{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T22:21:49Z","timestamp":1773354109392,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2014,3,2]],"date-time":"2014-03-02T00:00:00Z","timestamp":1393718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11042-014-1915-4","type":"journal-article","created":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T00:35:27Z","timestamp":1393893327000},"page":"6641-6656","source":"Crossref","is-referenced-by-count":35,"title":["A video forgery detection algorithm based on compressive sensing"],"prefix":"10.1007","volume":"74","author":[{"given":"Lichao","family":"Su","sequence":"first","affiliation":[]},{"given":"Tianqiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jianmei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,2]]},"reference":[{"key":"1915_CR1","unstructured":"Aharon M, Elad M, Bruckstein A (2005) K-SVD: design of dictionaries for sparse representation"},{"issue":"4","key":"1915_CR2","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/MSP.2007.4286571","volume":"24","author":"RG Baraniuk","year":"2007","unstructured":"Baraniuk RG (2007) Compressive sensing [lecture notes]. IEEE Signal Proc Mag 24(4):118\u2013121","journal-title":"IEEE Signal Proc Mag"},{"key":"1915_CR3","unstructured":"Bo L, Ren X, Fox D (2011) Hierarchical matching pursuit for image classification: Architecture and fast algorithms. In: Advances in neural information processing systems. pp 2115\u20132123"},{"issue":"12","key":"1915_CR4","doi-asserted-by":"crossref","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"T Candes","year":"2006","unstructured":"Candes T (2006) Near optimal signal recovery from random projections: universal encoding strategies. IEEE Trans Inf Theory 52(12):5406\u20135425","journal-title":"IEEE Trans Inf Theory"},{"key":"1915_CR5","unstructured":"Cand\u00e8s EJ (2006) Compressive sampling. In: Proceedings oh the International Congress of Mathematicians: Madrid, August 22\u201330, 2006: invited lectures. pp 1433\u20131452"},{"issue":"2","key":"1915_CR6","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TIT.2005.862083","volume":"52","author":"EJ Cand\u00e8s","year":"2006","unstructured":"Cand\u00e8s EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489\u2013509","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"1915_CR7","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MSP.2007.914731","volume":"5","author":"E Candes","year":"2008","unstructured":"Candes E, Wakin MB (2008) An introduction to compressive sampling. IEEE Signal Process Mag 5(2):21\u201323","journal-title":"IEEE Signal Process Mag"},{"issue":"2","key":"1915_CR8","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s002110050258","volume":"76","author":"A Chambolle","year":"1997","unstructured":"Chambolle A, Lions P-L (1997) Image recovery via total variation minimization and related problems. Numer Math 76(2):167\u2013188","journal-title":"Numer Math"},{"issue":"2","key":"1915_CR9","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MSP.2008.931089","volume":"26","author":"E Delp","year":"2009","unstructured":"Delp E, Memon N, Wu M (2009) Digital forensics [from the guest editors]. IEEE Signal Proc Mag 26(2):14\u201315","journal-title":"IEEE Signal Proc Mag"},{"issue":"4","key":"1915_CR10","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"D Donoho","year":"2006","unstructured":"Donoho D (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"issue":"9","key":"1915_CR11","doi-asserted-by":"crossref","first-page":"2558","DOI":"10.1109\/TIT.2002.801410","volume":"48","author":"M Elad","year":"2002","unstructured":"Elad M, Bruckstein AM (2002) A generalized uncertainty principle and sparse representation in pairs of bases. IEEE Trans Inf Theory 48(9):2558\u20132567","journal-title":"IEEE Trans Inf Theory"},{"key":"1915_CR12","doi-asserted-by":"crossref","unstructured":"Feng JZ, Song L, Yang XK, Zhang W (2009) Sub clustering K-SVD: Size variable dictionary learning for sparse representations. In: Image Processing (ICIP), 2009 16th IEEE International Conference on. IEEE, pp 2149\u20132152","DOI":"10.1109\/ICIP.2009.5414328"},{"key":"1915_CR13","doi-asserted-by":"crossref","unstructured":"Figueiredo MA, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: application to compressed sensing and other inverse problems. IEEE J SeL Top Sign Process 1(4)","DOI":"10.1109\/JSTSP.2007.910281"},{"key":"1915_CR14","doi-asserted-by":"crossref","unstructured":"Hsu C-C, Hung T-Y, Lin C-W, Hsu C-T Video forgery detection