{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:38:28Z","timestamp":1743266308991,"version":"3.37.3"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T00:00:00Z","timestamp":1555632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11036-019-01255-1","type":"journal-article","created":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T07:02:33Z","timestamp":1555657353000},"page":"1174-1180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Anti-Forensics Contrast Enhancement Detection (AFCED) Technique in Images Based on Laplace Derivative Histogram"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0659-1185","authenticated-orcid":false,"family":"Bharathiraja S","sequence":"first","affiliation":[]},{"family":"Rajesh Kanna B","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,19]]},"reference":[{"issue":"1","key":"1255_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TIFS.2007.916010","volume":"3","author":"A Swaminathan","year":"2008","unstructured":"Swaminathan A, Wu M, Liu KJR (2008) Digital image forensics via intrinsic fingerprints. IEEE Trans Inf Forensics Sec 3(1):101\u2013117","journal-title":"IEEE Trans Inf Forensics Sec"},{"issue":"3","key":"1255_CR2","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","volume":"5","author":"M Stamm","year":"2010","unstructured":"Stamm M, Liu K (2010) Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans Inf Forensics Sec 5(3):492\u2013506","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"1255_CR3","doi-asserted-by":"crossref","unstructured":"Lin X, Li C-T, Hu Y (2013) Exposing image forgery through the detection of contrast enhancement. Proceedings of IEEE international conference on image processing, Melbourne, Australia","DOI":"10.1109\/ICIP.2013.6738920"},{"key":"1255_CR4","unstructured":"Xufeng L, Xingjie W, Chang-Tsun L (2014) two improved forensic methods of detecting contrast enhancement in digital images. Proc SPIE 9028, Media Watermarking, Security, and Forensics"},{"key":"1255_CR5","doi-asserted-by":"crossref","unstructured":"Cao G, Zhao Y, Ni R, Tian H (2010) Anti-forensics of contrast enhancement in digital images. ACM Multimedia and Security Workshop: 25\u201334","DOI":"10.1145\/1854229.1854237"},{"key":"1255_CR6","first-page":"398","volume-title":"10th Int. workshop on digital forensics and watermarking","author":"C-W Kwok","year":"2011","unstructured":"Kwok C-W, Au OC, Chui S-H (2011) Alternative anti-forensics method for contrast enhancement. In: Shi YQ, Kim H-J, P\u00e9rez-Gonz\u00e1lez F (eds) 10th Int. workshop on digital forensics and watermarking. Springer, Verlag, pp 398\u2013410 number 7128 in Lecture Notes in Computer Science"},{"issue":"3","key":"1255_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.4018\/jdcf.2013070103","volume":"5","author":"M Barni","year":"2013","unstructured":"Barni M, Fontani M, Tondi B (2013) A universal attack against histogram-based image forensics. Int J Dig Crime Forens 5(3):35\u201352","journal-title":"Int J Dig Crime Forens"},{"key":"1255_CR8","unstructured":"Comesana-Alfaro P, Perez-Gonzalez F (2013) Optimal counter forensics for histogram-based forensics. IEEE Int Conf Acoustics, Speech and Signal Processing: 3048\u20133052"},{"issue":"5","key":"1255_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-013-4928-0","volume":"57","author":"G Cao","year":"2014","unstructured":"Cao G, Zhao Y, Ni R, Tian H, Yu L (2014) Attacking contrast enhancement forensics in digital images. Sci China Inf Sci 57(5):1\u201313","journal-title":"Sci China Inf Sci"},{"key":"1255_CR10","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/LSP.2015.2389241","volume":"22","author":"A Rosa De","year":"2015","unstructured":"De Rosa A, Fontani M, Massai M, Piva A, Barni M (Aug. 2015) Second order statistics analysis to cope with contrast enhancement counterforensics. IEEE Signal Process Lett 22:1132\u20131136","journal-title":"IEEE Signal Process Lett"},{"key":"1255_CR11","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1088\/0954-898X_14_3_302","volume":"14","author":"A Torralba","year":"2003","unstructured":"Torralba A, Oliva A (2003) Statistics of natural image categories. Netw: Comput Neural Syst 14:391\u2013412","journal-title":"Netw: Comput Neural Syst"},{"key":"1255_CR12","doi-asserted-by":"crossref","unstructured":"Weiss Y, Freeman W (2007) What makes a good model of natural images?. Proc IEEE Conf Computer Vision and Pattern Recognition","DOI":"10.1109\/CVPR.2007.383092"},{"key":"1255_CR13","unstructured":"Huang J, Mumford D (1999) Statistics of natural images and models. Proc IEEE Conference Computer Vision and Pattern Recognition, Fort Collins, CO"},{"key":"1255_CR14","doi-asserted-by":"crossref","unstructured":"Gloe T, B\u00f6hme R (2010) The 'Dresden image database' for benchmarking digital image forensics[C]. Proceedings of the ACM symposium on applied computing:1584\u20131590","DOI":"10.1145\/1774088.1774427"},{"issue":"2","key":"1255_CR15","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/LSP.2015.2509477","volume":"23","author":"H Ravi","year":"2015","unstructured":"Ravi H, Subramanyam AV, Emmanuel S (2015) ACE - an effective anti-forensic contrast enhancement technique. IEEE Signal Process Lett 23(2):212\u2013216","journal-title":"IEEE Signal Process Lett"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01255-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01255-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01255-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T23:16:48Z","timestamp":1587165408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01255-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,19]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1255"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01255-1","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2019,4,19]]},"assertion":[{"value":"19 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}