{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:19:20Z","timestamp":1760955560378},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,10,7]],"date-time":"2015-10-07T00:00:00Z","timestamp":1444176000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Math Imaging Vis"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10851-015-0602-z","type":"journal-article","created":{"date-parts":[[2015,10,7]],"date-time":"2015-10-07T10:56:38Z","timestamp":1444215398000},"page":"269-286","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Quantization-Unaware Double JPEG Compression Detection"],"prefix":"10.1007","volume":"54","author":[{"given":"Ali","family":"Taimori","sequence":"first","affiliation":[]},{"given":"Farbod","family":"Razzazi","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Behrad","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Massoud","family":"Babaie-Zadeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,7]]},"reference":[{"key":"602_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/11-PS175","volume":"8","author":"A Berger","year":"2011","unstructured":"Berger, A., Hill, T.P.: A basic theory of Benford\u2019s law. Probab. Surv. 8, 1\u2013126 (2011)","journal-title":"Probab. Surv."},{"issue":"2","key":"602_CR2","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1109\/TIFS.2011.2170836","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi, T., Piva, A.: Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842\u2013848 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"602_CR3","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi, T., Piva, A.: Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Forensics Secur. 7(3), 1003\u20131017 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"602_CR4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"602_CR5","doi-asserted-by":"crossref","unstructured":"Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double JPEG compression detection. In: IEEE 19th international conference on pattern recognition (ICPR), pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761645"},{"key":"602_CR6","doi-asserted-by":"crossref","unstructured":"Dong, L., Kong, X., Wang, B., You, X.: Double compression detection based on Markov model of the first digits of DCT coefficients. In: IEEE 6th international conference on image and graphics (ICIG), pp. 234\u2013237 (2011)","DOI":"10.1109\/ICIG.2011.100"},{"issue":"2","key":"602_CR7","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TIP.2002.807361","volume":"12","author":"Z Fan","year":"2003","unstructured":"Fan, Z., de Queiroz, R.L.: Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans. Image Process. 12(2), 230\u2013235 (2003)","journal-title":"IEEE Trans. Image Process."},{"key":"602_CR8","unstructured":"Farid, H.: Digital image ballistics from JPEG quantization. Technical Report TR2006-583, Department of Computer Science, Dartmouth College (2006)"},{"issue":"1","key":"602_CR9","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid, H.: Exposing digital forgeries from JPEG ghosts. IEEE Trans. Inform. Forensics. Secur. 4(1), 154\u2013160 (2009)","journal-title":"IEEE Trans. Inform. Forensics. Secur."},{"issue":"2","key":"602_CR10","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid, H.: Image forgery detection. IEEE Signal Process. Mag. 26(2), 16\u201325 (2009)","journal-title":"IEEE Signal Process. Mag."},{"issue":"6","key":"602_CR11","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1109\/TSMC.1973.4309314","volume":"SMC\u20133","author":"RM Haralick","year":"1973","unstructured":"Haralick, R.M., Shanmugam, K., Dinstein, I.H.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC\u20133(6), 610\u2013621 (1973)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"4","key":"602_CR12","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1016\/j.jvcir.2003.11.001","volume":"15","author":"R Hasimoto-Beltr\u00e1n","year":"2004","unstructured":"Hasimoto-Beltr\u00e1n, R., Baqai, S., Khokhar, A.: Transform domain inter-block interleaving schemes for robust image and video transmission in ATM networks. J. Vis. Commun. Image Represent. 15(4), 522\u2013547 (2004)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"9","key":"602_CR13","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21(9), 1263\u20131284 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"602_CR14","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/TIFS.2010.2072921","volume":"5","author":"F Huang","year":"2010","unstructured":"Huang, F., Huang, J., Shi, Y.Q.: Detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inform. Forensics Secur. 5(4), 848\u2013856 (2010)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"602_CR15","volume-title":"Machine Vision","author":"R Jain","year":"1995","unstructured":"Jain, R., Kasturi, R., Schunck, B.G.: Machine Vision. McGraw-Hill, Inc., New York (1995)"},{"key":"602_CR16","volume-title":"Principal Component Analysis","author":"IT Jolliffe","year":"2002","unstructured":"Jolliffe, I.T.: Principal Component Analysis, 2nd edn. Springer Series in Statistics, Springer (2002)","edition":"2"},{"key":"602_CR17","doi-asserted-by":"crossref","first-page":"S21","DOI":"10.1016\/j.diin.2008.05.004","volume":"5","author":"JD Kornblum","year":"2008","unstructured":"Kornblum, J.D.: Using JPEG quantization tables to identify imagery processed by software. The 8th digital forensic research workshop. Digit. Investig. 5, S21\u2013S25 (2008)","journal-title":"Digit. Investig."},{"key":"602_CR18","doi-asserted-by":"crossref","unstructured":"Lai, S., B\u00f6hme, R.: Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In: IEEE 38th international conference on acoustics, speech and signal processing (ICASSP), pp. 3028\u20133032. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638214"},{"issue":"3","key":"602_CR19","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/TIFS.2015.2389148","volume":"10","author":"B Li","year":"2015","unstructured":"Li, B., Ng, T.T., Li, X., Tan, S., Huang, J.: Revealing the trace of high-quality JPEG compression through quantization noise analysis. IEEE Trans. Inf. Forensics Secur. 