{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:03:10Z","timestamp":1746504190142,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12568-8_37","type":"book-chapter","created":{"date-parts":[[2014,10,23]],"date-time":"2014-10-23T21:38:58Z","timestamp":1414100338000},"page":"302-310","source":"Crossref","is-referenced-by-count":1,"title":["A Multiscale and Multi-Perturbation Blind Forensic Technique for Median Detecting"],"prefix":"10.1007","author":[{"given":"Anselmo","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Anderson","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-540-30114-1_10","volume-title":"Information Hiding","author":"A.C. Popescu","year":"2004","unstructured":"Popescu, A.C., Farid, H.: Statistical tools for digital forensics. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 128\u2013147. Springer, Heidelberg (2004)"},{"key":"37_CR2","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TIFS.2008.2008214","volume":"3","author":"M. Kirchner","year":"2008","unstructured":"Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. on Inf. For. and Sec.\u00a03, 582\u2013592 (2008)","journal-title":"IEEE Trans. on Inf. For. and Sec."},{"key":"37_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-540-77370-2_21","volume-title":"Information Hiding","author":"M.K. Johnson","year":"2008","unstructured":"Johnson, M.K., Farid, H.: Exposing digital forgeries through specular highlights on the eye. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 311\u2013325. Springer, Heidelberg (2008)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Saboia, P., Carvalho, T., Rocha, A.: Eye specular highlights telltales for digital forensics: a machine learning approach. In: Intl. Conference on Image Processing, pp. 1977\u20131980 (2011)","DOI":"10.1109\/ICIP.2011.6115850"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. In SPIE Media Forensics and Security II, pp. 754110-754110-12 (2010).","DOI":"10.1117\/12.839100"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Cao, G., Zhao, Y., Ni, R., Yu, L., Tian, H.: Forensic detection of median filtering in digital images. In: IEEE Intl. Conference on Multimedia & Expo, pp. 89\u201394 (2010)","DOI":"10.1109\/ICME.2010.5583869"},{"key":"37_CR7","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"H.D. Yuan","year":"2011","unstructured":"Yuan, H.D.: Blind forensics of median filtering in digital images. IEEE Trans. on Infor. For. and Sec.\u00a06, 1335\u20131345 (2011)","journal-title":"IEEE Trans. on Infor. For. and Sec."},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-32205-1_29","volume-title":"Digital Forensics and Watermarking","author":"C. Chen","year":"2012","unstructured":"Chen, C., Ni, J.: Median filtering detection using edge based prediction matrix. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol.\u00a07128, pp. 361\u2013375. Springer, Heidelberg (2012)"},{"key":"37_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-36373-3_1","volume-title":"Information Hiding","author":"C. Chen","year":"2013","unstructured":"Chen, C., Ni, J., Huang, R., Huang, J.: Blind median filtering detection using statistics in difference domain. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol.\u00a07692, pp. 1\u201315. Springer, Heidelberg (2013)"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"4699","DOI":"10.1109\/TIP.2013.2277814","volume":"22","author":"C. Chen","year":"2013","unstructured":"Chen, C., Ni, J., Huang, J.: Blind detection of median filtering in digital images: A difference domain based approach. IEEE Trans. on Im. Proc.\u00a022, 4699\u20134710 (2013)","journal-title":"IEEE Trans. on Im. Proc."},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X. Kang","year":"2013","unstructured":"Kang, X., Stamm, M., Peng, A., Liu, K.: Robust median filtering forensics using an autoregressive model. IEEE Trans. on Infor. For. and Sec.\u00a08, 1456\u20131468 (2013)","journal-title":"IEEE Trans. on Infor. For. and Sec."},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Kang, X., Stamm, M., Peng, A., Liu, K.: Robust median filtering forensics based on the autoregressive model of median filtered residual. In: IEEE Signal Information Processing Association Annual Summit and Conference, pp. 1\u20139 (2012)","DOI":"10.1109\/TIFS.2013.2273394"},{"key":"37_CR13","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/TASSP.1987.1165153","volume":"35","author":"A. Bovik","year":"1987","unstructured":"Bovik, A.: Streaking in median filtered images. IEEE Trans. on Acous. Sp. and Sig. Proc.\u00a035, 493\u2013503 (1987)","journal-title":"IEEE Trans. on Acous. Sp. and Sig. Proc."},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Thung, K., Raveendran, P.: A survey of image quality measures. In: IEEE Intl. Conference for Technical Postgraduates, pp. 1\u20134 (2009)","DOI":"10.1109\/TECHPOS.2009.5412098"},{"key":"37_CR15","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1109\/26.477498","volume":"43","author":"A. Eskicioglu","year":"1995","unstructured":"Eskicioglu, A., Fisher, P.: Image quality measures and their performance. IEEE Trans. on Comm.\u00a043, 2959\u20132965 (1995)","journal-title":"IEEE Trans. on Comm."},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Wang, Z., Bovik, A., Sheikh, H.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. on Im. Proc.\u00a013, 600\u2013612 (2004)","journal-title":"IEEE Trans. on Im. Proc."},{"key":"37_CR17","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.cviu.2009.10.002","volume":"114","author":"A. Rocha","year":"2010","unstructured":"Rocha, A., Goldenstein, S.: Progressive randomization: Seeing the unseen. Elsevier Comput. Vis. and Im. Underst.\u00a0114, 349\u2013362 (2010)","journal-title":"Elsevier Comput. Vis. and Im. Underst."},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.: A classifier design for detecting image manipulations. In: IEEE Intl. Conference on Image Processing, pp. 2645\u20132648 (2004)","DOI":"10.1109\/ICIP.2004.1421647"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Avcibas, I., Memon, N., Sankur, B.: Steganalysis based on image quality metrics. In: IEEE Workshop on Multimedia and Signal Processing, pp. 517\u2013522 (2001)","DOI":"10.1109\/MMSP.2001.962785"},{"key":"37_CR20","unstructured":"Casia tampered image detection database, http:\/\/forensics.idealtest.org\/"},{"key":"37_CR21","unstructured":"Schaefer, G., Stich, M.: Ucid - an uncompressed colour image database. In: Storage and Retrieval Methods and Applications for Multimedia, pp. 472\u2013480 (2004)"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Chang, C., Lin, C.: LIBSVM: A library for support vector machines. ACM Trans. on Intell. Syst. and Tech.\u00a02, 27:1-27:27 (2011), http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm","DOI":"10.1145\/1961189.1961199"},{"key":"37_CR23","unstructured":"Fontani, M., Barni, M.: Hiding traces of median filtering in digital images. In: European Signal Processing Conference, pp. 1239\u20131243 (2012)"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12568-8_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T12:11:00Z","timestamp":1746447060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12568-8_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12568-8_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}