{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T11:54:54Z","timestamp":1746186894631,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319534640"},{"type":"electronic","value":"9783319534657"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53465-7_1","type":"book-chapter","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T09:53:19Z","timestamp":1487152399000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks"],"prefix":"10.1007","author":[{"given":"Jingjing","family":"Yu","sequence":"first","affiliation":[]},{"given":"Yifeng","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Stamm, M.M.C., Wu, M., Liu, K.J.R.: Information forensics: an overview of the first decade. In: IEEE Access, vol. 1, pp. 167\u2013200, May 2013","DOI":"10.1109\/ACCESS.2013.2260814"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Stamm, M.M.C., Tjoa, S.K., Lin, W.S., et al.: Anti-forensics of JPEG compression. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 1694\u20131697, March 2010","DOI":"10.1109\/ICASSP.2010.5495491"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TIFS.2012.2234117","volume":"8","author":"MG Valenzise","year":"2013","unstructured":"Valenzise, M.G., Tagliasacchi, M., Tubaro, S.: Revealing the traces of JPEG compression anti-forensics. IEEE Trans. Inf. Forensics Secur. 8(2), 335\u2013349 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"1_CR4","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MMC Stamm","year":"2011","unstructured":"Stamm, M.M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050\u20131065 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"1_CR5","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AAC Popescu","year":"2005","unstructured":"Popescu, A.A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(2), 758\u2013767 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TIFS.2008.2008214","volume":"3","author":"MM Kirchner","year":"2008","unstructured":"Kirchner, M.M., B\u00f6hme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582\u2013592 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","volume":"5","author":"MMC Stamm","year":"2010","unstructured":"Stamm, M.M.C., Liu, K.J.R.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 5(3), 492\u2013506 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Stamm, M.M.C., Liu, K.J.R.: Blind forensics of contrast enhancement in digital images. In: Proceedings of IEEE International Conference on Image Processing, San Diego, CA, pp. 3112\u20133115, October 2008","DOI":"10.1109\/ICIP.2008.4712454"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Cao, G.G., Zhao, Y., Ni, R., Tian, H.: Anti-forensics of contrast enhancement in digital images. In: Proceedings of ACM Workshop Multimedia and Security, pp. 25\u201334 (2010)","DOI":"10.1145\/1854229.1854237"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-642-32205-1_32","volume-title":"Digital Forensics and Watermarking","author":"C-W Kwok","year":"2012","unstructured":"Kwok, C.-W., Au, O.C., Chui, S.-H.: Alternative anti-forensics method for contrast enhancement. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 398\u2013410. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32205-1_32"},{"issue":"2","key":"1_CR11","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TIFS.2012.2234117","volume":"8","author":"GG Valenzise","year":"2013","unstructured":"Valenzise, G.G., Tagliasacchi, M., Tubaro, S.: Revealing the traces of JPEG compression anti-forensics. IEEE Trans. Inf. Forensics Secur. 8(2), 335\u2013349 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"HH Yuan","year":"2011","unstructured":"Yuan, H.H.: Blind forensics of median filtering in digital images. IEEE Trans. Inf. Forensics Secur. 6(4), 1335\u20131345 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Kirchner, M.M., Fridrich, J.: On detection of median filtering in digital images. In: Memon, N.D., Dittmann, J., Alattar, A.M., Delp, E.J. (Eds.) Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, Proceedings, vol. 7541 of SPIE Proceedings, San Jose, CA, USA, 18\u201320 January 2010, p. 754110, SPIE (2010)","DOI":"10.1117\/12.839100"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Dang-Nguyen, D.D.T., Gebru, I.D., Conotter, V., et al.: Counter-forensics of median filtering. In: 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 260\u2013265, September 2013","DOI":"10.1109\/MMSP.2013.6659298"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Wu, Z.Z.H., Stamm, M.C., Liu, K.J.R.: Anti-forensics of median filtering. In: Proceedings of IEEE International Conference on Acoustic, Speech, and Signal Processing, pp. 3043\u20133047, Vancouver, Canada, May 2013","DOI":"10.1109\/ICASSP.2013.6638217"},{"key":"1_CR16","unstructured":"Simonyan, K.K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Proceedings of ICLR (2015)"},{"key":"1_CR17","unstructured":"Krizhevsky, A.A., Sutskever, I., Hinton, G.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: \u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-24178-9_5"},{"issue":"11","key":"1_CR19","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"YY Lecun","year":"1998","unstructured":"Lecun, Y.Y., BoUou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"issue":"1","key":"1_CR20","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., et al.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"1_CR21","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML 2010) (2010)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Jiang, Y.Y., Zeng, H., Kang, X., et al.: The game of countering JPEG anti-forensics based on the noise level estimation. In: Proceedings of the Asian-Pacific Signal and Information Processing Association Annual Submit Conference (APSIPA ASC) (2013)","DOI":"10.1109\/APSIPA.2013.6694156"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Zeng, H.H., Qin, T., Kang, X., et al.: Countering anti-forensics of median filtering. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 2723\u20132727 (2014)","DOI":"10.1109\/ICASSP.2014.6854091"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Peng, A.A., Zeng, H., Kang, X., et al.: Countering anti-forensics of image resampling. In: Proceedings of the 2015 IEEE International Conference on Image Processing (ICIP), pp. 3595\u20133599, September 2015","DOI":"10.1109\/ICIP.2015.7351474"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53465-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:23:46Z","timestamp":1709821426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-53465-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319534640","9783319534657"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53465-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iwdw.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}