{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:03:27Z","timestamp":1760346207126,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":61,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195501"},{"type":"electronic","value":"9783642195518"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19551-8_5","type":"book-chapter","created":{"date-parts":[[2011,4,19]],"date-time":"2011-04-19T18:53:18Z","timestamp":1303239198000},"page":"139-183","source":"Crossref","is-referenced-by-count":5,"title":["Image Authentication Using Active Watermarking and Passive Forensics Techniques"],"prefix":"10.1007","author":[{"given":"Xi","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Philip","family":"Bateman","sequence":"additional","affiliation":[]},{"given":"Anthony T. S.","family":"Ho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Vrusias, B., Tariq, M., Handy, C., et al.: Forensic Photography. In Technical Report, University of Surrey, Computing Dept. (2001)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Ho, A.T.S.: Semi-fragile Watermarking and Authentication for Law Enforcement Applications. In: Innovative Computing, Information and Control (ICICIC 2007), pp. 286\u2013286 (2007)","DOI":"10.1109\/ICICIC.2007.514"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Zheng, D., Liu, Y., Zhao, J., et al.: A survey of RST invariant image watermarking algorithms. ACM Computing Surveys\u00a039(2) (2007)","DOI":"10.1145\/1242471.1242473"},{"key":"5_CR4","volume-title":"Digital watermarking and Steganography","author":"I.J. Cox","year":"2008","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., et al.: Digital watermarking and Steganography, 2nd edn. Morgan Kaufmann, USA (2008), ISBN: 0123725852","edition":"2"},{"key":"5_CR5","first-page":"130091","volume":"16","author":"C.T. Li","year":"2007","unstructured":"Li, C.T., Si, H.: Wavelet-based Fragile Watermarking Scheme for Image Authentication. Journal of Electronic Imaging\u00a016, 130091\u2013130099 (2007)","journal-title":"Journal of Electronic Imaging"},{"issue":"12","key":"5_CR6","doi-asserted-by":"publisher","first-page":"127001","DOI":"10.1117\/1.2402932","volume":"45","author":"C.T. Li","year":"2006","unstructured":"Li, C.T., Yuan, Y.: Digital Watermarking Scheme Exploiting Non-deterministic Dependence for Image Authentication. Optical Engineering\u00a045(12), 127001\u2013127001 (2006)","journal-title":"Optical Engineering"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Ho, A.T.S., Zhu, X., Guan, Y.: Image content authentication using pinned sine transform. EURASIP Journal on Applied Signal Processing, 2174\u20132184 (2004)","DOI":"10.1155\/S111086570440506X"},{"issue":"1","key":"5_CR8","first-page":"57","volume":"10","author":"C.H. Lin","year":"2007","unstructured":"Lin, C.H., Su, T.S., Hsieh, W.S.: Semi-fragile watermarking Scheme for authentication of JPEG Images. Tamkang Journal of Science and Engineering\u00a010(1), 57\u201366 (2007)","journal-title":"Tamkang Journal of Science and Engineering"},{"issue":"6","key":"5_CR9","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1109\/TMM.2005.858412","volume":"7","author":"H.Y.S. Lin","year":"2005","unstructured":"Lin, H.Y.S., Liao, H.Y.M., Lu, C.H., et al.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia\u00a07(6), 997\u20131006 (2005)","journal-title":"IEEE Trans. Multimedia"},{"key":"5_CR10","first-page":"613","volume":"6","author":"C. Rey","year":"2002","unstructured":"Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing\u00a0(6), 613\u2013621 (2002)","journal-title":"EURASIP Journal on Applied Signal Processing"},{"issue":"10","key":"5_CR11","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/5.959338","volume":"89","author":"F. Bartolini","year":"2001","unstructured":"Bartolini, F., Tefas, A., Barni, M., et al.: Image authentication techniques for surveillance applications. Proc. of IEEE\u00a089(10), 1403\u20131418 (2001)","journal-title":"Proc. of IEEE"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Lin, C.Y., Chang, S.F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: Proc. SPIE Security and Watermarking of Multimedia Contents II EI 2000, pp. 140\u2013151 (2000)","DOI":"10.1117\/12.384968"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Lin, E.T., Podilchuk, C.I., Delp, J.: Detection of Image Alterations using semi-fragile watermarks. In: Proc. SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol.