{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:54:26Z","timestamp":1742954066023,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031780486"},{"type":"electronic","value":"9783031780493"}],"license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78049-3_12","type":"book-chapter","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:02:56Z","timestamp":1732683776000},"page":"115-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of Benford\u2019s Law to the Identification of Non-authentic Digital Images"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6706-6547","authenticated-orcid":false,"given":"Jaroslaw","family":"Kobiela","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7131-4443","authenticated-orcid":false,"given":"Piotr","family":"Dzierwa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Guera, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Auckland, New Zealand, pp. 1\u20136. IEEE (2018). https:\/\/doi.org\/10.1109\/AVSS.2018.8639163","DOI":"10.1109\/AVSS.2018.8639163"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1186\/s41235-017-0067-2","volume":"2","author":"SJ Nightingale","year":"2017","unstructured":"Nightingale, S.J., Wade, K.A., Watson, D.G.: Can people identify original and manipulated photos of real-world scenes? Cogn. Res. 2(1), 30 (2017). https:\/\/doi.org\/10.1186\/s41235-017-0067-2","journal-title":"Cogn. Res."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: a survey of face manipulation and fake detection. Inf. Fusion 64, 131\u2013148 (2020). https:\/\/doi.org\/10.1016\/j.inffus.2020.06.014","journal-title":"Inf. Fusion"},{"key":"12_CR4","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of GANs for improved quality, stability, and variation. arXiv http:\/\/arxiv.org\/abs\/1710.10196 (2018). Accessed 09 Feb 2024"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Vaccari, C., Chadwick, A.: Deepfakes and disinformation: exploring the impact of synthetic political video on deception, uncertainty, and trust in news. Soc. Media + Soc. 6(1), 205630512090340 (2020). https:\/\/doi.org\/10.1177\/2056305120903408","DOI":"10.1177\/2056305120903408"},{"issue":"5","key":"12_CR6","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva, L.: Media forensics and DeepFakes: an overview. IEEE J. Sel. Top. Signal Process. 14(5), 910\u2013932 (2020). https:\/\/doi.org\/10.1109\/JSTSP.2020.3002101","journal-title":"IEEE J. Sel. Top. Signal Process."},{"issue":"2","key":"12_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid, H.: Image forgery detection. IEEE Signal Process. Mag. 26(2), 16\u201325 (2009). https:\/\/doi.org\/10.1109\/MSP.2008.931079","journal-title":"IEEE Signal Process. Mag."},{"key":"12_CR8","volume-title":"The Digital Darkroom: The Definitive Guide to Photo Editing","author":"J Abbott","year":"2021","unstructured":"Abbott, J.: The Digital Darkroom: The Definitive Guide to Photo Editing. Ilex Press, Lewes (2021)"},{"issue":"4","key":"12_CR9","doi-asserted-by":"publisher","first-page":"934","DOI":"10.3390\/stats5040054","volume":"5","author":"R De Kok","year":"2022","unstructured":"De Kok, R., Rotundo, G.: Benford networks. Stats 5(4), 934\u2013947 (2022). https:\/\/doi.org\/10.3390\/stats5040054","journal-title":"Stats"},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"841","DOI":"10.3390\/stats5030049","volume":"5","author":"KM Anderson","year":"2022","unstructured":"Anderson, K.M., Dayaratna, K., Gonshorowski, D., Miller, S.J.: A new benford test for clustered data with applications to American elections. Stats 5(3), 841\u2013855 (2022). https:\/\/doi.org\/10.3390\/stats5030049","journal-title":"Stats"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Singh, N., Bansal, R.: Analysis of Benford\u2019s law in digital image forensics. In: 2015 International Conference on Signal Processing and Communication, ICSC 2015, pp. 413\u2013418 (2015). https:\/\/doi.org\/10.1109\/ICSPCom.2015.7150688","DOI":"10.1109\/ICSPCom.2015.7150688"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"P\u00f3th, M., Trpovski, \u017d.: Analysis of JPEG digital image compression