{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:10:44Z","timestamp":1742919044047,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_37","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T07:17:59Z","timestamp":1254208679000},"page":"448-453","source":"Crossref","is-referenced-by-count":1,"title":["First Digit Law and Its Application to Digital Forensics"],"prefix":"10.1007","author":[{"given":"Yun Q.","family":"Shi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1\/4","key":"37_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2307\/2369148","volume":"4","author":"S. Newcomb","year":"1881","unstructured":"Newcomb, S.: Note on the frequency of use of the different digits in natural numbers. American Journal of Mathematics\u00a04(1\/4), 39\u201340 (1881)","journal-title":"American Journal of Mathematics"},{"key":"37_CR2","first-page":"551","volume":"78","author":"F. Benford","year":"1938","unstructured":"Benford, F.: The law of anomalous numbers. Proc. Amer. Phil. Soc.\u00a078, 551\u2013572 (1938)","journal-title":"Proc. Amer. Phil. Soc."},{"key":"37_CR3","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1214\/ss\/1177009869","volume":"10","author":"T.P. Hill","year":"1996","unstructured":"Hill, T.P.: A statistical derivation of the significant-digit law. Statistical Science\u00a010, 354\u2013363 (1996)","journal-title":"Statistical Science"},{"key":"37_CR4","unstructured":"Nigrini, M.: The detection of income evasion through an analysis of digital distributions. Ph.D Thesis, Department of Accounting, University of Cincinatti (1992)"},{"key":"37_CR5","first-page":"17","volume":"V","author":"C. Durtschi","year":"2004","unstructured":"Durtschi, C., Hillison, W., Pacini, C.: The effective use of Benford\u2019s law to assist in detecting fraud in accounting data. Journal of Forensic Accounting\u00a0V, 17\u201334 (2004)","journal-title":"Journal of Forensic Accounting"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, W.: A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA (January 2007)","DOI":"10.1117\/12.704723"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Schaefer, G., Stich, M.: UCID - An Uncompressed Colour Image Database. Technical Report, School of Computing and Mathematics, Nottingham Trent University, U.K (2003)","DOI":"10.1117\/12.525375"},{"key":"37_CR8","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TCOM.1983.1095893","volume":"COM-31","author":"R.C. Reininger","year":"1983","unstructured":"Reininger, R.C., Gibson, J.D.: Distributions of the two dimensional DCT coefficients for images. IEEE Trans. on Commun.\u00a0COM-31, 835\u2013839 (1983)","journal-title":"IEEE Trans. on Commun."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Fan, Z., Queiroz, R.L.: Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transaction on Image Processing\u00a012(2) (February 2003)","DOI":"10.1109\/TIP.2002.807361"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Popescu, A.: Statistical tools for digital image forensics., Ph. D. thesis, Dartmouth College (December 2004)","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"37_CR11","unstructured":"Lukas, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proc. of DFRWS 2003, Cleveland, OH, USA, August 5-8 (2003)"},{"key":"37_CR12","unstructured":"Li, B., Shi, Y.Q., Huang, J.: Detecting double compressed JPEG Image by using mode based first digit features. In: IEEE International Workshop on Multi-media Signal Processing, MMSP 2008, Queensland, Australia (October 2008)"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting double MPEG compression. In: ACM Multimedia and Security Workshop, Geneva, Switzerland (2006)","DOI":"10.1145\/1161366.1161375"},{"key":"37_CR14","unstructured":"Chen, W., Shi, Y.Q.: Detection of double MPEG video compression using first digits statistics. In: International Workshop on Digital Watermarking (IWDW 2008), Busan, Korea (November 2008)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T00:35:15Z","timestamp":1578530115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_37"}},"subtitle":["(Invited Paper)"],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}