{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:32:50Z","timestamp":1759332770965},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_6","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"61-71","source":"Crossref","is-referenced-by-count":9,"title":["Detection of Double Compression for HEVC Videos Based on the Co-occurrence Matrix of DCT Coefficients"],"prefix":"10.1007","author":[{"given":"Meiling","family":"Huang","sequence":"first","affiliation":[]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Dawen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"12","key":"6_CR1","first-page":"1654","volume":"43","author":"R Yang","year":"2013","unstructured":"Yang, R., Luo, W., Huang, J.: Multimedia forensic. Sci. China Inf. Sci. 43(12), 1654\u20131672 (2013)","journal-title":"Sci. China Inf. Sci."},{"issue":"4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TIFS.2014.2302899","volume":"9","author":"D Xu","year":"2014","unstructured":"Xu, D., Wang, R., Shi, Y.: Data hiding in encrypted H.264\/AVC video streams by codeword substitution. IEEE Trans. Inf. Forensics Secur. 9(4), 596\u2013606 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Popescu, A.C., Farid, H.: Statistical tools for digital image forensics. In: Proceedings 6th International Workshop on Information Hiding, pp. 128\u2013147, Toronto, Canada (2004)","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"6_CR4","unstructured":"Fu, D., Shi, Y., Su, W.: A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE 6505, Security, Steganography and Watermarking of Multimedia Contents IX, 65051L, 27 Feb 2007"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Chen, C., Shi, Y., Su, W.: A machine learning based scheme for double JPEG compression detection. In: Proceedings of International Conference on Pattern Recognition, pp. 1814\u20131817, Dec 2008","DOI":"10.1109\/ICPR.2008.4761645"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H.: Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the Multimedia and Security Workshop, pp. 37\u201347, Geneva, Switzerland, 26\u201327 Sept 2006","DOI":"10.1145\/1161366.1161375"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-04438-0_2","volume-title":"Digital Watermarking","author":"W Chen","year":"2009","unstructured":"Chen, W., Shi, Y.Q.: Detection of double MPEG compression based on first digit statistics. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 16\u201330. Springer, Heidelberg (2009)"},{"issue":"12","key":"6_CR8","doi-asserted-by":"publisher","first-page":"3046","DOI":"10.3724\/SP.J.1146.2012.00535","volume":"34","author":"W Wang","year":"2012","unstructured":"Wang, W., Jiang, X., Sun, T.: Exposing double MPEG compression based on first digit features. J. Electron. Inf. Technol. 34(12), 3046\u20133050 (2012)","journal-title":"J. Electron. Inf. Technol."},{"issue":"5","key":"6_CR9","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/LSP.2013.2251632","volume":"20","author":"X Jiang","year":"2013","unstructured":"Jiang, X., Wang, W., Sun, T., Shi, Y.: Detection of double compression in MPEG-4 videos based on markov statistics. IEEE Signal Process. Lett. 20(5), 447\u2013450 (2013)","journal-title":"IEEE Signal Process. Lett."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Liao, D., Yang, R., Liu, H., Li, J., Huang, J.: Double H.264\/AVC compression detection using quantized non-zero AC coefficients. In: Proceedings of SPIE International Society for Optical Engineering (Media Watermarking, Security, and Forensics), vol. 7880 (2011)","DOI":"10.1117\/12.876566"},{"issue":"2","key":"6_CR11","first-page":"1","volume":"2","author":"Qingzhong Liu","year":"2011","unstructured":"Liu, Q., Sung, A.H., Qiao, M.: Neighboring joint density-based JPEG steganalysis. ACM Trans. Intell. Syst. Technol. 2(2), Article 16 (2011)","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"issue":"22","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","volume":"12","author":"GJ Sullivan","year":"2012","unstructured":"Sullivan, G.J., Ohm, J.R., Han, W.-J., Wiegand, T.: Overview of the high efficiency video coding (HEVC) standard. IEEE Trans. Circ. Syst. Video Technol. 12(22), 1649\u20131668 (2012)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"10","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1109\/83.869177","volume":"9","author":"EY Lam","year":"2000","unstructured":"Lam, E.Y., Goodman, J.W.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process. 9(10), 1661\u20131666 (2000)","journal-title":"IEEE Trans. Image Process."},{"key":"6_CR14","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: a Library for Support Vector Machines. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/ (2001)"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T16:47:51Z","timestamp":1655398071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}