{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:21:36Z","timestamp":1761675696176},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_2","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T11:17:59Z","timestamp":1254223079000},"page":"16-30","source":"Crossref","is-referenced-by-count":47,"title":["Detection of Double MPEG Compression Based on First Digit Statistics"],"prefix":"10.1007","author":[{"given":"Wen","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yun Q.","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting double MPEG compression. In: ACM Multimedia and Security Workshop, Geneva, Switzerland (2006)","DOI":"10.1145\/1161366.1161375"},{"key":"2_CR2","unstructured":"Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Digital Forensic Research Workshop, Cleveland, Ohio, USA (2003)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Popescu, A.C.: Statistical tools for digital image forensics. Ph.D. Dissertation, Department of Computer Science, Dartmouth College (2005)","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, W.: A generalized Benford\u2019s law for JPEG coefficients and its application in image forensics. In: IS&T\/SPIE 19TH Annual Symposium, San Jose, California, USA (2007)","DOI":"10.1117\/12.704723"},{"key":"2_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4587-7","volume-title":"MPEG video: compression standard","author":"J.L. Mitchell","year":"1997","unstructured":"Mitchell, J.L., Pennebaker, W.B., Fogg, C.E., LeGall, D.J.: MPEG video: compression standard. Chapman & Hall, New York (1997)"},{"key":"2_CR6","unstructured":"http:\/\/bmrc.berkeley.edu\/frame\/research\/mpeg\/mpeg_encode.html"},{"key":"2_CR7","unstructured":"http:\/\/www.mpeg.org\/MPEG\/video\/mssg-free-mpeg-software.html"},{"key":"2_CR8","volume-title":"Probability and Random Processes for Electrical Engineering","author":"A. Leon-Garcia","year":"1994","unstructured":"Leon-Garcia, A.: Probability and Random Processes for Electrical Engineering, 2nd edn. Addison Wesley, Reading (1994)","edition":"2"},{"key":"2_CR9","unstructured":"Hsu, C.-W., Chang, C.-C., Lin, C.J.: LIBSVM: a library for support vector machines (2001)"},{"key":"2_CR10","unstructured":"Matlab Central File Exchange, http:\/\/www.mathworks.com"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:37:11Z","timestamp":1558564631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}