using correlation of noise residue. In: Multimedia signal processing, 2008 I.E. 10th workshop on, 2008. IEEE, pp 170\u2013174","DOI":"10.1109\/MMSP.2008.4665069"},{"key":"1915_CR15","unstructured":"Iwen MA (2008) A deterministic sub-linear time sparse fourier algorithm via non-adaptive compressed sensing methods. In: Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms. Society for industrial and applied mathematics, pp 20\u201329"},{"issue":"9","key":"1915_CR16","doi-asserted-by":"crossref","first-page":"1503","DOI":"10.1088\/0957-0233\/13\/9\/711","volume":"13","author":"B J\u00e4hne","year":"2002","unstructured":"J\u00e4hne B (2002) Digital image processing. Meas Sci Technol 13(9):1503","journal-title":"Meas Sci Technol"},{"key":"1915_CR17","doi-asserted-by":"crossref","unstructured":"Kobayashi M, Okabe T, Sato Y (2009) Detecting video forgeries based on noise characteristics. In: Advances in image and video technology. Springer, pp 306\u2013317","DOI":"10.1007\/978-3-540-92957-4_27"},{"key":"1915_CR18","unstructured":"Mohimani H, Babaie-Zadeh M, Gorodnitsky I, Jutten C (2010) Sparse recovery using smoothed l 0 (SL0): Convergence analysis. arXiv preprint arXiv:10015073"},{"key":"1915_CR19","unstructured":"Mohimani H, Babaie-Zadeh M, Jutten C (2008) A fast approach for overcomplete sparse decomposition based on smoothed L0 norm. arXiv preprint arXiv:08092508"},{"key":"1915_CR20","unstructured":"Sarvotham S, Baron D, Baraniuk RG (2006) Compressed sensing reconstruction via belief propagation. preprint"},{"key":"1915_CR21","doi-asserted-by":"crossref","unstructured":"Shih TK, Tang NC, Hwang J-N (2007) Ghost shadow removal in multi-layered video inpaintinga. In: Multimedia and Expo, 2007 I.E. International Conference on. IEEE, pp 1471\u20131474","DOI":"10.1109\/ICME.2007.4284939"},{"key":"1915_CR22","volume-title":"Digital video forensics algorithm based on spatial and temporal matching","author":"Y Song","year":"2011","unstructured":"Song Y (2011) Digital video forensics algorithm based on spatial and temporal matching. Tianjing University, Tianjing"},{"key":"1915_CR23","doi-asserted-by":"crossref","unstructured":"Subramanyam A, Emmanuel S Video forgery detection using HOG features and compression properties. In: Multimedia Signal Processing (MMSP), 2012 I.E. 14th International Workshop on, 2012. IEEE, pp 89\u201394","DOI":"10.1109\/MMSP.2012.6343421"},{"issue":"12","key":"1915_CR24","doi-asserted-by":"crossref","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","volume":"53","author":"JA Tropp","year":"2007","unstructured":"Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53(12):4655\u20134666","journal-title":"IEEE Trans Inf Theory"},{"key":"1915_CR25","unstructured":"Tsaig Y, Donoho DL (2004) Extensions of compressed sensing"},{"key":"1915_CR26","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2007) Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on multimedia & security. ACM, pp 35\u201342","DOI":"10.1145\/1288869.1288876"},{"issue":"3","key":"1915_CR27","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TIFS.2007.902661","volume":"2","author":"W Wang","year":"2007","unstructured":"Wang W, Farid H (2007) Exposing digital forgeries in interlaced and deinterlaced video. IEEE Trans Inf Forensic Secur 2(3):438\u2013449","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1915_CR28","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM workshop on multimedia and security. ACM, pp 39\u201348","DOI":"10.1145\/1597817.1597826"},{"key":"1915_CR29","unstructured":"Young IT, Gerbrands JJ, Van Vliet LJ, Delft T (1998) Fundamentals of image processing. Delft University of Technology The Netherlands"},{"key":"1915_CR30","doi-asserted-by":"crossref","unstructured":"Zhang J, Su Y, Zhang M (2009) Exposing digital video forgery by ghost shadow artifact. In: Proceedings of the First ACM workshop on Multimedia in forensics. ACM, pp 49\u201354","DOI":"10.1145\/1631081.1631093"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1915-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-1915-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1915-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T23:52:52Z","timestamp":1746143572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-1915-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,2]]},"references-count":30,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["1915"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-1915-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,2]]}}}