{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:30Z","timestamp":1725548310678},"publisher-location":"Berlin, Heidelberg","reference-count":54,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_37","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"809-828","source":"Crossref","is-referenced-by-count":7,"title":["Multimedia Forensics for Detecting Forgeries"],"prefix":"10.1007","author":[{"given":"Shiguo","family":"Lian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"K. Hafner: The camera never lies, but the software can, New York Times (11 March 2004)"},{"issue":"1","key":"37_CR2","first-page":"44","volume":"2","author":"W.J. Mitchell","year":"1994","unstructured":"W.J.\u00a0Mitchell: When is seeing believing?, Sci. Am. 2(1), 44\u201349 (1994)","journal-title":"Sci. Am."},{"key":"37_CR3","volume-title":"Digital Watermarking","author":"I.J. Cox","year":"2002","unstructured":"I.J.\u00a0Cox, M.L.\u00a0Miller, J.A.\u00a0Bloom: Digital Watermarking (Morgan Kaufmann, San Francisco, CA 2002)"},{"key":"37_CR4","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1201\/9781482276046-17","volume-title":"Digital Signal Processing for Multimedia Systems","author":"I.J. Cox","year":"1999","unstructured":"I.J.\u00a0Cox, M.L.\u00a0Miller, J.M.G.\u00a0Linnartz, T.\u00a0Kalker: A\u00a0review of watermarking principles and practices. In: Digital Signal Processing for Multimedia Systems, ed. by K.K.\u00a0Parhi, T.\u00a0Nishitani (Marcel Dekker, New York, USA 1999) pp. 461\u2013482"},{"key":"37_CR5","unstructured":"P.\u00a0Blythe, J.\u00a0Fridrich: Secure digital camera, Digital Forensic Research Workshop, Baltimore, Maryland (2004)"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1117\/12.298462","volume":"3312","author":"C.-Y. Lin","year":"1998","unstructured":"C.-Y.\u00a0Lin, S.-F.\u00a0Chang: A robust image authentication algorithm surviving JPEG lossy compression, Proc. SPIE 3312, 296\u2013307 (1998)","journal-title":"Proc. SPIE"},{"key":"37_CR7","unstructured":"A.C. Popescu, Statistical tools for digital image forensics, Technical Report TR2005-531, Dartmouth College (2005)"},{"key":"37_CR8","series-title":"Statistical Science and Interdisciplinary Research","volume-title":"Overview of State-of-the-Art in Digital Image Forensics","author":"H.T. Sencar","year":"2008","unstructured":"H.T.\u00a0Sencar, N.\u00a0Memon: Overview of State-of-the-Art in Digital Image Forensics, Statistical Science and Interdisciplinary Research (World Scientific Press, Singapore 2008)"},{"issue":"6","key":"37_CR9","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/40.743681","volume":"18","author":"J. Adams","year":"1998","unstructured":"J.\u00a0Adams, K.\u00a0Parulski, K.\u00a0Spaulding: Color processing in digital cameras, IEEE Micro 18(6), 20\u201331 (1998)","journal-title":"IEEE Micro"},{"key":"37_CR10","first-page":"172","volume":"6069","author":"K.S. Choi","year":"2006","unstructured":"K.S.\u00a0Choi, E.Y.\u00a0Lam, K.K.Y.\u00a0Wong: Source camera identification using footprints from lens aberration, Proc. SPIE 6069, 172\u2013179 (2006)","journal-title":"Proc. SPIE"},{"key":"37_CR11","first-page":"502","volume":"4232","author":"Z.J. Geradts","year":"2001","unstructured":"Z.J.\u00a0Geradts, J.\u00a0Bijhold, M.\u00a0Kieft, K.\u00a0Kurosawa, K.\u00a0Kuroki, N.\u00a0Saitoh: Methods for identification of images acquired with digital camera, Proc. SPIE 4232, 502\u2013512 (2001)","journal-title":"Proc. SPIE"},{"issue":"2","key":"37_CR12","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J. Lukas","year":"2006","unstructured":"J.\u00a0Lukas, J.\u00a0Fridrich, M.