{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:51:39Z","timestamp":1725742299344},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400988"},{"type":"electronic","value":"9783642400995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40099-5_29","type":"book-chapter","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T16:32:17Z","timestamp":1374683537000},"page":"344-357","source":"Crossref","is-referenced-by-count":2,"title":["Robust Median Filtering Detection Based on Filtered Residual"],"prefix":"10.1007","author":[{"given":"Anjie","family":"Peng","sequence":"first","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. In: Proc. SPIE, Electronic Imaging, Media Forensics and Security II, vol.\u00a07541, pp. 1\u201312 (2010)","key":"29_CR1","DOI":"10.1117\/12.839100"},{"issue":"4","key":"29_CR2","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"H. Yuan","year":"2011","unstructured":"Yuan, H.: Blind Forensics of Median Filtering in Digital Images. IEEE Trans. Inf. Forensics Security\u00a06(4), 1335\u20131345 (2011)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"doi-asserted-by":"crossref","unstructured":"Cao, G., Zhao, Y., Ni, R., Yu, L., Tian, H.: Forensic detection of median filtering in digital images. In: Proc. 2010 IEEE Int. Conf. Multimedia and Expo. 2010, pp. 89\u201394 (2010)","key":"29_CR3","DOI":"10.1109\/ICME.2010.5583869"},{"issue":"2","key":"29_CR4","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"A.C. Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of re-sampling. IEEE Transactions on Signal Processing\u00a053(2), 758\u2013767 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"3","key":"29_CR5","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"W.Q. Luo","year":"2010","unstructured":"Luo, W.Q., Huang, J.W., Qiu, G.P.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Security\u00a05(3), 480\u2013491 (2010)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"doi-asserted-by":"crossref","unstructured":"Stamm, M., Liu, K.J.R.: Forensic estimation and reconstruction of a contrast enhancement mapping. In: International Conf. on Acoustics, Speech and Signal Processing, Dallas, Texas, USA (2010)","key":"29_CR6","DOI":"10.1109\/ICASSP.2010.5495488"},{"issue":"3","key":"29_CR7","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"M.C. Stamm","year":"2011","unstructured":"Stamm, M.C., Ray Liu, K.J.: Anti-Forensics of Digital Image Compression. IEEE Trans. Inf. Forensics Security\u00a06(3), 1050\u20131065 (2011)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N.: Image tamper detection based on demosaicing artifacts. In: International Conference Proceedings on Image Processing, Cairo, pp. 1497\u20131500 (2009)","key":"29_CR8","DOI":"10.1109\/ICIP.2009.5414611"},{"issue":"4","key":"29_CR9","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TIFS.2008.2008214","volume":"3","author":"M. Kirchner","year":"2008","unstructured":"Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Security\u00a03(4), 582\u2013592 (2008)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"doi-asserted-by":"crossref","unstructured":"Ker, A.D., Bohme, R.: Revisiting weighted stego-image stegoanalysis. In: Proceedings of SPIE, Electronic Imaging: Security, Forensics, Steganography and Watermarking of Multimedia Contents X, vol.\u00a06819, p. 5 (2008)","key":"29_CR10","DOI":"10.1117\/12.766820"},{"issue":"4","key":"29_CR11","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/TASSP.1987.1165153","volume":"35","author":"A.C. Bovik","year":"1987","unstructured":"Bovik, A.C.: Streaking in median filtered images. IEEE Transactions on Acoustics, Speech and Signal Processing\u00a035(4), 493\u2013503 (1987)","journal-title":"IEEE Transactions on Acoustics, Speech and Signal Processing"},{"issue":"1","key":"29_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TIFS.2007.916010","volume":"3","author":"A. Swaminathan","year":"2008","unstructured":"Swaminathan, A., Wu, M., Liu, K.J.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensics Security\u00a03(1), 101\u2013117 (2008)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"doi-asserted-by":"crossref","unstructured":"Chuang, W.H., Swaminathan, A., Wu, M.: Tampering identification using empirical frequency response. In: Proc. IEEE Int. Conf. Acoust., Speech and Signal Processing, pp. 1517\u20131520 (2009)","key":"29_CR13","DOI":"10.1109\/ICASSP.2009.4959884"},{"unstructured":"Schaefer, G., Stich, M.: UCID-An uncompressed color image database. In: Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp. 472\u2013480 (2004)","key":"29_CR14"},{"doi-asserted-by":"crossref","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology\u00a02, 27:1\u201327:27 (2011)","key":"29_CR15","DOI":"10.1145\/1961189.1961199"},{"issue":"2","key":"29_CR16","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T. Pev\u00fd","year":"2010","unstructured":"Pev\u00fd, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Security\u00a05(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-74124-4_17","volume-title":"Information Hiding","author":"Y.Q. Shi","year":"2007","unstructured":"Shi, Y.Q., Chen, C.-H., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"unstructured":"Zo, D., Shi, Y.Q., Su, W., Xuan, G.: Steganalysis based on Markov model of thresholded prediction-error image. In: Proc. IEEE Int. Conf. Multimedia and Expo., Toronto, Canada, July 9-12, pp. 365\u20131368 (2006)","key":"29_CR18"},{"key":"29_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-36373-3_1","volume-title":"Information Hiding","author":"C. Chen","year":"2013","unstructured":"Chen, C., Ni, J., Huang, R., Huang, J.: Blind median filtering detection using statistics in difference domain. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol.\u00a07692, pp. 1\u201315. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermaking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40099-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T03:28:28Z","timestamp":1557977308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40099-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400988","9783642400995"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40099-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}