{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:55:45Z","timestamp":1742954145763,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319138404"},{"type":"electronic","value":"9783319138411"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13841-1_25","type":"book-chapter","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T13:02:35Z","timestamp":1417611755000},"page":"437-447","source":"Crossref","is-referenced-by-count":4,"title":["Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection"],"prefix":"10.1007","author":[{"given":"Pankaj","family":"Malviya","sequence":"first","affiliation":[]},{"given":"Ruchira","family":"Naskar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Digital Image Forensics: There is More to a Picture than Meets the Eye","year":"2013","key":"25_CR1","unstructured":"Sencar, H.T., Memon, N. (eds.): Digital Image Forensics: There is More to a Picture than Meets the Eye. Springer, New York (2013)"},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"J. Redi","year":"2011","unstructured":"Redi, J., Taktak, W., Dugelay, J.L.: Digital Image Forensics: A Booklet for Beginners. Multimedia Tools and Applications\u00a051(1), 133\u2013162 (2011)","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"25_CR3","first-page":"30","volume":"34","author":"G. Wallace","year":"1991","unstructured":"Wallace, G.: The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics\u00a034(4), 30\u201344 (1991)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Sencar, H.T., Memon, N.: Overview of state-of-the-art in digital image forensics. Indian Statistical Institute Platinum Jubilee Monograph series titled Statistical Science and Interdisciplinary Research. World Scientific, Singapore (2008)","DOI":"10.1142\/9789812836243_0015"},{"key":"25_CR5","unstructured":"Wu, J., Kamath, M.V., Poehlman, S.: Detecting differences between photographs and computer generated images. In: Proceedings of the 24th IASTED International conference on Signal Processing, Pattern Recognition, and Applications, pp. 268\u2013273 (2006)"},{"issue":"6","key":"25_CR6","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/76.927424","volume":"11","author":"B.S. Manjunath","year":"2001","unstructured":"Manjunath, B.S., Ohm, J.R., Vasudevan, V.V., Yamada, A.: Color and Texture Descriptors. IEEE Trans. Circuits and Systems for Video Technology\u00a011(6), 703\u2013715 (2001)","journal-title":"IEEE Trans. Circuits and Systems for Video Technology"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Lalonde, J.F., Efros, A.A.: Using color compatibility for assessing image realism. In: Proceedings of the International Conference on Computer Vision (2007)","DOI":"10.1109\/ICCV.2007.4409107"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Wang, N., Doube, W.: How real is really a perceptually motivated system for quantifying visual realism in digital images. In: Proceedings of the IEEE International Conference on Multimedia and Signal Processing, pp. 141\u2013149 (2011)","DOI":"10.1109\/CMSP.2011.172"},{"key":"25_CR9","unstructured":"Ng, T.T., Chang, S.F.: Classifying photographic and photorealistic computer graphic images using natural image statistics. Technical report, ADVENT Technical Report, Columbia University (2004)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Farid, H., Lyu, S.: Higher\u2013order wavelet statistics and their application to digital forensics. In: IEEE Workshop on Statistical Analysis in Computer Vision (2003)","DOI":"10.1109\/CVPRW.2003.10093"},{"issue":"1","key":"25_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1023\/A:1021889010444","volume":"18","author":"A. Srivastava","year":"2003","unstructured":"Srivastava, A., Lee, A.B., Simoncelli, E.P., Zhu, S.C.: On advances in statistical modeling of natural images. Journal of Mathematical Imaging\u00a018(1), 17\u201333 (2003)","journal-title":"Journal of Mathematical Imaging"},{"key":"25_CR12","unstructured":"Fridrich, A.J., Soukal, B.D., Luk\u00e1\u0161, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)"},{"issue":"2","key":"25_CR13","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"A.C. Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of re\u2013sampling. IEEE Transactions on Signal Processing\u00a053(2), 758\u2013767 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"25_CR14","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D. Lowe","year":"2004","unstructured":"Lowe, D.: Distinctive image features from scale\u2013invariant key\u2013points. Internaional Journal of Computer Vision\u00a060(2), 91\u2013110 (2004)","journal-title":"Internaional Journal of Computer Vision"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Pan, X., Lyu, S.: Detecting image duplication using SIFT features. In: Proceedings of IEEE ICASSP (2010)","DOI":"10.1109\/ICASSP.2010.5495482"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Huang, H., Guo, W., Zhang, Y.: Detection of copy\u2013move forgery in digital images using SIFT algorithm. In: IEEE Pacific\u2013Asia Workshop on Computational Intelligence and Industrial Application (2008)","DOI":"10.1109\/PACIIA.2008.240"},{"issue":"1","key":"25_CR17","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H. Farid","year":"2009","unstructured":"Farid, H.: Exposing digital forgeries from JPEG ghosts. IEEE Transactions on Information Forensics and Security\u00a04(1), 154\u2013160 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Zach, F., Riess, C., Angelopoulou, E.: Automated Image Forgery Detection through Classification of JPEG Ghosts. In: Proceedings of the German Association for Pattern Recognition (DAGM 2012), pp. 185\u2013194 (August 2012)","DOI":"10.1007\/978-3-642-32717-9_19"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13841-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T02:26:57Z","timestamp":1676428017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13841-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319138404","9783319138411"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13841-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}