\u00a03971, pp. 152\u2013163 (2000)","DOI":"10.1117\/12.384969"},{"issue":"10","key":"5_CR14","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TCSVT.2006.881857","volume":"16","author":"D. Zou","year":"2006","unstructured":"Zou, D., Shi, Y.Q., Ni, Z., et al.: A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform. IEEE Trans. Circuits and Systems for Video Technology\u00a016(10), 1294\u20131300 (2006)","journal-title":"IEEE Trans. Circuits and Systems for Video Technology"},{"issue":"5","key":"5_CR15","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.image.2007.03.004","volume":"22","author":"X.Z. Zhu","year":"2007","unstructured":"Zhu, X.Z., Ho, A.T.S., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Elsevier Signal Processing: Image Communication\u00a022(5), 515\u2013528 (2007)","journal-title":"Elsevier Signal Processing: Image Communication"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Li, C.T., Zhao, H.J.: Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain. In: Proc. Third International Symposium on Information Assurance and Security, pp. 478\u2013483 (2007)","DOI":"10.1109\/IAS.2007.46"},{"key":"5_CR17","unstructured":"Yu, G.J., Lu, C.S., Liao, H.Y.M., et al.: Mean quantization blind watermarking for image authentication. In: Proc. IEEE International Conference on Image Processing, vol.\u00a03, pp. 706\u2013709 (2000)"},{"issue":"7","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D. Kundur","year":"1999","unstructured":"Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE\u00a087(7), 1167\u20131180 (1999)","journal-title":"Proc. IEEE"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, Q.: A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents IX, vol.\u00a06505 (2007)","DOI":"10.1117\/12.704723"},{"issue":"2","key":"5_CR20","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J. Luk\u00e1\u0161","year":"2006","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Digital Camera Identification From Sensor Pattern Noise. IEEE Trans. on Information Security and Forensics\u00a01(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. on Information Security and Forensics"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-92238-4_3","volume-title":"Digital Watermarking","author":"M.K. Johnson","year":"2008","unstructured":"Johnson, M.K., Farid, H.: Detecting photographic composites of people. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol.\u00a05041, pp. 19\u201333. Springer, Heidelberg (2008)"},{"key":"5_CR22","unstructured":"Khanna, N., Mikkilineni, A.K., Delp, E.J.: Forensic Camera Classification: Verification of Sensor Pattern Noise Approach. Forensic Science Communications (FSC)\u00a011(1) (2009)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 691\u2013700 (2002)","DOI":"10.1117\/12.465330"},{"key":"5_CR24","unstructured":"Wong, P.: A Watermark for Image Integrity and Ownership Verification. In: Proc. IS and T PIC (1998)"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1109\/LSP.2007.896436","volume":"14","author":"X. Zhang","year":"2007","unstructured":"Zhang, X., Wang, S.: Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Processing Letters\u00a014, 727\u2013730 (2007)","journal-title":"IEEE Signal Processing Letters"},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TMM.2008.2007334","volume":"10","author":"X. Zhang","year":"2008","unstructured":"Zhang, X., Wang, S.: Fragile Watermarking With Error-Free Restoration Capability. IEEE Transactions on Multimedia\u00a010, 1490\u20131499 (2008)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"8","key":"5_CR27","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1016\/j.sigpro.2009.02.009","volume":"89","author":"H.J. He","year":"2009","unstructured":"He, H.J., Zhang, J.S., Chen, F.: Adjacent-block based statistical detection method for self-embedding watermarking techniques. IEEE Signal Processing\u00a089(8), 1557\u20131566 (2009)","journal-title":"IEEE Signal Processing"},{"issue":"14","key":"5_CR28","doi-asserted-by":"publisher","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","volume":"282","author":"V. Aslantas","year":"2009","unstructured":"Aslantas, V., Ozer, S., Ozturk, S.: Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt. Commun.\u00a0282(14), 2806\u20132817 (2009)","journal-title":"Opt. Commun."},{"issue":"4","key":"5_CR29","doi-asserted-by":"publisher","first-page":"470011","DOI":"10.1117\/1.3115473","volume":"48","author":"F. Yeh","year":"2009","unstructured":"Yeh, F., Lee, G.: Pyramid-structure-based reversible fragile watermarking. Optical Engineering\u00a048(4), 470011\u20134700111 (2009)","journal-title":"Optical Engineering"},{"key":"5_CR30","first-page":"497","volume":"4","author":"Z. Ni","year":"2008","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., et al.: Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication. IEEE Trans. on Circuits and Systems for Video Technology\u00a0(4), 497\u2013509 (2008)","journal-title":"IEEE Trans. on Circuits and Systems for Video Technology"},{"key":"5_CR31","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1117\/12.384969","volume-title":"Proc. of Security and Watermarking of Multimedia Contents","author":"E.T. Lin","year":"2000","unstructured":"Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: Proc. of Security and Watermarking of Multimedia Contents, vol.