{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:55:49Z","timestamp":1742990149737,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642286926"},{"type":"electronic","value":"9783642286933"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28693-3_5","type":"book-chapter","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T21:36:15Z","timestamp":1330983375000},"page":"63-81","source":"Crossref","is-referenced-by-count":1,"title":["Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection"],"prefix":"10.1007","author":[{"given":"Hong","family":"Cao","sequence":"first","affiliation":[]},{"given":"Alex C.","family":"Kot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Mosleh, F. (kodak): Cameras in Handsets Evolving from Novelty to DSC Performance, Despite Constraints. Embedded.com (2008)"},{"key":"5_CR2","unstructured":"Lewis, J.: Don\u2019t Just Stand and Stare, Shoot it, Too. The Singapore Straits Times, April 28 (2007)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Li, X., Gunturk, B., Zhang, L.: Image Demosaicing: a Systematic Survey. In: Proc. of SPIE, vol.\u00a06822 (2008)","DOI":"10.1117\/12.766768"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TIFS.2006.890307","volume":"2","author":"A. Swaminathan","year":"2007","unstructured":"Swaminathan, A., Wu, M., Liu, K.J.R.: Nonintrusive Component Forensics of Visual Sensors Using Output Images. IEEE Trans. on Information Forensics and Security\u00a02(1), 91\u2013106 (2007)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"McKay, C., Swaminathan, A., Gou, H., Wu, M.: Image Acquisition Forensics: Forensic Analysis to Identify Imaging Source. In: Proc. of ICASSP, pp. 1657\u20131660 (2008)","DOI":"10.1109\/ICASSP.2008.4517945"},{"issue":"1","key":"5_CR6","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TIFS.2007.916010","volume":"3","author":"A. Swaminathan","year":"2008","unstructured":"Swaminathan, A., Wu, M., Liu, K.J.R.: Digital Image Forensics via Intrinsic Fingerprints. IEEE Trans. on Information Forensics and Security\u00a03(1), 101\u2013117 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Cao, H., Kot, A.C.: A Generalized Model for Detection of Demosaicing Characteristics. In: Proc. of ICME, pp. 1513\u20131516 (2008)","DOI":"10.1109\/ICME.2008.4607734"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1109\/TIFS.2009.2033749","volume":"4","author":"H. Cao","year":"2009","unstructured":"Cao, H., Kot, A.C.: Accurate Detection of Demosaicing Regularity for Digital Image Forensics. IEEE Trans. on Information Forensics and Security\u00a04(4), 899\u2013910 (2009)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Cao, H., Kot, A.C.: Mobile Camera Identification Using Demosaicing Features. In: Proc. of ISCAS, pp. 1683\u20131686 (2010)","DOI":"10.1109\/ISCAS.2010.5537502"},{"issue":"2","key":"5_CR10","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J. Lucas","year":"2006","unstructured":"Lucas, J., Fridrich, J., Goljan, M.: Digital Camera Identification from Sensor Pattern Noise. IEEE Trans. Information Forensics and Security\u00a01(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Information Forensics and Security"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M. Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Lucas, J.: Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans. on Information Forensics and Security\u00a03(1), 74\u201389 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Alles, E.J., Geradts, Z.J.M.H., Veenman, C.J.: Source Camera Identification for Low Resolution Heavily Compressed Images. In: Proc. of ICCSA, pp. 557\u2013567 (2008)","DOI":"10.1109\/ICCSA.2008.18"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Tsai, M.-J., Lai, C.-L., Liu, J.: Camera\/Mobile Phone Source Identification for Digital Forensics. In: Proc. of ICASSP, vol.\u00a02, pp. 221\u2013224 (2007)","DOI":"10.1109\/ICASSP.2007.366212"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1155\/ASP.2005.2749","volume":"17","author":"I. Avcibas","year":"2005","unstructured":"Avcibas, I., Kharrazi, M., Memon, N., Sankur, B.: Image Steganalysis with Binary Similarity Measures. EUROSIP Journal of Applied Signal Processing\u00a017, 2749\u20132757 (2005)","journal-title":"EUROSIP Journal of Applied Signal Processing"},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2008.926993","volume":"3","author":"O. Celiktutan","year":"2008","unstructured":"Celiktutan, O., Sankur, B., Avcibas, I.: Blind Identification of Source Cell-Phone Model. IEEE Trans. on Information Forensics and Security\u00a03(3), 553\u2013566 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.: A Classifier Design for Detecting Image Manipulations. In: Proc. of ICIP, vol.