{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:56:02Z","timestamp":1743026162472,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773696"},{"type":"electronic","value":"9783540773702"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_22","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T07:14:38Z","timestamp":1199344478000},"page":"326-341","source":"Crossref","is-referenced-by-count":17,"title":["Tamper Hiding: Defeating Image Forensics"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Kirchner","sequence":"first","affiliation":[]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Ng, T.-T., Chang, S.-F.: A Model for Image Splicing. In: Proc. of ICIP 2004, vol.\u00a02, pp. 1169\u20131172 (2004)","DOI":"10.1109\/ICIP.2004.1419512"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"A. Popescu","year":"2005","unstructured":"Popescu, A., Farid, H.: Exposing Digital Forgeries in Color Filter Array Interpolated Images. IEEE Trans. on Signal Processing\u00a053, 3948\u20133959 (2005)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Detecting Digital Image Forgeries Using Sensor Pattern Noise. In: Delp, E.J., Wong, P.W. (eds.) Proc. of SPIE: Security and Watermarking of Multimedia Content VII, vol.\u00a06072, pp. 60720Y-1\u201360720Y-11 (2006)","DOI":"10.1117\/12.640109"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Johnson, M., Farid, H.: Exposing Digital Forgeries through Chromatic Aberration. In: Proc. of ACM MM-Sec., pp. 48-55 (2006)","DOI":"10.1145\/1161366.1161376"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Wu, M., Liu, K.: Image Tampering Identification Using Blind Deconvolution. In: Proc. of ICIP 2006, pp. 2311\u20132314 (2006)","DOI":"10.1109\/ICIP.2006.312848"},{"key":"22_CR6","unstructured":"Fridrich, J., Soukal, D., Luk\u00e1\u0161, J.: Detection of Copy-Move Forgery in Digital Images. In: Proc. of the Digital Forensic Research Workshop (2003)"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"A.C. Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Traces of Re-sampling. IEEE Trans. on Signal Processing\u00a053, 758\u2013767 (2005)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: Proc. of ACM MM-Sec., pp. 1\u201310 (2005)","DOI":"10.1145\/1073170.1073171"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Farid, H.: Exposing Digital Forgeries in Scientific Images. In: Proc. of ACM MM-Sec. pp. 29\u201336 (2006)","DOI":"10.1145\/1161366.1161374"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1109\/42.875199","volume":"19","author":"P. Th\u00e9venaz","year":"2000","unstructured":"Th\u00e9venaz, P., Blu, T., Unser, M.: Interpolation Revisited. IEEE Trans. on Medical Imaging\u00a019, 739\u2013758 (2000)","journal-title":"IEEE Trans. on Medical Imaging"},{"key":"22_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"A.P. Dempster","year":"1977","unstructured":"Dempster, A.P., Laird, N.M., Rubin, D.: Maximum Likelihood from Incomplete Data via the EM Algorithm. Journal of the Royal Statistical Society, Series B\u00a039, 1\u201338 (1977)","journal-title":"Journal of the Royal Statistical Society, Series B"},{"key":"22_CR12","volume-title":"Digital Image Processing Algorithms and Applications","author":"I. Pitas","year":"2000","unstructured":"Pitas, I.: Digital Image Processing Algorithms and Applications. John Wiley & Sons, Inc., Chichester (2000)"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"F. Petitcolas","year":"1998","unstructured":"Petitcolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 219\u2013239. Springer, Heidelberg (1998)"},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1109\/TCS.1987.1086066","volume":"34","author":"R. Bernstein","year":"1987","unstructured":"Bernstein, R.: Adaptive Nonlinear Filters for Simultaneous Removal of Different Kinds of Noise in Images. IEEE Trans. on Circuits and Systems\u00a034, 1275\u20131291 (1987)","journal-title":"IEEE Trans. on Circuits and Systems"},{"key":"22_CR15","unstructured":"Langelaar, G.C., Biemond, J., Lagendijk, R.L.: Removing Spatial Spread Spectrum Watermarks by Non-Linear Filtering. In: Proc. of EUSIPCO 1998, pp. 2281\u20132284 (1998)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Voloshynovskiy, S., Pereira, S., Herrigel, A., Baumgaertner, N., Pun, T.: Generalized Watermarking Attack Based on Watermark Estimation and Perceptual Remodulation. In: Wong, P.W., Delp, E.J. (eds.) Proc. of SPIE: Security and Watermarking of Multimedia Content II, vol.\u00a03971, pp. 358\u2013370 (2000)","DOI":"10.1117\/12.384990"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/10719724_16","volume-title":"Information Hiding","author":"S. Voloshynovskiy","year":"2000","unstructured":"Voloshynovskiy, S., Herrigel, A., Baumgaertner, N., Pun, T.: A stochastic Approach to Content Adaptive Digital Image Watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 212\u2013236. Springer, Heidelberg (2000)"},{"key":"22_CR18","first-page":"5","volume":"IX","author":"A. Kerckhoffs","year":"1883","unstructured":"Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires\u00a0IX, 5\u201338, 161\u2013191 (1883)","journal-title":"Journal des sciences militaires"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T07:26:31Z","timestamp":1737789991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}