\u00a03971, pp. 152\u2013163. SPIE, CA (2000)"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Lee, H., Rhee, K.: Reversible data embedding for tamper-proof watermarks. In: Innovative Computing, Information and Control (ICICIC 2006), vol.\u00a03, pp. 487\u2013490 (2006)","DOI":"10.1109\/ICICIC.2006.510"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: IEEE International Conference on Image Processing, vol.\u00a03, pp. 792\u2013796 (1999)","DOI":"10.1109\/ICIP.1999.817228"},{"issue":"1","key":"5_CR34","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/TMM.2005.861293","volume":"8","author":"K. Maeno","year":"2006","unstructured":"Maeno, K., Sun, Q., Chang, S., et al.: New Semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans. Multimedia\u00a08(1), 32\u201345 (2006)","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"5_CR35","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1093\/ietfec\/e88-a.3.787","volume":"88","author":"K. Ding","year":"2005","unstructured":"Ding, K., He, C., Jiang, L.G., et al.: Wavelet-Based Semi-Fragile Watermarking with Tamper Detection. IEICE Transactions on Fundamentals of Electronics\u00a088(3), 787\u2013790 (2005)","journal-title":"IEICE Transactions on Fundamentals of Electronics"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Zhao, X., Ho, A.T.S., Treharne, H., et al.: A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), vol.\u00a01, pp. 283\u2013286 (2007)","DOI":"10.1109\/IIH-MSP.2007.50"},{"issue":"8","key":"5_CR37","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/TCOM.1974.1092335","volume":"22","author":"W. Pratt","year":"1974","unstructured":"Pratt, W., Chen, W.H., Welch, L.: Slant transform image coding. IEEE Trans. on Communications\u00a022(8), 1075\u20131093 (1974)","journal-title":"IEEE Trans. on Communications"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Zhu, X., Ho, A.T.S.: A slant transform watermarking for copyright protection of satellite images. In: Fourth Pacific Rim Conference on Multimedia, vol.\u00a02, pp. 1178\u20131181 (2003)","DOI":"10.1109\/ICICS.2003.1292646"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Hou, Z., Xu, N., Chen, H., et al.: Fast slant transform with sequency increment and its application in image compression. In: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, vol.\u00a07, pp. 4085\u20134089 (2004)","DOI":"10.1109\/ICMLC.2004.1384555"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Zhao, X., Ho, A.T.S., Shi, Y.Q.: Image forensics using generalised Benford\u2019s Law for accurate detection of unknown JPEG compression in watermarked images. In: 16th International Conference on Digital Signal Processing, DSP 2009 (2009), doi:10.1109\/ICDSP.2009.5201261","DOI":"10.1109\/ICDSP.2009.5201261"},{"key":"5_CR41","first-page":"551","volume":"78","author":"F. Benford","year":"1938","unstructured":"Benford, F.: The law of anomalous numbers. Proc. American Philosophical Society\u00a078, 551\u2013572 (1938)","journal-title":"Proc. American Philosophical Society"},{"key":"5_CR42","doi-asserted-by":"publisher","first-page":"322","DOI":"10.2307\/2974952","volume":"102","author":"T.P. Hill","year":"1995","unstructured":"Hill, T.P.: The significant-Digit Phenomenon. American Mathematical Monthly\u00a0102, 322\u2013327 (1995)","journal-title":"American Mathematical Monthly"},{"key":"5_CR43","first-page":"17","volume":"v","author":"C. Durtschi","year":"2004","unstructured":"Durtschi, C., Hillison, W., Pacini, C.: The effective use of Benfords Law to assist in detecting fraud in accounting data. Journal of Forensic Accounting\u00a0v, 17\u201334 (2004)","journal-title":"Journal of Forensic Accounting"},{"key":"5_CR44","unstructured":"Nigrini, M.J.: Ive got your number. Journal of Accountancy (1999)"},{"key":"5_CR45","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1023\/A:1008363415314","volume":"14","author":"J.M. Jolion","year":"2001","unstructured":"Jolion, J.M.: Images and Benfords Law. Journal of Mathematical Imaging and Vision\u00a014, 73\u201381 (2001)","journal-title":"Journal of Mathematical Imaging and Vision"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Perez-Gonzalez, F., Heileman, G.L., Abdallah, C.T.: Benford\u2019s Law in Image Processing. In: Proc. IEEE International Conference on Image Processing, vol.