process. J. Appl. Tech. Educ. Sci. 9(4) (2019). ISSN: 2560-5429. https:\/\/doi.org\/10.24368\/JATES.V9I4.119","DOI":"10.24368\/JATES.V9I4.119"},{"issue":"04","key":"12_CR13","doi-asserted-by":"publisher","first-page":"626","DOI":"10.5829\/IJE.2022.35.04A.02","volume":"35","author":"A Parnak","year":"2022","unstructured":"Parnak, A., Baleghi Damavandi, Y., Kazemitabar, S.J.: A novel image splicing detection algorithm based on generalized and traditional Benford\u2019s law. IJE 35(04), 626\u2013634 (2022). https:\/\/doi.org\/10.5829\/IJE.2022.35.04A.02","journal-title":"IJE"},{"issue":"19","key":"12_CR14","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.3390\/electronics10192378","volume":"10","author":"D Varga","year":"2021","unstructured":"Varga, D.: Analysis of Benford\u2019s law for no-reference quality assessment of natural, screen-content, and synthetic images. Electronics 10(19), 2378 (2021). https:\/\/doi.org\/10.3390\/electronics10192378","journal-title":"Electronics"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"103818","DOI":"10.1016\/j.jvcir.2023.103818","volume":"93","author":"JG Zago","year":"2022","unstructured":"Zago, J.G., Antonelo, E.A., Baldissera, F.L., Saad, R.T.: Benford\u2019s law: what does it say on adversarial images? J. Vis. Commun. Image Represent. 93, 103818 (2022)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Bonettini, N., Bestagini, P., Milani, S., Tubaro, S.: On the use of Benford\u2019s law to detect GAN-generated images. In: 2020 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, pp. 5495\u20135502. IEEE (2021). https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412944","DOI":"10.1109\/ICPR48806.2021.9412944"},{"key":"12_CR17","unstructured":"Kazemitabar, J.: Double-crossing Benford\u2019s law. arXiv http:\/\/arxiv.org\/abs\/2105.09812 (2021). Accessed 06 Feb 2024"},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Satapathy, G., Bhattacharya, G., Puhan, N.B., Ho, A.T.S.: Generalized Benford\u2019s law for fake fingerprint detection. In: 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, India, pp. 242\u2013246. IEEE (2020). https:\/\/doi.org\/10.1109\/ASPCON49795.2020.9276660","DOI":"10.1109\/ASPCON49795.2020.9276660"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Fu,D., Shi, Y.Q., Su, W.: A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. Presented at the Electronic Imaging 2007, San Jose, CA, United States, p. 65051L (2007). https:\/\/doi.org\/10.1117\/12.704723","DOI":"10.1117\/12.704723"},{"key":"12_CR20","doi-asserted-by":"publisher","unstructured":"Perez-Gonzalez, F., Heileman, G.L., Abdallah, C.T.: Benford\u2019s lawin image processing. In: 2007 IEEE International Conference on Image Processing, San Antonio, TX, USA, pp. I-405\u2013I-408. IEEE (2007). https:\/\/doi.org\/10.1109\/ICIP.2007.4378977","DOI":"10.1109\/ICIP.2007.4378977"},{"key":"12_CR21","doi-asserted-by":"publisher","unstructured":"Frick, R.A., Liu, H., Steinebach, M.: Detecting double compression and splicing using Benfords first digit law. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, Virtual Event Ireland, pp. 1\u20139. ACM (2020). https:\/\/doi.org\/10.1145\/3407023.3409200","DOI":"10.1145\/3407023.3409200"},{"key":"12_CR22","unstructured":"Bodke, M., Mishra, D., Vasani, K., Janjua, J.: Analysis of Benford\u2019s law for image processing, vol. 9, no. 6, p. 7 (2021)"},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Iorliam, A., Orgem, E., Shehu, Y.I.: An investigation of Benford\u2019s law divergence and machine learning techniques for intra-class separability of fingerprint images. Gazi Univ. J. Sci. Part A: Eng. Innov. 9(3), 211\u2013224 (2022). https:\/\/doi.org\/10.54287\/gujsa.1077430","DOI":"10.54287\/gujsa.1077430"},{"key":"12_CR24","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-319-53465-7_7","volume-title":"Digital Forensics and Watermarking","author":"A Iorliam","year":"2017","unstructured":"Iorliam, A., Ho, A.T.S., Waller, A., Zhao, X.: Using Benford\u2019s law divergence and neural networks for classification and source identification of biometric images. In: Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 88\u2013105. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-53465-7_7"},{"issue":"4","key":"12_CR25","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1002\/jcaf.22440","volume":"31","author":"C Goh","year":"2020","unstructured":"Goh, C.: Applying visual analytics to fraud detection using Benford\u2019s law. J. Corp. Account. Finance 31(4), 202\u2013208 (2020). https:\/\/doi.org\/10.1002\/jcaf.22440","journal-title":"J. Corp. Account. Finance"},{"issue":"8","key":"12_CR26","doi-asserted-by":"publisher","first-page":"128","DOI":"10.3390\/jimaging7080128","volume":"7","author":"O Giudice","year":"2021","unstructured":"Giudice, O., Guarnera, L., Battiato, S.: Fighting deepfakes by detecting GAN DCT anomalies. J. Imaging 7(8), 128 (2021). https:\/\/doi.org\/10.3390\/jimaging7080128","journal-title":"J. Imaging"},{"issue":"1","key":"12_CR27","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TAFFC.2019.2946774","volume":"13","author":"P Werner","year":"2022","unstructured":"Werner, P., Lopez-Martinez, D., Walter, S., Al-Hamadi, A., Gruss, S., Picard, R.W.: Automatic recognition methods supporting pain assessment: a survey. IEEE Trans. Affect. Comput. 13(1), 530\u2013552 (2022). https:\/\/doi.org\/10.1109\/TAFFC.2019.2946774","journal-title":"IEEE Trans. Affect. Comput."},{"key":"12_CR28","doi-asserted-by":"publisher","unstructured":"Von Borries, G.F., Quadros, A.V.C.: ROC app: an application to understand ROC curves. Braz. J. Biom. 40(2) (2022). https:\/\/doi.org\/10.28951\/bjb.v40i2.566","DOI":"10.28951\/bjb.v40i2.566"},{"key":"12_CR29","doi-asserted-by":"publisher","DOI":"10.4178\/epih.e2022088","volume":"44","author":"S Parodi","year":"2022","unstructured":"Parodi, S., Verda, D., Bagnasco, F., Muselli, M.: The clinical meaning of the area under a receiver operating characteristic curve for the evaluation of the performance of disease markers. Epidemiol. Health 44, e2022088 (2022). https:\/\/doi.org\/10.4178\/epih.e2022088","journal-title":"Epidemiol. Health"},{"issue":"8","key":"12_CR30","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.patrec.2009.09.011","volume":"31","author":"AK Jain","year":"2010","unstructured":"Jain, A.K.: Data clustering: 50 years beyond K-means. Pattern Recogn. Lett. 31(8), 651\u2013666 (2010). https:\/\/doi.org\/10.1016\/j.patrec.2009.09.011","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"12_CR31","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.eswa.2012.07.021","volume":"40","author":"ME Celebi","year":"2013","unstructured":"Celebi, M.E., Kingravi, H.A., Vela, P.A.: A comparative study of efficient initialization methods for the k-means clustering algorithm. Expert Syst. Appl. 40(1), 200\u2013210 (2013). https:\/\/doi.org\/10.1016\/j.eswa.2012.07.021","journal-title":"Expert Syst. Appl."},{"key":"12_CR32","unstructured":"Sharpe, D.: Your chi-square test is statistically significant: now what? 20(8) (2015)"},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-03243-2_649-1","volume-title":"Computer Vision","author":"T Kurita","year":"2020","unstructured":"Kurita, T.: Principal Component Analysis (PCA). In: Kurita, T. (ed.) Computer Vision, pp. 1\u20134. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-03243-2_649-1"}],"container-title":["Lecture Notes in Computer Science","Advances in Mobile Computing and Multimedia Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78049-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:03:53Z","timestamp":1732683833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78049-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"ISBN":["9783031780486","9783031780493"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78049-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"28 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MoMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Mobile Computing and Multimedia Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"momm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iiwas.org\/conferences\/momm2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}