{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:48Z","timestamp":1725538908050},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_14","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"161-169","source":"Crossref","is-referenced-by-count":2,"title":["Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiang-bin","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: Proc. ACM Multimedia and Security Workshop, New York, pp. 1\u20139 (2005)","DOI":"10.1145\/1073170.1073171"},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"A.C. Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Traces of Resampling. IEEE Transactions on Signal Processing\u00a053(2), 758\u2013767 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Wu, M., Ray Liu, K.J.: Non-Intrusive Component Forensics of Visual Sensors Using Output Images. IEEE Transactions on Information Forensics and Security (March 2007) (to appear)","DOI":"10.1109\/TIFS.2006.890307"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Wu, M., Ray Liu, K.J.: Image Tampering Identification using Blind Deconvolution. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), Atlanta,GA, October 2006, pp. 2311\u20132314 (2006)","DOI":"10.1109\/ICIP.2006.312848"},{"key":"14_CR5","first-page":"37","volume-title":"Exopsing Digital Forgeries in Video by Detecting Double MPEG Compression","author":"W. Wang","year":"2006","unstructured":"Wang, W., Farid, H.: Exopsing Digital Forgeries in Video by Detecting Double MPEG Compression, pp. 37\u201347. ACM, New York (2006)"},{"issue":"1","key":"14_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M. Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining Image Origin Integrity Using Sensor Noise. IEEE Transactions on information forensics and security\u00a03(1), 74\u201390 (2008)","journal-title":"IEEE Transactions on information forensics and security"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, C., Zhang, H.: Detecting Digital Image Forgeries Through Weighted Local Entropy. In: IEEE International Symposium on Signal Processing and Information Technology, pp. 62\u201367 (2007)","DOI":"10.1109\/ISSPIT.2007.4458021"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review\u00a05(3-55) (January 2001)","DOI":"10.1145\/584091.584093"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/0165-1684(80)90020-1","volume":"2","author":"T. Pun","year":"1980","unstructured":"Pun, T.: A new method for grey-level picture thresholding using the entropy of the histogram. Signal Processing\u00a02, 223\u2013237 (1980)","journal-title":"Signal Processing"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T01:07:26Z","timestamp":1552180046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}