\u00a0Goljan: Digital camera identification from sensor pattern noise, IEEE Trans. Inf. Forensics Secur. 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"S.\u00a0Bayram, H.T.\u00a0Sencar, N.\u00a0Memon, \u0130.\u00a0Avc\u0131ba\u015f: Source camera identification based on CFA interpolation, 2005 IEEE Int. Conference on Image Processing (ICIP) (2005)","DOI":"10.1109\/ICIP.2005.1530330"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Long, Y.\u00a0Huang: Image based source camera identification using demosaicking, 2006 IEEE Int. Conference on Multimedia Siginal Processing (MMSP) (2006)","DOI":"10.1109\/MMSP.2006.285343"},{"key":"37_CR15","unstructured":"O.\u00a0Celiktutan, \u0130.\u00a0Avc\u0131ba\u015f, B.\u00a0Sankur, N.\u00a0Memon: Source cell-phone identification, Proc. ADCOM (2005)"},{"key":"37_CR16","unstructured":"M.\u00a0Kharrazi, H.T.\u00a0Sencar, N.\u00a0Memon: Blind source camera identification, 2004 IEEE Int. Conference on Image Processing (ICIP) (2004)"},{"key":"37_CR17","unstructured":"M.-J.\u00a0Tsai, G.-H.\u00a0Wu: Using image features to identify camera sources, 2006 IEEE Int. Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2006)"},{"key":"37_CR18","unstructured":"K.\u00a0Kurosawa, K.\u00a0Kuroki, N.\u00a0Saitoh: CCD Fingerprint Method, Proc. 1999 IEEE Int. Conference on Image Processing (ICIP) (1999)"},{"issue":"1\/2","key":"37_CR19","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.diin.2008.06.004","volume":"5","author":"S. Bayram","year":"2008","unstructured":"S.\u00a0Bayram, H.T.\u00a0Sencar, N.\u00a0Memon: Classification of digital camera-models based on demosaicing artifacts, Digit. Investig. 5(1\/2), 49\u201359 (2008)","journal-title":"Digit. Investig."},{"issue":"2","key":"37_CR20","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J. Lukas","year":"2006","unstructured":"J.\u00a0Lukas, J.\u00a0Fridrich, M.\u00a0Goljan: Digital camera identification from sensor pattern noise, IEEE Trans. Inf. Forensics Secur. 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Sutcu, S.\u00a0Bayram, H.T.\u00a0Sencar, N.\u00a0Memon: Improvements on sensor noise based source camera identification, Proc. IEEE ICME (2007)","DOI":"10.1109\/ICME.2007.4284577"},{"issue":"1","key":"37_CR22","doi-asserted-by":"crossref","first-page":"65050P","DOI":"10.1117\/12.703370","volume":"6505","author":"M. Chen","year":"2007","unstructured":"M.\u00a0Chen, J.\u00a0Fridrich, M.\u00a0Goljan: Digital imaging sensor identification (further study), Proc. SPIE 6505(1), 65050P (2007)","journal-title":"Proc. SPIE"},{"key":"37_CR23","doi-asserted-by":"publisher","first-page":"65050U","DOI":"10.1117\/12.705849","volume":"6505","author":"N. Khanna","year":"2007","unstructured":"N.\u00a0Khanna, A.K.\u00a0Mikkilineni, G.T.-C.\u00a0Chiu, J.P.\u00a0Allebach, E.J.\u00a0Delp: Forensic classification of imaging sensor types, Proc. SPIE 6505, 65050U (2007)","journal-title":"Proc. SPIE"},{"key":"37_CR24","doi-asserted-by":"publisher","first-page":"65050K","DOI":"10.1117\/12.705849","volume":"6505","author":"N. Khanna","year":"2007","unstructured":"N.\u00a0Khanna, A.K.\u00a0Mikkilineni, G.T.-C.\u00a0Chiu, J.P.\u00a0Allebach, E.J.\u00a0Delp: Scanner identification using sensor pattern noise, Proc. SPIE 6505, 65050K (2007)","journal-title":"Proc. SPIE"},{"key":"37_CR25","doi-asserted-by":"publisher","first-page":"65050S","DOI":"10.1117\/12.704688","volume":"6505","author":"H. Gou","year":"2007","unstructured":"H.\u00a0Gou, A.\u00a0Swaminathan, M.\u00a0Wu: Robust scanner identification based on noise features, Proc. SPIE 6505, 65050S (2007)","journal-title":"Proc. SPIE"},{"key":"37_CR26","unstructured":"E.