{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:00:34Z","timestamp":1763665234187,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031377419"},{"type":"electronic","value":"9783031377426"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37742-6_23","type":"book-chapter","created":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T06:02:51Z","timestamp":1690869771000},"page":"281-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Comprint: Image Forgery Detection and\u00a0Localization Using Compression Fingerprints"],"prefix":"10.1007","author":[{"given":"Hannes","family":"Mareen","sequence":"first","affiliation":[]},{"given":"Dante","family":"Vanden Bussche","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Guillaro","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Cozzolino","sequence":"additional","affiliation":[]},{"given":"Glenn","family":"Van Wallendael","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Lambert","sequence":"additional","affiliation":[]},{"given":"Luisa","family":"Verdoliva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,2]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"Barni, M., et al.: Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Comun. Image Represent. 49, 153\u2013163 (2017)","journal-title":"J. Vis. Comun. Image Represent."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Bi, X., Wei, Y., Xiao, B., Li, W.: RRU-Net: the ringed residual U-Net for image splicing forgery detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 30\u201339 (2019)","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Bianchi, T., De Rosa, A., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2444\u20132447 (2011)","DOI":"10.1109\/ICASSP.2011.5946978"},{"issue":"3","key":"23_CR4","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi, T., Piva, A.: Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Forensics Secur. 7(3), 1003\u20131017 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","volume":"8","author":"TJ de Carvalho","year":"2013","unstructured":"de Carvalho, T.J., Riess, C., Angelopoulou, E., Pedrini, H., de Rezende Rocha, A.: Exposing digital image forgeries by illumination color classification. IEEE Trans. Inf. Forensics Secur. 8(7), 1182\u20131194 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Splicebuster: a new blind image splicing detector. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136 (2015)","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2020","unstructured":"Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN-based camera model fingerprint. IEEE Trans. Inf. Forensics Secur. 15, 144\u2013159 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Dang-Nguyen, D.T., Pasquini, C., Conotter, V., Boato, G.: RAISE: a raw images dataset for digital image forensics. In: 6th ACM Multimedia Systems Conference, pp. 219\u2013224 (2015)","DOI":"10.1145\/2713168.2713194"},{"issue":"4","key":"23_CR9","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TIFS.2013.2248727","volume":"8","author":"M Fontani","year":"2013","unstructured":"Fontani, M., Bianchi, T., De Rosa, A., Piva, A., Barni, M.: A framework for decision fusion in image forensics based on Dempster-Shafer theory of evidence. IEEE Trans. Inf. Forensics Secur. 8(4), 593\u2013607 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-030-58589-1_19","volume-title":"Computer Vision \u2013 ECCV 2020","author":"X Hu","year":"2020","unstructured":"Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: SPAN: spatial pyramid attention network for image manipulation localization. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12366, pp. 312\u2013328. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58589-1_19"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-030-01252-6_7","volume-title":"Computer Vision \u2013 ECCV 2018","author":"M Huh","year":"2018","unstructured":"Huh, M., Liu, A., Owens, A., Efros, A.A.: Fighting fake news: image splice detection via learned self-consistency. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11215, pp. 106\u2013124. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01252-6_7"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.jvcir.2018.05.011","volume":"54","author":"C Iakovidou","year":"2018","unstructured":"Iakovidou, C., Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. Vis. Commun. Image Represent. 54, 155\u2013170 (2018)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Lai, S., B\u00f6hme, R.: Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3028\u20133032 (2013)","DOI":"10.1109\/ICASSP.2013.6638214"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Le, T.N., Nguyen, H.H., Yamagishi, J., Echizen, I.: OpenForensics: large-scale challenging dataset for multi-face forgery detection and segmentation in-the-wild. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 10097\u201310107 (2021)","DOI":"10.1109\/ICCV48922.2021.00996"},{"issue":"9","key":"23_CR15","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1016\/j.sigpro.2009.03.025","volume":"89","author":"W Li","year":"2009","unstructured":"Li, W., Yuan, Y., Yu, N.: Passive detection of doctored JPEG image via block artifact grid extraction. Sig. Process. 89(9), 1821\u20131829 (2009)","journal-title":"Sig. Process."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Lin, X., Li, C.T.: Refining PRNU-based detection of image forgeries. In: 2016 Digital Media Industry Academic Forum (DMIAF), pp. 222\u2013226 (2016)","DOI":"10.1109\/DMIAF.2016.7574937"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TIFS.2019.2924552","volume":"15","author":"O Mayer","year":"2019","unstructured":"Mayer, O., Stamm, M.C.: Forensic similarity for digital images. IEEE Trans. Inf. Forensics Secur. 15, 1331\u20131346 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"23_CR18","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1109\/JSTSP.2020.3001516","volume":"14","author":"O Mayer","year":"2020","unstructured":"Mayer, O., Stamm, M.C.: Exposing fake images with forensic similarity graphs. IEEE J. Sel. Top. Sig. Process. 14(5), 1049\u20131064 (2020)","journal-title":"IEEE J. Sel. Top. Sig. Process."},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Novoz\u00e1msk\u00fd, A., Mahdian, B., Saic, S.: IMD2020: a large-scale annotated dataset tailored for detecting manipulated images. In: IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 71\u201380 (2020)","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1007\/978-3-030-01228-1_39","volume-title":"Computer Vision \u2013 ECCV 2018","author":"J Park","year":"2018","unstructured":"Park, J., Cho, D., Ahn, W., Lee, H.-K.: Double JPEG detection in mixed JPEG quality factors using deep convolutional neural network. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11209, pp. 656\u2013672. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01228-1_39"},{"issue":"2","key":"23_CR21","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niessner, M.: FaceForensics++: learning to detect manipulated facial images. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"issue":"5","key":"23_CR23","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva, L.: Media forensics and deepfakes: an overview. IEEE J. Sel. Top. Sig. Process. 14(5), 910\u2013932 (2020)","journal-title":"IEEE J. Sel. Top. Sig. Process."},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TIFS.2022.3144878","volume":"17","author":"H Wu","year":"2022","unstructured":"Wu, H., Zhou, J., Tian, J., Liu, J., Qiao, Y.: Robust image forgery detection against transmission over online social networks. IEEE Trans. Inf. Forensics Secur. 17, 443\u2013456 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Yang, C., Li, H., Lin, F., Jiang, B., Zhao, H.J.: Constrained R-CNN: a general image manipulation detection model. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2020)","DOI":"10.1109\/ICME46284.2020.9102825"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Ye, S., Sun, Q., Chang, E.C.: Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: IEEE International Conference on Multimedia and Expo, pp. 12\u201315 (2007)","DOI":"10.1109\/ICME.2007.4284574"},{"issue":"7","key":"23_CR28","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1109\/TIP.2017.2662206","volume":"26","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Zuo, W., Chen, Y., Meng, D., Zhang, L.: Beyond a Gaussian denoiser: residual learning of deep CNN for image denoising. IEEE Trans. Image Process. 26(7), 3142\u20133155 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Two-stream neural networks for tampered face detection. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1831\u20131839 (2017)","DOI":"10.1109\/CVPRW.2017.229"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37742-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T06:05:40Z","timestamp":1690869940000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37742-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031377419","9783031377426"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37742-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montr\u00e9al, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iapr.org\/icpr2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}