAwST.2013.6765516"},{"issue":"12","key":"1_CR7","doi-asserted-by":"publisher","first-page":"2477","DOI":"10.1109\/TIFS.2015.2464776","volume":"10","author":"K Wattanachote","year":"2015","unstructured":"Wattanachote, K., Shih, T.K., Chang, W., Chang, H.: Tamper detection of JPEG image due to seam modification. IEEE Trans. Inf. Forensics Secur. 10(12), 2477\u20132491 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"1_CR8","first-page":"1","volume":"5","author":"Qingzhong Liu","year":"2014","unstructured":"Liu, Q., Chen, Z.: Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images. ACM Trans. Intell. Syst. Technol. 5(4) (2014)","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Q.: Exposing seam carving forgery under recompression attacks by hybrid large feature mining. In: 23rd International Conference on Pattern Recognition (ICPR), pp. 1036\u20131041 (2016)","DOI":"10.1109\/ICPR.2016.7899773"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.patcog.2016.12.010","volume":"65","author":"Q Liu","year":"2016","unstructured":"Liu, Q.: An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics. Patt. Recogn. 65, 35\u201346 (2016)","journal-title":"Patt. Recogn."},{"issue":"5","key":"1_CR11","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1587\/transinf.E97.D.1304","volume":"E97-D","author":"S Ryu","year":"2014","unstructured":"Ryu, S., Lee, H., Lee, H.: Detecting trace of seam carving for forensic analysis. IEICE Trans. Inf. Syst. E97-D(5), 1304\u20131311 (2014)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.patrec.2013.09.026","volume":"36","author":"J Wei","year":"2014","unstructured":"Wei, J., Lin, Y., Wu, Y.: A patch analysis method to detect seam carved images. Patt. Recogn. Lett. 36, 100\u2013106 (2014)","journal-title":"Patt. Recogn. Lett."},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.cose.2015.09.003","volume":"55","author":"T Yin","year":"2015","unstructured":"Yin, T., Yang, G., Li, L., Zhang, D., Sun, X.: Detecting seam carving based image resizing using local binary patterns. Comput. Secur. 55, 130\u2013141 (2015)","journal-title":"Comput. Secur."},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-319-53465-7_13","volume-title":"Digital Forensics and Watermarking","author":"Jingyu Ye","year":"2017","unstructured":"Ye, J., Shi, Y.Q.: A local derivative pattern based image forensic framework for seam carving detection. In: Proceedings of 15th International Workshop on Digital Watermarking, pp. 172\u2013184 (2016)"},{"key":"1_CR15","first-page":"13","volume":"35","author":"J Ye","year":"2017","unstructured":"Ye, J., Shi, Y.Q.: An effective method to detect seam carving. J. Inf. Secur. Appl. 35, 13\u201322 (2017)","journal-title":"J. Inf. Secur. Appl."},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-64185-0_7","volume-title":"Digital Forensics and Watermarking","author":"Jingyu Ye","year":"2017","unstructured":"Ye, J., Shi, Y.Q.: A hybrid feature model for seam carving detection. In: Proceedings of 16th International Workshop on Digital Watermarking, pp. 77\u201389 (2017)"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.jvcir.2017.07.006","volume":"48","author":"D Zhang","year":"2017","unstructured":"Zhang, D., Yin, T., Yang, G., Xia, M., Li, L., Sun, X.: Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies. J. Vis. Commun. Image Represent. 48, 281\u2013291 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"1_CR18","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.: ImageNet classification with deep convolutional neural networks. In: Proceedings of Advances in Neural Information Processing Systems, pp. 1106\u20131114 (2012)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 1\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115, 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis."},{"issue":"5","key":"1_CR21","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Wu, H., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Sig. Process. Lett."},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. (2012)","DOI":"10.1109\/ICASSP.2013.6638179"},{"key":"1_CR23","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift (2015)"},{"key":"1_CR24","unstructured":"Glorot, X., Bordes, A., Bengio, Y.: Deep sparse rectifier neural networks (2011)"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: \u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_5"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Jia, Y.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of ACM International Conference on Multimedia, pp. 675\u2013678 (2014)","DOI":"10.1145\/2647868.2654889"},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 1\u201327 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11389-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:52:33Z","timestamp":1709823153000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11389-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030113889","9783030113896"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11389-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}