10(3), 558\u2013573 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"602_CR20","unstructured":"Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features. In: IEEE 10th workshop on multimedia signal processing, pp. 730\u2013735 (2008)"},{"key":"602_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-6180-2012-1","volume":"2012","author":"XH Lin","year":"2012","unstructured":"Lin, X.H., Zhao, Y.Q., Huang, J.: Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP J. Adv. Signal. Process. 2012, 1\u201310 (2012)","journal-title":"EURASIP J. Adv. Signal. Process."},{"issue":"11","key":"602_CR22","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin, Z., He, J., Tang, X., Tang, C.K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 42(11), 2492\u20132501 (2009)","journal-title":"Pattern Recognit."},{"key":"602_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Q., Sung, A.H., Qiao, M.: A method to detect JPEG-based double compression. In: The 8th international conference on advances in neural networks, lecture notes in computer science, Part II, pp. 466\u2013476 (2011)","DOI":"10.1007\/978-3-642-21090-7_55"},{"issue":"2","key":"602_CR24","first-page":"16","volume":"2","author":"Q Liu","year":"2011","unstructured":"Liu, Q., Sung, A.H., Qiao, M.: Neighboring joint density-based JPEG steganalysis. ACM Trans. Intell. Syst. Technol. 2(2), 16 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"3","key":"602_CR25","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480\u2013491 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"602_CR26","doi-asserted-by":"crossref","unstructured":"Mahdian, B., Saic, S.: Detecting double compressed JPEG images. In: IEEE 3rd international conference on crime detection and prevention, pp. 1\u20136 (2009)","DOI":"10.1049\/ic.2009.0240"},{"key":"602_CR27","doi-asserted-by":"crossref","unstructured":"Milani, S., Tagliasacchi, M., Tubaro, S.: Discriminating multiple JPEG compression using first digit features. In: IEEE 37th international conference on acoustics, speech and signal processing (ICASSP), pp. 2253\u20132256 (2012)","DOI":"10.1109\/ICASSP.2012.6288362"},{"key":"602_CR28","doi-asserted-by":"crossref","unstructured":"Narayanan, G., Shi, Y.Q.: A statistical model for quantized AC block DCT coefficients in JPEG compression and its application to detecting potential compression history in bitmap images. In: The 9th international workshop on digital watermarking, lecture notes in computer science, vol. 6526, pp. 75\u201389 (2011)","DOI":"10.1007\/978-3-642-18405-5_7"},{"issue":"12","key":"602_CR29","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1068\/p5321","volume":"33","author":"A Olmos","year":"2004","unstructured":"Olmos, A., Kingdom, F.A.A.: A biologically inspired algorithm for the recovery of shading and reflectance images. Perception 33(12), 1463\u20131473 (2004)","journal-title":"Perception"},{"key":"602_CR30","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Gonz\u00e1lez, F., Heileman, G.L., Abdallah, C.T.: Benford\u2019s law in image processing. In: IEEE international conference on image processing (ICIP), vol. 1, pp. I-405\u2013I-408 (2007)","DOI":"10.1109\/ICIP.2007.4378977"},{"issue":"2","key":"602_CR31","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"T Pevn\u00fd","year":"2008","unstructured":"Pevn\u00fd, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3(2), 247\u2013258 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"602_CR32","doi-asserted-by":"crossref","unstructured":"Piva, A.: An overview on image forensics. ISRN Signal Processing p. article ID 496701 (2013)","DOI":"10.1155\/2013\/496701"},{"key":"602_CR33","doi-asserted-by":"crossref","unstructured":"Popescu, A.C., Farid, H.: Statistical Tools for Digital Forensics. In: The 6th international workshop on information hiding, lecture notes in computer science, vol. 3200, pp. 128\u2013147 (2005)","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"602_CR34","first-page":"472","volume":"5307","author":"G Schaefer","year":"2004","unstructured":"Schaefer, G., Stich, M.: UCID: an uncompressed color image database. Storage Retr. Methods Appl. Multimed. 5307, 472\u2013480 (2004)","journal-title":"Storage Retr. Methods Appl. Multimed."},{"key":"602_CR35","doi-asserted-by":"crossref","first-page":"S88","DOI":"10.1016\/j.diin.2009.06.007","volume":"6","author":"HT Sencar","year":"2009","unstructured":"Sencar, H.T., Memon, N.: Identification and recovery of JPEG files with missing fragments. Digit. Investig. 6, S88\u2013S98 (2009)","journal-title":"Digit. Investig."},{"key":"602_CR36","doi-asserted-by":"crossref","unstructured":"Taimori, A., Razzazi, F., Behrad, A., Ahmadi, A., Babaie-Zadeh, M.: A proper transform for satisfying Benford\u2019s law and its application to double JPEG image forensics. In: IEEE international symposium on signal processing and information technology (ISSPIT), pp. 000240\u2013000244 (2012)","DOI":"10.1109\/ISSPIT.2012.6621294"},{"issue":"1","key":"602_CR37","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/30.125072","volume":"38","author":"GK Wallace","year":"1992","unstructured":"Wallace, G.K.: The JPEG still picture compression standard. IEEE Trans. Consum. Electronics 38(1), 30\u201344 (1992)","journal-title":"IEEE Trans. Consum. Electronics"},{"key":"602_CR38","doi-asserted-by":"crossref","unstructured":"Zach, F., Riess, C., Angelopoulou, E.: Automated image forgery detection through classification of JPEG ghosts. In: Proceedings of joint 34th DAGM and 36th OAGM symposium, lecture notes in computer science, vol. 7476, pp. 185\u2013194 (2012)","DOI":"10.1007\/978-3-642-32717-9_19"}],"container-title":["Journal of Mathematical Imaging and Vision"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10851-015-0602-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10851-015-0602-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10851-015-0602-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T04:44:13Z","timestamp":1567226653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10851-015-0602-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,7]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["602"],"URL":"https:\/\/doi.org\/10.1007\/s10851-015-0602-z","relation":{},"ISSN":["0924-9907","1573-7683"],"issn-type":[{"value":"0924-9907","type":"print"},{"value":"1573-7683","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,7]]}}}