\u00a0Dirik, H.T.\u00a0Sencar, N.\u00a0Memon: Source camera identification based on sensor dust characteristics, Proc. IEEE SAFE (2007)"},{"issue":"2","key":"37_CR27","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"A.C. Popescu","year":"2005","unstructured":"A.C.\u00a0Popescu, H.\u00a0Farid: Exposing digital forgeries by detecting traces of re-sampling, IEEE Trans. Signal Process. 53(2), 758\u2013767 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"10","key":"37_CR28","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"A.C. Popescu","year":"2005","unstructured":"A.C.\u00a0Popescu, H.\u00a0Farid: Exposing digital forgeries in color filter array interpolated images, IEEE Trans. Signal Process. 53(10), 3948\u20133959 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"37_CR29","volume-title":"Digital Consumer Electronics Handbook","author":"T. Sikora","year":"1997","unstructured":"T.\u00a0Sikora: MPEG-1 and MPEG-2 digital video coding standards. In: Digital Consumer Electronics Handbook, ed. by R.K.\u00a0Jurgen (McGraw-Hill, New York 1997)"},{"key":"37_CR30","doi-asserted-by":"crossref","unstructured":"A.\u00a0Popescu, H.\u00a0Farid: Statistical tools for digital forensics, 6th Int. Workshop on Information Hiding, Toronto, Canada (2004)","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"37_CR31","doi-asserted-by":"crossref","unstructured":"W.\u00a0Wang, H.\u00a0Farid: Exposing digital forgeries in video by detecting double MPEG compression, MM&Sec\u201906, 26\u201327 September 2006, Geneva, Switzerland (2006)","DOI":"10.1145\/1161366.1161375"},{"key":"37_CR32","doi-asserted-by":"crossref","unstructured":"M.K.\u00a0Johnson, H.\u00a0Farid: Exposing digital forgeries by detecting inconsistencies in lighting, Proc. ACM Multimedia Security Workshop (2005)","DOI":"10.1145\/1073170.1073171"},{"key":"37_CR33","doi-asserted-by":"crossref","unstructured":"M.K.\u00a0Johnson, H.\u00a0Farid: Exposing digital forgeries through chromatic aberration, Proc. ACM Multimedia Security Workshop (2006)","DOI":"10.1145\/1161366.1161376"},{"key":"37_CR34","unstructured":"T.E.\u00a0Boult, G.\u00a0Wolberg: Correcting chromatic aberrations using image warping, Proc. IEEE Conference on Computer Vision and Pattern Recognition (1992) pp. 684\u2013687"},{"key":"37_CR35","unstructured":"M. K. Johnson, H. Farid: Metric measurements on a plane from a single image, Technical Report TR2006-579, Dartmouth College, Computer Science (2006)"},{"key":"37_CR36","unstructured":"H. Farid: Detecting digital forgeries using bispectral analysis, Technical Report AIM-1657, Massachusetts Institute of Technology (1999)"},{"key":"37_CR37","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Sutcu, B.\u00a0Coskun, H.T.\u00a0Sencar, N.\u00a0Memon: Tamper detection based on regularity of wavelet transform coefficients, 2007 IEEE Int. Conference on Image Processing (ICIP) (2007)","DOI":"10.1109\/ICIP.2007.4378975"},{"issue":"4","key":"37_CR38","doi-asserted-by":"publisher","first-page":"041102","DOI":"10.1117\/1.2401138","volume":"15","author":"B. Sankur","year":"2006","unstructured":"B.\u00a0Sankur, S.\u00a0Bayram, \u0130.\u00a0Avc\u0131ba\u015f, N.\u00a0Memon: Image manipulation detection, J. Electron. Imaging 15(4), 041102 (2006)","journal-title":"J. Electron. Imaging"},{"key":"37_CR39","doi-asserted-by":"crossref","unstructured":"S.\u00a0Bayram, \u0130.\u00a0Avc\u0131ba\u015f, B.\u00a0Sankur, N.\u00a0Memon: Image manipulation detection with binary similarity measures, EUSIPCO (2004)","DOI":"10.1155\/ASP.2005.2749"},{"key":"37_CR40","unstructured":"\u0130.\u00a0Avc\u0131ba\u015f, S.\u00a0Bayram, N.\u00a0Memon, M.