\u00a01, pp. 405\u2013408 (2007)","DOI":"10.1109\/ICIP.2007.4378977"},{"key":"5_CR47","unstructured":"Schaefer, G., Stich, M.: UCID - An Uncompressed Colour Image Database. In: Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp. 472\u2013480 (2004)"},{"key":"5_CR48","first-page":"204","volume-title":"The Reconfigured Eye","author":"M.J. Mitchell","year":"1992","unstructured":"Mitchell, M.J.: The Reconfigured Eye, pp. 204\u2013208. MIT Press, Cambridge (1992), ISBN: 978-0262631600"},{"key":"5_CR49","first-page":"505","volume-title":"Methods for Identification of Images Acquired with Digital Cameras","author":"Z.J. Gearadts","year":"2001","unstructured":"Gearadts, Z.J., Bijhold, J., Kieft, M., et al.: Methods for Identification of Images Acquired with Digital Cameras, vol.\u00a04232, pp. 505\u2013512. SPIE Press, CA (2001)"},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Choi, K.S., Lam, E.Y., Wong, K.K.Y.: Source Camera Identification Using Footprints From Lens Aberration. In: Proc. SPIE Electronic Imaging, vol.\u00a06069, pp. 172\u2013179 (2006)","DOI":"10.1117\/12.649775"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Digital \u201cBullet Scratches\u201d for Images. In: IEEE International Conference on Image Processing, vol.\u00a03, pp. 65\u201368 (2005)","DOI":"10.1109\/ICIP.2005.1530329"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., Goljan, M.: Detecting Digital Image Forgeries using Sensor Pattern Noise. In: Proc. SPIE Electronic Imaging, vol.\u00a06072, pp. 362\u2013372 (2006)","DOI":"10.1117\/12.640109"},{"key":"5_CR53","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSPEC.2009.5186556","volume":"46","author":"H. Farid","year":"2009","unstructured":"Farid, H.: Seeing Is Not Believing. IEEE Spectrum\u00a046, 42\u201347 (2009)","journal-title":"IEEE Spectrum"},{"key":"5_CR54","volume-title":"Statistical Quality Design and Control: Contemporary Concepts and Methods","author":"R.E. DeVor","year":"1992","unstructured":"DeVor, R.E., Chang, T., Sutherland, J.: Statistical Quality Design and Control: Contemporary Concepts and Methods. Prentice Hall, Englewood Cliffs (1992), ISBN: 978-0023291807"},{"key":"5_CR55","unstructured":"Shewhart, A.W.: Economic Control of Quality of Manufactured Product. American Society for Quality (1931), ISBN: 978-0873890762"},{"key":"5_CR56","unstructured":"Ford Motor Company, Continuing Process Control and Process Capability Improvement. Manual Published by Statistical Methods Office (1984)"},{"key":"5_CR57","unstructured":"Ho, A.T.S., Henriksson, C.: Improving Product Quality in a Pulp Mill Using Statistical Process Control (SPC). In: IEEE Canadian Conference on Electrical and Computer Engineering, pp. 1139\u20131143 (1993)"},{"key":"5_CR58","first-page":"37","volume":"95","author":"A.T.S. Ho","year":"1994","unstructured":"Ho, A.T.S., Henriksson, C.: Improvement of Product Uniformity Using Statistical Process Control (SPC) in a BCTMP Mill. Pulp and Paper Canada\u00a095, 37\u201340 (1994)","journal-title":"Pulp and Paper Canada"},{"key":"5_CR59","first-page":"52","volume":"84","author":"A.L. Guillory","year":"1988","unstructured":"Guillory, A.L.: Statistical Process Control in a Paper Mill. Chemical Engineering Progress\u00a084, 52\u201357 (1988)","journal-title":"Chemical Engineering Progress"},{"key":"5_CR60","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1136\/qhc.12.6.458","volume":"12","author":"J.C. Benneyan","year":"2003","unstructured":"Benneyan, J.C., Lloyd, R.C., Plsek, P.E.: Statistical Process Control as a Tool for Research and Healthcare Improvement. Qual. Saf. Health Care\u00a012, 458\u2013464 (2003)","journal-title":"Qual. Saf. Health Care"},{"key":"5_CR61","unstructured":"Bateman, P., Ho, A.T.S., Woodward, A.: Camera Identification using Statistical Process Control Techniques for Anomaly Detection. Accepted for International Conference on Information, Communications, and Signal Processing (2009)"}],"container-title":["Studies in Computational Intelligence","Multimedia Analysis, Processing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19551-8_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T04:39:20Z","timestamp":1741149560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19551-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195501","9783642195518"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19551-8_5","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2011]]}}}