{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:35:04Z","timestamp":1773156904147,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642036873","type":"print"},{"value":"9783642036880","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_27","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T11:03:43Z","timestamp":1250507023000},"page":"308-322","source":"Crossref","is-referenced-by-count":40,"title":["A Survey of Passive Image Tampering Detection"],"prefix":"10.1007","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Tieniu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"27_CR1","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kundur","year":"1999","unstructured":"Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing andauthentication. Proceedings of the IEEE\u00a087(7), 1167\u20131180 (1999)","journal-title":"Proceedings of the IEEE"},{"issue":"6","key":"27_CR2","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1155\/S1110865702204047","volume":"2002","author":"C. Rey","year":"2002","unstructured":"Rey, C., Dugelay, J.: A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing\u00a02002(6), 613\u2013621 (2002)","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Sencar, H.T., Memon, N.: Overview of state-of-the-art in digital image forensics, part of indian statistical institute platinum jubilee monograph series titled \u2019statistical science and interdisciplinary research (2008)","DOI":"10.1142\/9789812836243_0015"},{"issue":"1","key":"27_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M. Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security\u00a03(1), 74\u201390 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Lin, Z., Wang, R., Tang, X., Shum, H.Y.: Detecting doctored images using camera response normality and consistency. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol.\u00a01, pp. 1087\u20131092 (2005)","DOI":"10.1109\/CVPR.2005.125"},{"key":"27_CR6","unstructured":"Farid, H.: Creating and detecting doctored and virtual images: Implications to the child pornography prevention act. Technical Report TR2004-518, Department of Computer Science, Dartmouth College (2004)"},{"key":"27_CR7","first-page":"303","volume-title":"International Conference on Computer Graphics and Interactive Techniques","author":"Y. Li","year":"2004","unstructured":"Li, Y., Sun, J., Tang, C., Shum, H.: Lazy snapping. In: International Conference on Computer Graphics and Interactive Techniques, pp. 303\u2013308. ACM, New York (2004)"},{"key":"27_CR8","volume-title":"Multimedia Security Technologies for Digital Rights Management","author":"T.T. Ng","year":"2006","unstructured":"Ng, T.T., Chang, S.F., Lin, C.Y., Sun, Q.: Passive-blind image forensics. In: Multimedia Security Technologies for Digital Rights Management. Elsevier, Amsterdam (2006)"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/11744078_33","volume-title":"Computer Vision \u2013 ECCV 2006","author":"J. He","year":"2006","unstructured":"He, J., Lin, Z., Wang, L., Tang, X.: Detecting doctored JPEG images via DCT coefficient analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol.\u00a03953, pp. 423\u2013435. Springer, Heidelberg (2006)"},{"issue":"1","key":"27_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TIFS.2007.916010","volume":"3","author":"A. Swaminathan","year":"2008","unstructured":"Swaminathan, A., Wu, M., Liu, K.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Info. Forensics and Security\u00a03(1), 101\u2013117 (2008)","journal-title":"IEEE Trans. Info. Forensics and Security"},{"issue":"10","key":"27_CR11","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"A. Popescu","year":"2005","unstructured":"Popescu, A., Farid, H.: Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing\u00a053(10), 3948\u20133959 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"27_CR12","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"A. Popescu","year":"2005","unstructured":"Popescu, A., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing\u00a053(2), 758\u2013767 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-540-30114-1_10","volume-title":"6th International Workshop on Information Hiding","author":"A. Popescu","year":"2004","unstructured":"Popescu, A., Farid, H.: Statistical tools for digital forensics. In: 6th International Workshop on Information Hiding, pp. 128\u2013147. Springer, Heidelberg (2004)"},{"issue":"3","key":"27_CR14","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","volume":"3","author":"B. Mahdian","year":"2008","unstructured":"Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Transactions on Information Forensics and Security\u00a03(3), 529\u2013538 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Mahdian, B., Saic, S.: Detection and description of geometrically transformed digital images. In: Proc. SPIE, Media Forensics and Security, vol.\u00a07254, pp. 72540J\u201372548J (2009)","DOI":"10.1117\/12.805898"},{"key":"27_CR16","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/1161366.1161376","volume-title":"Proceedings of the 8th workshop on Multimedia and security","author":"M. Johnson","year":"2006","unstructured":"Johnson, M., Farid, H.: Exposing digital forgeries through chromatic aberration. In: Proceedings of the 8th workshop on Multimedia and security, pp. 48\u201355. ACM, New York (2006)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol.\u00a06072, pp. 362\u2013372 (2006)","DOI":"10.1117\/12.640109"},{"issue":"1","key":"27_CR18","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M. Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security\u00a03(1), 74\u201390 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"27_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TIFS.2006.890307","volume":"2","author":"A. Swaminathan","year":"2007","unstructured":"Swaminathan, A., Wu, M., Liu, K.: Non-intrusive component forensics of visual sensors using output images. IEEE Transactions on Information Forensics and Security\u00a02(1), 91\u2013106 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Wu, M., Liu, K.: Component forensics of digital cameras: A non-intrusive approach. In: Annual Conference on Information Sciences and Systems, pp. 1194\u20131199 (2006)","DOI":"10.1109\/CISS.2006.286646"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y., Su, W., et al.: A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents., vol.\u00a06505, pp. 47\u201358 (2007)","DOI":"10.1117\/12.704723"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Luo, W., Qu, Z., Huang, J., Qiu, G.: A novel method for detecting cropped and recompressed image block. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol.\u00a02, pp. 217\u2013220 (2007)","DOI":"10.1109\/ICASSP.2007.366211"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Ye, S., Sun, Q., Chang, E.: Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: IEEE International Conference on Multimedia and Expo, pp. 12\u201315 (2007)","DOI":"10.1109\/ICME.2007.4284574"},{"issue":"1","key":"27_CR24","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H. Farid","year":"2009","unstructured":"Farid, H.: Exposing digital forgeries form jpeg ghosts. IEEE transactions on information forensics and security\u00a04(1), 154\u2013160 (2009)","journal-title":"IEEE transactions on information forensics and security"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Farid, H., Lyu, S.: Higher-order wavelet statistics and their application to digital forensics. In: IEEE Conference on Computer Vision and Pattern Recognition Workshop (2003)","DOI":"10.1109\/CVPRW.2003.10093"},{"issue":"4","key":"27_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.2401138","volume":"15","author":"S. Bayram","year":"2006","unstructured":"Bayram, S., Avc\u0131ba\u015f, \u0130., Sankur, B., Memon, N.: Image manipulation detection. Journal of Electronic Imaging\u00a015(4), 1\u201317 (2006)","journal-title":"Journal of Electronic Imaging"},{"issue":"2","key":"27_CR27","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I. Avcibas","year":"2003","unstructured":"Avcibas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE transactions on Image Processing\u00a012(2), 221\u2013229 (2003)","journal-title":"IEEE transactions on Image Processing"},{"issue":"17","key":"27_CR28","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1155\/ASP.2005.2749","volume":"2005","author":"I. Avcibas","year":"2005","unstructured":"Avcibas, I.: Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing\u00a02005(17), 2749\u20132757 (2005)","journal-title":"EURASIP Journal on Applied Signal Processing"},{"issue":"1","key":"27_CR29","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TIFS.2005.863485","volume":"1","author":"S. Lyu","year":"2006","unstructured":"Lyu, S., Farid, H.: Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security\u00a01(1), 111\u2013119 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"27_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-92238-4_13","volume-title":"Digital Watermarking","author":"Y.Q. Shi","year":"2008","unstructured":"Shi, Y.Q., Chen, C.-H., Xuan, G., Su, W.: Steganalysis versus splicing detection. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol.\u00a05041, pp. 158\u2013172. Springer, Heidelberg (2008)"},{"key":"27_CR31","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1288869.1288878","volume-title":"Proceedings of the 9th workshop on Multimedia & security","author":"Y. Shi","year":"2007","unstructured":"Shi, Y., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on Multimedia & security, pp. 51\u201362. ACM Press, New York (2007)"},{"key":"27_CR32","unstructured":"Farid, H.: Detecting digital forgeries using bispectral analysis. Technical report, MIT AI Memo AIM-1657, MIT (1999)"},{"key":"27_CR33","unstructured":"Ng, T.T., Chang, S.F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE International Symposium on Circuits and Systems, vol.\u00a05, pp. 688\u2013691 (2004)"},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Ng, T.T., Chang, S.F.: A model for image splicing. In: IEEE International Conference on Image Processing, vol.\u00a02, pp. 1169\u20131172 (2004)","DOI":"10.1109\/ICIP.2004.1419512"},{"key":"27_CR35","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Digital Forensic Research Workshop (2003)"},{"key":"27_CR36","unstructured":"Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technical report, Department of Computer Science, Dartmouth College"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech, and Signal Processing. (2009)","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"27_CR38","doi-asserted-by":"crossref","unstructured":"Chen, W., Shi, Y., Su, W.: Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. In: Security, Steganography and Watermarking of Multimedia Contents IX, Proceeding. of SPIE, San Jose, CA, USA (2007)","DOI":"10.1117\/12.704321"},{"key":"27_CR39","doi-asserted-by":"crossref","unstructured":"Hsiao, D., Pei, S.: Detecting digital tampering by blur estimation. In: International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 264\u2013278 (2005)","DOI":"10.1109\/SADFE.2005.8"},{"key":"27_CR40","doi-asserted-by":"crossref","unstructured":"Johnson, M., Farid, H.: Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the workshop on Multimedia and security, pp. 1\u201310 (2005)","DOI":"10.1145\/1073170.1073171"},{"issue":"3","key":"27_CR41","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/TIFS.2007.903848","volume":"2","author":"M. Johnson","year":"2007","unstructured":"Johnson, M., Farid, H.: Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security\u00a02(3), 450\u2013461 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"27_CR42","doi-asserted-by":"crossref","unstructured":"Johnson, M., Farid, H.: Exposing digital forgeries through specular highlights on the eye. In: International Workshop on Information Hiding (2007)","DOI":"10.1007\/978-3-540-77370-2_21"},{"key":"27_CR43","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1291233.1291252","volume-title":"Proceedings of the 15th international conference on Multimedia","author":"T. Gloe","year":"2007","unstructured":"Gloe, T., Kirchner, M., Winkler, A., B\u00f6hme, R.: Can we trust digital image forensics? In: Proceedings of the 15th international conference on Multimedia, pp. 78\u201386. ACM, New York (2007)"},{"key":"27_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-77370-2_22","volume-title":"Information Hiding","author":"M. Kirchner","year":"2008","unstructured":"Kirchner, M., Bohme, R.: Tamper hiding: Defeating image forensics. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 326\u2013341. Springer, Heidelberg (2008)"},{"key":"27_CR45","unstructured":"Ng, T., Chang, S., Sun, Q.: A data set of authentic and spliced image blocks. Technical report, DVMM, Columbia University (2004), http:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/AuthSplicedDataSet\/photographers.htm"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T19:30:20Z","timestamp":1739302220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}