\u00a0Ramkumar, B.\u00a0Sankur: A classifier design for detecting image manipulations, Proc. 2004 Int. Conference on Image Processing, Singapore (2004)"},{"key":"37_CR41","volume-title":"Pattern Classification and Scene Analysis","author":"R. Duda","year":"1973","unstructured":"R.\u00a0Duda, P.\u00a0Hart: Pattern Classification and Scene Analysis (John Wiley and Sons, San Francisco 1973)"},{"key":"37_CR42","unstructured":"J.\u00a0Fridrich, D.\u00a0Soukal, J.\u00a0Lukas: Detection of copy-move forgery in digital images, Proc. 2003 Digital Forensic Research Workshop (2003)"},{"key":"37_CR43","unstructured":"A.C.\u00a0Popescu, H. Faridy: Exposing digital forgeries by detecting duplicated image regions, Technical Report TR2004-515, Dartmouth College, Computer Science (2004)"},{"key":"37_CR44","doi-asserted-by":"crossref","unstructured":"H.\u00a0Farid: Exposing digital forgeries in scientific images, ACM MM&Sec\u201906, 26\u201327 September 2006, Geneva, Switzerland (2006)","DOI":"10.1145\/1161366.1161374"},{"key":"37_CR45","unstructured":"T.-T.\u00a0Ng, S.-F.\u00a0Chang, M.-P.\u00a0Tsui: Physics-motivated features for distinguishing photographic images and computer graphics, ACM MM\u201905, Singapore (2005)"},{"key":"37_CR46","doi-asserted-by":"crossref","unstructured":"A.E.\u00a0Dirik, S.\u00a0Bayram, H.T.\u00a0Sencar, N.\u00a0Memon: New features to identify computer generated images, 2007 IEEE Int. Conference on Image Processing (ICIP) (2007)","DOI":"10.1109\/ICIP.2007.4380047"},{"key":"37_CR47","doi-asserted-by":"crossref","unstructured":"S.\u00a0Dehnie, T.\u00a0Sencar, N.\u00a0Memon: Digital image forensics for identifying computer generated and digital camera images, 2006 IEEE Int. Conference on Image Processing (ICIP) (2006)","DOI":"10.1109\/ICIP.2006.312849"},{"key":"37_CR48","doi-asserted-by":"crossref","unstructured":"H.\u00a0Farid, S.\u00a0Lyu: Higher-order wavelet statistics and their application to digital forensics, 2003 Conference on Computer Vision and Pattern Recognition Workshop, Vol. 8 (2003)","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"37_CR49","unstructured":"N.\u00a0Tian-Tsong, C.\u00a0Shih-Fu, H.\u00a0Yu-Feng, X.\u00a0Lexing, T.\u00a0Mao-Pei: Physics-motivated features for distinguishing photographic images and computer graphics, 2005 ACM Multimedia, Singapore (2005)"},{"key":"37_CR50","unstructured":"Y.\u00a0Wang, P.\u00a0Moulin: On discrimination between photorealistic and photographic images, 2006 IEEE Int. Conference on Acoustics, Speech and Signal Processing, IEEE, May 2006, Vol. 2 (2006) pp. II-161\u2013II-164"},{"key":"37_CR51","doi-asserted-by":"crossref","unstructured":"S.\u00a0Dehnie, H.T.\u00a0Sencar, N.\u00a0Memon: Identification of computer generated and digital camera images for digital image forensics, Proc. 2006 IEEE Int. Conference on Image Processing (ICIP) (2006)","DOI":"10.1109\/ICIP.2006.312849"},{"key":"37_CR52","unstructured":"T.-T.\u00a0Ng, S.-F.\u00a0Chang: A model for image splicing, 2004 IEEE Int. Conference on Image Processing (ICIP) (2004)"},{"key":"37_CR53","unstructured":"T.-T.\u00a0Ng, S.-F.\u00a0Chang, Q.\u00a0Sun: Blind detection of photomontage using higher order statistics, 2004 IEEE Int. Conference on Circuits and Systems (ISCAS) (2004)"},{"key":"37_CR54","unstructured":"T.-T. Ng, S.-F. Chang: Blind detection of digital photomontage using higher order statistics, ADVENT Technical Report #201-2004-1, Columbia University (2004)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:29Z","timestamp":1606185569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_37","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}