\u00a04, pp. 2645\u20132648 (2004)","DOI":"10.1109\/ICIP.2004.1421647"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"41102","DOI":"10.1117\/1.2401138","volume":"15","author":"S. Bayram","year":"2006","unstructured":"Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image Manipulation Detection. Journal of Electronic Imaging\u00a015, 41102 (2006)","journal-title":"Journal of Electronic Imaging"},{"key":"5_CR18","unstructured":"Ng, T.-T., Chang, S.-F., Sun, Q.: Blind Detection of Photomontage Using High Order Statistics. In: Proc. of ISCAS, vol.\u00a05, pp. 688\u2013691 (2004)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: Proc. of ACM Multimedia Security Workshop, pp. 1\u201310 (2005)","DOI":"10.1145\/1073170.1073171"},{"issue":"2","key":"5_CR20","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H. Farid","year":"2009","unstructured":"Farid, H.: A Survey of Image Forgery Detection. IEEE Signal Processing Magazine\u00a026(2), 16\u201325 (2009)","journal-title":"IEEE Signal Processing Magazine"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/11744078_33","volume-title":"Computer Vision \u2013 ECCV 2006","author":"J. He","year":"2006","unstructured":"He, J., Lin, Z., Wang, L., Tang, X.: Detecting Doctored JPEG Images via DCT Coefficient Analysis. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006, Part III. LNCS, vol.\u00a03953, pp. 423\u2013435. Springer, Heidelberg (2006)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, W.: A Generalized Benford\u2019s Law for JPEG Coefficients and its Applications in Image Forensics. In: Proc. of SPIE, vol. 6505, p. 65051L (2007)","DOI":"10.1117\/12.704723"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Chen, W., Shi, Y.Q.: Image Splicing Detection Using 2-D Phase Congruency and Statistical Moments of Characteristic Function. In: Proc. of SPIE, vol. 6505, p. 65050R (2007)","DOI":"10.1117\/12.704321"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Luo, W., Qu, Z., Huang, J., Qiu, G.: A Novel Method for Detecting Cropped and Recompressed Image Blocks. In: Proc. of ICASSP 2007, vol.\u00a02, pp. 217\u2013220 (2007)","DOI":"10.1109\/ICASSP.2007.366211"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Barni, M., Costanzo, L., Sabatini, L.: Identification of Cut & Paste Tampering by Means of Double-JPEG Detection and Image Segmentation. In: Proc. of ISCAS 2010, pp. 1687\u20131690 (2010)","DOI":"10.1109\/ISCAS.2010.5537505"},{"issue":"2","key":"5_CR26","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","volume":"5","author":"C.-T. Li","year":"2010","unstructured":"Li, C.-T.: Source Camera Identification Using Enhanced Sensor Pattern Noise. IEEE Trans. on Information Forensics and Security\u00a05(2), 280\u2013287 (2010)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"issue":"6","key":"5_CR27","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.image.2010.05.003","volume":"25","author":"B. Mahdian","year":"2010","unstructured":"Mahdian, B., Saic, S.: A Bibliography on Blind Methods for Identifying Image Forgery. Signal Processing: Image Communication\u00a025(6), 389\u2013399 (2010)","journal-title":"Signal Processing: Image Communication"},{"issue":"3","key":"5_CR28","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TPAMI.2007.70708","volume":"30","author":"X. Jiang","year":"2008","unstructured":"Jiang, X., Mandal, B., Kot, A.C.: Eigenfeature Regularization and Extraction in Face Recognition. IEEE Trans. on Pattern Analysis and Machine Intelligence\u00a030(3), 383\u2013394 (2008)","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"key":"5_CR29","volume-title":"Pattern Classification","author":"O. Duda","year":"2001","unstructured":"Duda, O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley & Sons, New York (2001)","edition":"2"},{"key":"5_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/11926214_5","volume-title":"Transactions on Data Hiding and Multimedia Security I","author":"M. Kharrazi","year":"2006","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. In: Shi, Y.Q. (ed.) Transactions on DHMS I. LNCS, vol.\u00a04300, pp. 123\u2013137. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Data Hiding and Multimedia Security VII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28693-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T12:28:22Z","timestamp":1742646502000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28693-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642286926","9783642286933"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28693-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}