{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:32:09Z","timestamp":1774679529499,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540242079","type":"print"},{"value":"9783540301141","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30114-1_10","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T18:47:16Z","timestamp":1284662836000},"page":"128-147","source":"Crossref","is-referenced-by-count":273,"title":["Statistical Tools for Digital Forensics"],"prefix":"10.1007","author":[{"given":"Alin C.","family":"Popescu","sequence":"first","affiliation":[]},{"given":"Hany","family":"Farid","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Digital compression and coding of continuous-tone still images, Part 1: Requirements and guidelines. ISO\/IEC JTC1 Draft International Standard 10918-1 (1991)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Bhattacharjee, S., Kutter, M.: Compression-tolerant image authentication. In: IEEE International Conference on Image Processing (1998)","DOI":"10.1109\/ICIP.1998.723518"},{"key":"10_CR3","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2002)"},{"key":"10_CR4","unstructured":"Craver, S.A., Wu, M., Liu, B., Stubblefield, A., Swartzlander, B., Wallach, D.S.: Reading between the lines: Lessons from the SDMI challenge. In: 10th USENIX Security Symposium (2001)"},{"issue":"1","key":"10_CR5","first-page":"1","volume":"99","author":"A.P. Dempster","year":"1977","unstructured":"Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum lilelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society\u00a099(1), 1\u201338 (1977)","journal-title":"Journal of the Royal Statistical Society"},{"issue":"10","key":"10_CR6","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1109\/83.951529","volume":"10","author":"H. Farid","year":"2001","unstructured":"Farid, H.: Blind inverse gamma correction. IEEE Transactions on Image Processing\u00a010(10), 1428\u20131433 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"9","key":"10_CR7","doi-asserted-by":"publisher","first-page":"2072","DOI":"10.1364\/JOSAA.18.002072","volume":"18","author":"H. Farid","year":"2001","unstructured":"Farid, H., Popescu, A.C.: Blind removal of lens distortions. Journal of the Optical Society of America\u00a018(9), 2072\u20132078 (2001)","journal-title":"Journal of the Optical Society of America"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: IEEE International Conference on Image Processing (1999)","DOI":"10.1109\/ICIP.1999.817228"},{"key":"10_CR9","unstructured":"Fridrich, J., Goljan, M., Du., M.: Invertible authentication. In: SPIE, Security and Watermarking of Multimedia Contents (2001)"},{"issue":"4","key":"10_CR10","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/30.267415","volume":"39","author":"G.L. Friedman","year":"1993","unstructured":"Friedman, G.L.: The trustworthy camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics\u00a039(4), 905\u2013910 (1993)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10_CR11","unstructured":"Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. U.S. Patent Application, Docket No. 77102\/E-D (1999)"},{"key":"10_CR12","volume-title":"Information Techniques for Steganography and Digital Watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information Techniques for Steganography and Digital Watermarking. Artec House, Norwood (2000)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Kim, Y.C., Powers, E.J.: Digital bispectral analysis and its applications to nonlinear wave interactions. IEEE Transactions of Plasma Science\u00a0PS7(2) (1979)","DOI":"10.1109\/TPS.1979.4317207"},{"issue":"7","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kundur","year":"1999","unstructured":"Kundur, D., Hatzinakos, D.: Digital watermarking for tell-tale tamper proofing and authentication. Proceedings of the IEEE\u00a087(7), 1167\u20131180 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Lin, C.-Y., Chang, S.-F.: A robust image authentication algorithm surviving JPEG lossy compression. In: SPIE Storage and Retrieval of Image\/Video Databases (1998)","DOI":"10.1117\/12.298462"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: SPIE International Conference on Security and Watermarking of Multimedia Contents II (2000)","DOI":"10.1117\/12.384969"},{"key":"10_CR17","unstructured":"Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Digital Forensic Research Workshop, Cleveland, Ohio (August 2003)"},{"issue":"6","key":"10_CR18","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/5.387094","volume":"83","author":"B.M. Macq","year":"1995","unstructured":"Macq, B.M., Quisquater, J.-J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE\u00a083(6), 944\u2013957 (1995)","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"10_CR19","first-page":"41","volume":"6","author":"R. Matzner","year":"1993","unstructured":"Matzner, R.: An SNR estimation algorithm for complex baseband signals using higher order statistics. Facta Universitatis (Nis)\u00a06(1), 41\u201352 (1993)","journal-title":"Facta Universitatis (Nis)"},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/5.75086","volume":"79","author":"J.M. Mendel","year":"1991","unstructured":"Mendel, J.M.: Tutorial on higher-order statistics (spectra) in signal processing and system theory: Theoretical results and some applications. Proceedings of the IEEE\u00a079(3), 278\u2013305 (1991)","journal-title":"Proceedings of the IEEE"},{"key":"10_CR21","volume-title":"Discrete-Time Signal Processing","author":"V. Oppenheim","year":"1989","unstructured":"Oppenheim, V., Schafer, R.W.: Discrete-Time Signal Processing. Prentice Hall, Englewood Cliffs (1989)"},{"issue":"10","key":"10_CR22","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1109\/26.871393","volume":"48","author":"D.R. Pauluzzi","year":"2000","unstructured":"Pauluzzi, D.R., Beaulieu, N.C.: A comparison of SNR estimation techniques for the AWGN channel. IEEE Transactions on Communications\u00a048(10), 1681\u20131691 (2000)","journal-title":"IEEE Transactions on Communications"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Rey, C., Dugelay, J.-L.: Blind detection of malicious alterations on still images using robust watermarks. In: IEE Seminar: Secure Images and Image Authentication (2000)","DOI":"10.1049\/ic:20000218"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Schneider, M., Chang, S.-F.: A robust content-based digital signature for image authentication. In: IEEE International Conference on Image Processing (1996)","DOI":"10.1109\/ICIP.1996.560425"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Storck, D.: A new approach to integrity of digital images. In: IFIP Conference on Mobile Communication, pp. 309\u2013316 (1996)","DOI":"10.1007\/978-0-387-34980-0_31"},{"issue":"4","key":"10_CR26","first-page":"30","volume":"34","author":"G.K. Wallace","year":"1991","unstructured":"Wallace, G.K.: The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics\u00a034(4), 30\u201344 (1991)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: IEEE International Conference on Image Processing (1997)","DOI":"10.1109\/ICIP.1997.638587"},{"key":"10_CR28","unstructured":"Yu, G.-J., Lu, C.-S., Liao, H.-Y.M., Sheu, J.-P.: Mean quantization blind watermarking for image authentication. In: IEEE International Conference on Image Processing (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30114-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:40:49Z","timestamp":1605760849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30114-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540242079","9783540301141"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30114-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}