{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:44:25Z","timestamp":1725522265346},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_13","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T06:04:33Z","timestamp":1229407473000},"page":"158-172","source":"Crossref","is-referenced-by-count":23,"title":["Steganalysis Versus Splicing Detection"],"prefix":"10.1007","author":[{"given":"Yun Q.","family":"Shi","sequence":"first","affiliation":[]},{"given":"Chunhua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guorong","family":"Xuan","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Image Steganography: Concepts and Practice. In: Lecture Note Series, Institute for Mathematical Sciences, National University of Singapore (2004)"},{"key":"13_CR2","unstructured":"http:\/\/www.snopes.com\/photos\/politics\/kerry2.asp"},{"key":"13_CR3","unstructured":"Columbia DVMM Research Lab: Columbia Image Splicing Detection Evaluation Dataset (2004), http:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/AuthSpliced-DataSet\/AuthSplicedDataSet.htm"},{"key":"13_CR4","unstructured":"http:\/\/www.ee.columbia.edu\/dvmm\/publications\/04\/TR_splicingDataSet_ttng.pdf"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Lyu, S., Farid, H.: Detecting Hidden Messages Using Higher-order Statistics and Support Vector Machines. In: Information Hiding Workshop, Noordwijkerhout, Netherlands (2002)","DOI":"10.1007\/3-540-36415-3_22"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Xuan, G., Zou, D., Gao, J., Yang, C., Zhang, Z., Chai, P., Chen, W., Chen, C.: Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-error Image, and Neural Network. In: International Conference on Multimedia and Expo, Amsterdam, Netherlands (2005)","DOI":"10.1109\/ICME.2005.1521412"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Zou, D., Shi, Y.Q., Su, W., Xuan, G.: Steganalysis Based on Markov Model of Thresholded Prediction-Error Image. In: International Conference on Multimedia and Expo, Toronto, ON, Canada (2006)","DOI":"10.1109\/ICME.2006.262792"},{"key":"13_CR8","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A Markov Process Based Approach to Effective Attacking JEPG Steganography. In: Information Hiding Workshop, Old Town Alexandria, VA, USA (2006)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Chen, C., Shi, Y.Q., Xuan, G.: Steganalyzing Texture images. In: International Conference on Image Processing, St. Antonio, TX, USA (2007)","DOI":"10.1109\/ICIP.2007.4379115"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Feature-based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. In: Information Hiding Workshop, Toronto, ON, Canada (2004)","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"13_CR11","unstructured":"Ng, T.-T., Chang, S.-F., Sun, Q.: Blind Detection of Photomontage Using Higher Order Statistics. In: IEEE International Symposium on Circuits and Systems, Vancouver, BC, Canada (2004)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, W.: Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. In: Shi, Y. Q., Jeon, B. (eds.) Digital Watermarking, Proceeding of 5th International Workshop on Digital Watermarking, Jeju Island, Korea (2006)","DOI":"10.1007\/11922841_15"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Chen, W., Shi, Y.Q., Su, W.: Image Splicing Detection Using 2-D Phase Congruency and Statistical Moments of Characteristic Function. In: Delp, E. J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents IX, Proceeding. of SPIE, San Jose, CA, USA (2007)","DOI":"10.1117\/12.704321"},{"issue":"2411","key":"13_CR14","first-page":"38","volume":"179","author":"H. Farid","year":"2003","unstructured":"Farid, H.: A Picture Tells a Thousand Lies. New Scientist\u00a0179(2411), 38\u201341 (2003)","journal-title":"New Scientist"},{"key":"13_CR15","unstructured":"Ng, T.-T., Chang, S.-F.: A Model for Image Splicing. In: IEEE International Conference on Image Processing, Singapore (2004)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image Manipulation Detection. Journal of Electronic Imaging 15(4) (2006)","DOI":"10.1117\/1.2401138"},{"key":"13_CR17","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: A Library for Support Vector Machines, http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm"},{"key":"13_CR18","unstructured":"Fawcett, T.: Roc Graphs: Notes and Practical Considerations for Researchers, http:\/\/home.comcast.net\/~tom.fawcett\/public_html\/papers\/ROC101.pdf"},{"key":"13_CR19","volume-title":"Probability and Random Processes for Electrical Engineering","author":"A. Leon-Garcia","year":"1994","unstructured":"Leon-Garcia, A.: Probability and Random Processes for Electrical Engineering, 2nd edn. Addison-Wesley Publishing Company, Reading (1994)","edition":"2"},{"key":"13_CR20","volume-title":"The Nature of Statistical Learning Theory","author":"V.N. Vapnik","year":"1999","unstructured":"Vapnik, V.N.: The Nature of Statistical Learning Theory, 2nd edn. Springer, Heidelberg (1999)","edition":"2"},{"key":"13_CR21","doi-asserted-by":"publisher","DOI":"10.1201\/9781420049794","volume-title":"Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards","author":"Y.Q. Shi","year":"1999","unstructured":"Shi, Y.Q., Sun, H.: Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards. CRC Press, Boca Raton (1999)"},{"issue":"12","key":"13_CR22","doi-asserted-by":"publisher","first-page":"2008","DOI":"10.1109\/29.45550","volume":"37","author":"R. Forchheimer","year":"1989","unstructured":"Forchheimer, R., Kronander, T.: Image Coding from Waveforms to Animation. IEEE Transactions on Acoustics, Speech and Signal Processing\u00a037(12), 2008\u20132023 (1989)","journal-title":"IEEE Transactions on Acoustics, Speech and Signal Processing"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T05:23:25Z","timestamp":1557984205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}