{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T16:07:46Z","timestamp":1750867666189,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2020M683051"],"award-info":[{"award-number":["2020M683051"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities, Sun Yat-sen University","award":["67000-31610131"],"award-info":[{"award-number":["67000-31610131"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s00530-021-00778-6","type":"journal-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T08:03:51Z","timestamp":1618214631000},"page":"1075-1089","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics"],"prefix":"10.1007","volume":"27","author":[{"given":"Jianyuan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1354-9230","authenticated-orcid":false,"given":"Jianhua","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,12]]},"reference":[{"key":"778_CR1","volume-title":"JPEG Still Image Data Compression Standard","author":"B Pennebaker","year":"1993","unstructured":"Pennebaker, B., Mitchell, L.: JPEG Still Image Data Compression Standard. Van Nostrand Reinhold, New York (1993)"},{"issue":"2","key":"778_CR2","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TIP.2002.807361","volume":"12","author":"Z Fan","year":"2003","unstructured":"Fan, Z., de Queiroz, R.: Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans. Image Process. 12(2), 230\u2013235 (2003)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"778_CR3","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TIFS.2011.2170836","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi, T., Piva, A.: Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842\u2013848 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"778_CR4","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1109\/TIFS.2014.2317949","volume":"9","author":"W Fan","year":"2014","unstructured":"Fan, W., Wang, K., Cayre, F., Xiong, Z.: JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality. IEEE Trans. Inf. Forensics Secur. 9(8), 1211\u20131226 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"778_CR5","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1109\/TIP.2007.891788","volume":"16","author":"A Foi","year":"2007","unstructured":"Foi, A., Katkovnik, V., Egiazarian, K.: Pointwise shape-adaptive dct for high-quality denoising and deblocking of grayscale and color images. IEEE Trans. Image Process. 16(5), 1395\u20131411 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"778_CR6","doi-asserted-by":"publisher","first-page":"4613","DOI":"10.1109\/TIP.2013.2274386","volume":"22","author":"X Zhang","year":"2013","unstructured":"Zhang, X., Xiong, R., Fan, X., Ma, S., Gao, W.: Compression artifact reduction by overlapped-block transform coefficient estimation with block similarity. IEEE Trans. Image Process. 22(12), 4613\u20134626 (2013)","journal-title":"IEEE Trans. Image Process."},{"key":"778_CR7","doi-asserted-by":"crossref","unstructured":"Galteri, L., Seidenari, L., Bertini, M. Bimbo, A.D.: Deep generative adversarial compression artifact removal. In: IEEE International Conference on Computer Vision (ICCV), pp. 4836\u20134845 (2017)","DOI":"10.1109\/ICCV.2017.517"},{"issue":"2","key":"778_CR8","first-page":"63","volume":"24","author":"P Svoboda","year":"2016","unstructured":"Svoboda, P., Hradis, M., Barina, D., Zemcik, P.: Compression artifacts removal using convolutional neural networks. J. WSCG 24(2), 63\u201372 (2016)","journal-title":"J. WSCG"},{"key":"778_CR9","doi-asserted-by":"crossref","unstructured":"Stamm, M.C., Tjoa, S.K., Lin, W.S., Liu, K.J.R.: Anti-forensics of JPEG compression. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1694\u20131697 (2010)","DOI":"10.1109\/ICASSP.2010.5495491"},{"key":"778_CR10","doi-asserted-by":"crossref","unstructured":"Lai, S., B\u00f6hme, R.: Countering counter-forensics: the case of JPEG compression. In: 5th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), pp. 285\u2013298 (2011)","DOI":"10.1007\/978-3-642-24178-9_20"},{"key":"778_CR11","doi-asserted-by":"crossref","unstructured":"Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: International Conference on Pattern Recognition (ICPR), pp. 2366\u20132369 (2010)","DOI":"10.1109\/ICPR.2010.579"},{"key":"778_CR12","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Neural Information Processing Systems (NIPS), pp. 2672\u20132680 (2014)"},{"key":"778_CR13","unstructured":"Yu, K., Dong, C., Loy, C.C., Tang, X.: Deep convolution networks for compression artifacts reduction. arXiv:1608.02778 (2016)"},{"issue":"3","key":"778_CR14","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MC Stamm","year":"2011","unstructured":"Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050\u20131065 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"778_CR15","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. In: International Conference on Learning Representations (ICLR) (2016)"},{"key":"778_CR16","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets. arXiv:1411.1784 (2014)"},{"key":"778_CR17","unstructured":"Brock, A., Donahue, J., Simonyan, K.: Large scale gan training for high fidelity natural image synthesis. In: International Conference on Learning Representations (ICLR) (2019)"},{"key":"778_CR18","doi-asserted-by":"crossref","unstructured":"Isola, P., et al.: Image-to-image translation with conditional adversarial networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1125\u20131134 (2017)","DOI":"10.1109\/CVPR.2017.632"},{"key":"778_CR19","unstructured":"Kim, T., et al.: Learning to discover cross-domain relations with generative adversarial networks. In: 34th International Conference on Machine Learning (ICML), pp. 1857\u20131865 (2017)"},{"key":"778_CR20","doi-asserted-by":"crossref","unstructured":"Ledig, C., Theis, L., Husz\u00e1r, F., Caballero, J., Aitken, A., Tejani, A., Totz, J., Wang, Z., Shi, W.: Photo-realistic single image super-resolution using a generative adversarial network. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4681\u20134690 (2017)","DOI":"10.1109\/CVPR.2017.19"},{"key":"778_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Tian, Y., Kong, Y, Zhong, B., Fu, Y.: Residual dense network for image super-resolution. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2472\u20132481 (2018)","DOI":"10.1109\/CVPR.2018.00262"},{"key":"778_CR22","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: 27th International Conference on Machine Learning (ICML), pp. 807\u2013814 (2010)"},{"key":"778_CR23","unstructured":"Ba, J.L., Kiros, J.R., Hinton, G.E.: Layer normalization. arXiv:1607.06450 (2016)"},{"key":"778_CR24","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. arXiv:1502.0316 (2015)"},{"key":"778_CR25","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.: Improved training of wasserstein GAN. In: Neural Information Processing Systems (NIPS), pp. 5767\u20135777 (2017)"},{"issue":"1","key":"778_CR26","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TCI.2016.2644865","volume":"3","author":"H Zhao","year":"2017","unstructured":"Zhao, H., Gallo, O., Frosio, I., Kautz, J.: Loss functions for image restoration with neural networks. IEEE Trans. Comput. Imaging 3(1), 47\u201357 (2017)","journal-title":"IEEE Trans. Comput. Imaging"},{"key":"778_CR27","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zi, H., Zhang, Q., Kang, X.: Anti-forensics of JPEG compression using generative adversarial networks. In: European Signal Processing Conference (EUSIPCO), pp. 957\u2013961 (2018)","DOI":"10.23919\/EUSIPCO.2018.8553259"},{"issue":"10","key":"778_CR28","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1109\/83.869177","volume":"9","author":"EY Lam","year":"2000","unstructured":"Lam, E.Y., Goodman, J.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process. 9(10), 1661\u20131666 (2000)","journal-title":"IEEE Trans. Image Process."},{"key":"778_CR29","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard, M., et al.: TensorFlow: a system for large-scale machine learning. In:12th USENIX Conference on Operating Systems Design and Implementation (OSDI), pp. 265\u2013283 (2016)"},{"key":"778_CR30","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., Pevny, T.: Break our steganographic system\u2014the ins and outs of organizing BOSS. In: 13th International Conference on Information Hiding (IH), pp. 59\u201370 (2011)","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"778_CR31","unstructured":"Bas, P., Furon, T.: BOWS-2 contest (break our watermarking system). Organized between the 17th of July 2007 and the 17th of April 2008 (2008)"},{"key":"778_CR32","unstructured":"Schaefer, G., Stich, M.: UCID\u2014an uncompressed colour image database, In: Society of Photo-Optical Instrumentation Engineers (SPIE), pp. 472\u2013480 (2004)"},{"key":"778_CR33","unstructured":"Kingma, D., Ba, J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (ICLR) (2015)"},{"issue":"3","key":"778_CR34","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480\u2013491 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"778_CR35","doi-asserted-by":"crossref","unstructured":"Fan, W., Wang, K., Cayre, F., Xiong, Z.: A variational approach to JPEG anti-forensics. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 3058\u20133062 (2013)","DOI":"10.1109\/ICASSP.2013.6638220"},{"issue":"2","key":"778_CR36","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TIFS.2012.2234117","volume":"8","author":"G Valenzise","year":"2013","unstructured":"Valenzise, G., Tagliasacchi, M., Tubaro, S.: Revealing the traces of JPEG compression anti-forensics. IEEE Trans. Inf. Forensics Secur. 8(2), 335\u2013349 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"778_CR37","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691\u20132706 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"778_CR38","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TCSVT.2016.2599849","volume":"28","author":"H Li","year":"2016","unstructured":"Li, H., Luo, W., Qiu, X., Huang, J.: Identification of various image operations using residual-based features. IEEE Trans. Circuits Syst. Video Technol. 28(1), 31\u201345 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"778_CR39","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2011","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"27","key":"778_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C Chang","year":"2011","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(27), 1\u201327 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"2","key":"778_CR41","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/LSP.2017.2782363","volume":"25","author":"D Kim","year":"2018","unstructured":"Kim, D., Jang, H.U., Mun, S.M., Choi, S., Lee, H.K.: Median filtered image restoration and anti-forensics using adversarial networks. IEEE Signal Process. Lett. 25(2), 278\u2013282 (2018)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"778_CR42","first-page":"043037","volume":"27","author":"B Zheng","year":"2018","unstructured":"Zheng, B., Sun, R., Tian, X., Chen, Y.: S-net: a scalable convolutional neural network for jpeg compression artifact reduction. J. Electron. Imaging 27(4), 043037 (2018)","journal-title":"J. Electron. Imaging"},{"key":"778_CR43","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations (ICLR) (2015)"},{"key":"778_CR44","unstructured":"Zhang, H., Goodfellow, I., Metaxas, D., Odena, A.: Self-attention generative adversarial networks. arXiv:1805.08318 (2018)"},{"issue":"10","key":"778_CR45","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang, W., Tan, S., Li, B., Huang, J.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547\u20131551 (2017)","journal-title":"IEEE Signal Process. Lett."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00778-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-021-00778-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00778-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T07:04:18Z","timestamp":1637046258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-021-00778-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,12]]},"references-count":45,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["778"],"URL":"https:\/\/doi.org\/10.1007\/s00530-021-00778-6","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2021,4,12]]},"assertion":[{"value":"7 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}