{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:45:12Z","timestamp":1725749112510},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407789"},{"type":"electronic","value":"9783642407796"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_9","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T11:32:11Z","timestamp":1379331131000},"page":"113-122","source":"Crossref","is-referenced-by-count":13,"title":["Detecting Resized Double JPEG Compressed Images \u2013 Using Support Vector Machine"],"prefix":"10.1007","author":[{"given":"Hieu Cuong","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H. Farid","year":"2009","unstructured":"Farid, H.: Image forgery detection. IEEE Signal Processing Magazine\u00a026, 16\u201325 (2009)","journal-title":"IEEE Signal Processing Magazine"},{"unstructured":"Luk\u00e1\u0161, J., Fridrich, J.: Estimation of Primary Quantization Matrix in Double Compressed JPEG Images. In: Proc. Digital Forensic Research Workshop (2003)","key":"9_CR2"},{"doi-asserted-by":"crossref","unstructured":"Popescu, A.: Statistical Tools for Digital Image Forensics. PhD Thesis (2004)","key":"9_CR3","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z. Lin","year":"2009","unstructured":"Lin, Z., He, J., Tang, X., Tang, C.-K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition\u00a042, 2492\u20132501 (2009)","journal-title":"Pattern Recognition"},{"doi-asserted-by":"crossref","unstructured":"Bianchi, T., De Rosa, A., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: ICASSP 2011, pp. 2444\u20132447 (2011)","key":"9_CR5","DOI":"10.1109\/ICASSP.2011.5946978"},{"doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, W.: A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE, pp. 65051L\u201365051L-11 (2007)","key":"9_CR6","DOI":"10.1117\/12.704723"},{"unstructured":"Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed JPEG images by using Mode Based First Digit Features. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730\u2013735 (2008)","key":"9_CR7"},{"doi-asserted-by":"crossref","unstructured":"Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double JPEG compression detection. In: 2008 19th International Conference on Pattern Recognition, pp. 1\u20134 (2008)","key":"9_CR8","DOI":"10.1109\/ICPR.2008.4761645"},{"doi-asserted-by":"crossref","unstructured":"Luo, W., Qu, Z., Huang, J., Qiu, G.: A Novel Method for Detecting Cropped and Recompressed Image Block. In: IEEE ICASSP 2007, pp. 217\u2013220 (2007)","key":"9_CR9","DOI":"10.1109\/ICASSP.2007.366211"},{"unstructured":"Chen, Y., Hsu, C.: Image Tampering Detection by Blocking Periodicity Analysis in JPEG Compressed Images. In: MMSP 2008, pp. 803\u2013808 (2008)","key":"9_CR10"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TIFS.2011.2170836","volume":"7","author":"T. Bianchi","year":"2012","unstructured":"Bianchi, T., Piva, A.: Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps. IEEE Trans. on Information Forensics and Security\u00a07, 842\u2013848 (2012)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-642-32205-1_33","volume-title":"Digital Forensics and Watermarking","author":"P. Sutthiwan","year":"2012","unstructured":"Sutthiwan, P., Shi, Y.Q.: Anti-Forensics of Double JPEG Compression Detection. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol.\u00a07128, pp. 411\u2013424. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"Kirchner, M., Gloe, T.: On resampling detection in re-compressed images. In: WIFS, pp. 21\u201325 (2009)","key":"9_CR13","DOI":"10.1109\/WIFS.2009.5386489"},{"doi-asserted-by":"crossref","unstructured":"Liu, Q., Sung, A.H.: A new approach for JPEG resize and image splicing detection. In: Proceedings of the First ACM Workshop on Multimedia in Forensics, MiFor 2009, p. 43 (2009)","key":"9_CR14","DOI":"10.1145\/1631081.1631092"},{"doi-asserted-by":"crossref","unstructured":"Bianchi, T., Piva, A.: Reverse engineering of double JPEG compression in the presence of image resizing. In: 2012 IEEE International Workshop on Information Forensics and Security, WIFS, pp. 127\u2013132 (2012)","key":"9_CR15","DOI":"10.1109\/WIFS.2012.6412637"},{"unstructured":"Gallagher, A.C.: Detection of Linear and Cubic Interpolation in JPEG Compressed Images. In: The 2nd Canadian Conference on Computer and Robot Vision, CRV 2005, pp. 65\u201372 (2005)","key":"9_CR16"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","volume":"3","author":"B. Mahdian","year":"2008","unstructured":"Mahdian, B., Saic, S.: Blind Authentication Using Periodic Properties of Interpolation. IEEE Transactions on Information Forensics and Security\u00a03, 529\u2013538 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"A.C. Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing\u00a053, 758\u2013767 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"doi-asserted-by":"crossref","unstructured":"Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, MM&Sec 2008 (2008)","key":"9_CR19","DOI":"10.1145\/1411328.1411333"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-32805-3_1","volume-title":"Communications and Multimedia Security","author":"H.C. Nguyen","year":"2012","unstructured":"Nguyen, H.C., Katzenbeisser, S.: Robust Resampling Detection in Digital Images. In: De Decker, B., Chadwick, D.W. (eds.) CMS 2012. LNCS, vol.\u00a07394, pp. 3\u201315. Springer, Heidelberg (2012)"},{"unstructured":"Schaefer, G., Stich, M.: UCID: an uncompressed color image database. In: Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, pp. 472\u2013480 (2004)","key":"9_CR21"},{"key":"9_CR22","doi-asserted-by":"crossref","first-page":"S21","DOI":"10.1016\/j.diin.2008.05.004","volume":"5","author":"J. Kornblum","year":"2008","unstructured":"Kornblum, J.: Using JPEG quantization tables to identify imagery processed by software. Digital Investigation 5, S21\u2013S25 (2008)","journal-title":"Digital Investigation"},{"unstructured":"Chandra, S., Ellis, C.S.: JPEG Compression Metric as a Quality Aware Image Transcoding. In: Proceedings of USITS 1999 (1999)","key":"9_CR23"},{"unstructured":"Sallee, P.: Matlab JPEG Toolbox, \n                      \n                        http:\/\/www.philsallee.com\/jpegtbx\/index.html","key":"9_CR24"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T10:13:23Z","timestamp":1558088003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40779-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40779-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}