{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T08:57:01Z","timestamp":1710406621125},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2012,1,29]],"date-time":"2012-01-29T00:00:00Z","timestamp":1327795200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s00521-012-0841-5","type":"journal-article","created":{"date-parts":[[2012,1,28]],"date-time":"2012-01-28T01:17:01Z","timestamp":1327713421000},"page":"283-291","source":"Crossref","is-referenced-by-count":1,"title":["Hiding traces of double compression in JPEG images based on Tabu Search"],"prefix":"10.1007","volume":"22","author":[{"given":"Shen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,29]]},"reference":[{"key":"841_CR1","unstructured":"Wang S, Yang B, Niu XM (2010) A novel scheme for digital image disguise. J Sichuan Univ 47(10):27\u201330"},{"issue":"3","key":"841_CR2","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"Lin CC, Shiu PF (2010) High capacity data hiding scheme for DCT-based images. J Inf Hiding Multimedia Signal Process 1(3):220\u2013240","journal-title":"J Inf Hiding Multimedia Signal Process"},{"issue":"2","key":"841_CR3","first-page":"142","volume":"2","author":"B Li","year":"2011","unstructured":"Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimedia Signal Process 2(2):142\u2013172","journal-title":"J Inf Hiding Multimedia Signal Process"},{"issue":"4","key":"841_CR4","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s00500-008-0326-8","volume":"13","author":"HC Huang","year":"2009","unstructured":"Huang HC, Chen YH (2009) Genetic fingerprinting for copyright protection of multicast media. Soft Comput 13(4):383\u2013391","journal-title":"Soft Comput"},{"issue":"4","key":"841_CR5","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TIFS.2010.2068289","volume":"5","author":"R Tao","year":"2010","unstructured":"Tao R, Meng XY, Wang Y (2010) Image encryption with multi-orders fractional fourier transforms. IEEE Trans Inf Forensics Security 5(4):734\u2013738","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"841_CR6","doi-asserted-by":"crossref","unstructured":"Barni M, Cox IJ, Kalker T (2005) Digital watermarking. In: Proceedings of 4th international workshop on digital watermarking, vol 3710, p 171","DOI":"10.1007\/11551492"},{"key":"841_CR7","doi-asserted-by":"crossref","unstructured":"Akhaee MA, Sahraeian SME, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment. Image Process IEEE Trans 19(4):967\u2013980","DOI":"10.1109\/TIP.2009.2038774"},{"key":"841_CR8","doi-asserted-by":"crossref","unstructured":"Zhang H, Martin S, Niu XM (2007) The design and application of PHABS: a novel benchmark platform for perceptual hashing algorithms. In: Proceedings of IEEE international conference on multimedia and expo. IEEE, Beijing, pp 887\u2013890","DOI":"10.1109\/ICME.2007.4284793"},{"key":"841_CR9","doi-asserted-by":"crossref","unstructured":"Hamon K, Schmucker M, Xuebing Z (2006) Histogram based perceptual hashing for minimally changing video sequences. In: Proceedings of 2nd international conference on automated production of cross media content for multi channel distribution (AXM EDIS). IEEE, Leeds, pp 236\u2013241","DOI":"10.1109\/AXMEDIS.2006.30"},{"issue":"2","key":"841_CR10","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758\u2013767","journal-title":"IEEE Trans Signal Process"},{"key":"841_CR11","doi-asserted-by":"crossref","DOI":"10.1145\/1073170.1073171","volume-title":"Exposing digital forgeries by detecting inconsistencies in lighting","author":"MK Johnson","year":"2005","unstructured":"Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. ACM Multimedia and Security Workshop, New York"},{"key":"841_CR12","unstructured":"Fridrich J, Soukal D, Lukas J (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop"},{"key":"841_CR13","unstructured":"Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004-515, Dartmouth College"},{"key":"841_CR14","unstructured":"Fridrich J, Goljan M, Hogea D (2002) Steganalysis of JPEG images: breaking the F5 algorithm. In: 5th information hiding workshop, pp 310\u2013323"},{"key":"841_CR15","unstructured":"Watson AB (1993) DCT quantization matrices visually optimized for individual images. Hum Vis Visual Process Digital Display IV:202\u2013216. SPIE 1913-14"},{"key":"841_CR16","doi-asserted-by":"crossref","unstructured":"Lam EY, Goodman JW (2000) A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans Image Process 9(10):1661\u20131666","DOI":"10.1109\/83.869177"},{"issue":"2","key":"841_CR17","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1287\/ijoc.6.2.126","volume":"6","author":"R Battiti","year":"1994","unstructured":"Battiti R, Tecchiolli G (1994) The reactive tabu search. ORSA J Comput 6(2):126\u2013140","journal-title":"ORSA J Comput"},{"issue":"16","key":"841_CR18","doi-asserted-by":"crossref","first-page":"3379","DOI":"10.1016\/j.ins.2011.04.007","volume":"181","author":"HC Huang","year":"2011","unstructured":"Huang HC, Chu SC, Pan JS, Huang CY, Liao BY (2011) Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf Sci 181(16):3379\u20133396","journal-title":"Inf Sci"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-012-0841-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-012-0841-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-012-0841-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,23]],"date-time":"2019-06-23T00:19:22Z","timestamp":1561249162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-012-0841-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,29]]},"references-count":18,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["841"],"URL":"https:\/\/doi.org\/10.1007\/s00521-012-0841-5","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,29]]}}}