{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:46:24Z","timestamp":1762004784219},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,3,15]],"date-time":"2016-03-15T00:00:00Z","timestamp":1458000000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s11042-016-3409-z","type":"journal-article","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T17:48:49Z","timestamp":1458323329000},"page":"7749-7783","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["A novel forensic image analysis tool for discovering double JPEG compression clues"],"prefix":"10.1007","volume":"76","author":[{"given":"Ali","family":"Taimori","sequence":"first","affiliation":[]},{"given":"Farbod","family":"Razzazi","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Behrad","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Massoud","family":"Babaie-Zadeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"issue":"10","key":"3409_CR1","doi-asserted-by":"crossref","first-page":"2385","DOI":"10.1162\/089976600300014980","volume":"12","author":"G Baudat","year":"2000","unstructured":"Baudat G, Anouar F (2000) Generalized discriminant analysis using a kernel approach. Neural Comput 12(10):2385\u20132404","journal-title":"Neural Comput"},{"key":"3409_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/11-PS175","volume":"8","author":"A Berger","year":"2011","unstructured":"Berger A, Hill TP (2011) A basic theory of Benford\u2019s law. Probab Surv 8:1\u2013126","journal-title":"Probab Surv"},{"issue":"3","key":"3409_CR3","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf Forensics Secur 7(3):1003\u20131017","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"3409_CR4","doi-asserted-by":"crossref","first-page":"2109","DOI":"10.1109\/TPAMI.2007.70840","volume":"30","author":"E Borenstein","year":"2008","unstructured":"Borenstein E, Ullman S (2008) Combined top-down\/bottom-up segmentation. IEEE Trans Pattern Anal Mach Intell 30(12):2109\u20132125","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3409_CR5","doi-asserted-by":"crossref","unstructured":"Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3). article 27","DOI":"10.1145\/1961189.1961199"},{"issue":"6","key":"3409_CR6","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.1016\/j.sigpro.2012.09.011","volume":"93","author":"H Cheng","year":"2013","unstructured":"Cheng H, Liu Z, Yang L, Chen X (2013) Sparse representation and learning in visual recognition: theory and applications. Signal Process 93(6):1408\u20131425","journal-title":"Signal Process"},{"key":"3409_CR7","doi-asserted-by":"crossref","unstructured":"Dong L, Kong X, Wang B, You X (2011) Double compression detection based on Markov model of the first digits of DCT coefficients. In: IEEE 6Th international conference on image and graphics (ICIG), pp 234\u2013237","DOI":"10.1109\/ICIG.2011.100"},{"issue":"9","key":"3409_CR8","doi-asserted-by":"crossref","first-page":"4053","DOI":"10.1109\/TSP.2011.2161982","volume":"59","author":"MF Duarte","year":"2011","unstructured":"Duarte MF, Eldar YC (2011) Structured compressed sensing: from theory to applications. IEEE Trans Signal Process 59(9):4053\u20134085","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"3409_CR9","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1109\/TASL.2011.2159710","volume":"20","author":"N Evans","year":"2012","unstructured":"Evans N, Bozonnet S, Wang D, Fredouille C, Troncy R (2012) A comparative study of bottom-up and top-down approaches to speaker diarization. IEEE Trans Audio Speech Lang Process 20(2):382\u2013392","journal-title":"IEEE Trans Audio Speech Lang Process"},{"key":"3409_CR10","unstructured":"Farid H (2006) Digital image ballistics from JPEG quantization. Tech. Rep. TR2006-583, Department of Computer Science Dartmouth College"},{"issue":"2","key":"3409_CR11","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid H (2009) Image forgery detection. IEEE Signal Proc Mag 26(2):16\u201325","journal-title":"IEEE Signal Proc Mag"},{"issue":"8","key":"3409_CR12","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/TIFS.2014.2330312","volume":"9","author":"F Galvan","year":"2014","unstructured":"Galvan F, Puglisi G, Bruna A, Battiato S (2014) First quantization matrix estimation from double compressed JPEG images. IEEE Trans Inf Forensics Secur 9 (8):1299\u20131310","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"3409_CR13","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1016\/j.patrec.2012.02.007","volume":"33","author":"J Gao","year":"2012","unstructured":"Gao J, Shi Q, Caetano TS (2012) Dimensionality reduction via compressive sensing. Pattern Recogn Lett 33(9):1163\u20131170","journal-title":"Pattern Recogn Lett"},{"issue":"9","key":"3409_CR14","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia EA (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng 21(9):1263\u20131284","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"3409_CR15","unstructured":"Jolliffe IT (2002) Principal component analysis. Springer Series in Statistics The 2nd edition"},{"issue":"2","key":"3409_CR16","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MSP.2010.940003","volume":"28","author":"S Kaski","year":"2011","unstructured":"Kaski S, Peltonen J (2011) Dimensionality reduction for data visualization. IEEE Signal Proc Mag 28(2):100\u2013104","journal-title":"IEEE Signal Proc Mag"},{"issue":"1","key":"3409_CR17","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s11263-008-0166-0","volume":"81","author":"A Levin","year":"2009","unstructured":"Levin A, Weiss Y (2009) Learning to combine bottom-up and top-down segmentation. Int J Comput Vis 81(1):105\u2013118","journal-title":"Int J Comput Vis"},{"key":"3409_CR18","unstructured":"Li B, Shi YQ, Huang J (2008) Detecting doubly compressed JPEG images by using mode based first digit features. In: IEEE 10Th workshop on multimedia signal processing, pp 730\u2013735"},{"key":"3409_CR19","doi-asserted-by":"crossref","unstructured":"Li XH, Zhao YQ, Liao M, Shih FY, Shi YQ (2012) Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing 1\u201310","DOI":"10.1186\/1687-6180-2012-190"},{"issue":"3","key":"3409_CR20","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s10994-007-5018-6","volume":"68","author":"HT Lin","year":"2007","unstructured":"Lin HT, Lin CJ, Weng RC (2007) A note on Platt\u2019s probabilistic outputs for support vector machines. Mach Learn 68(3):267\u2013276","journal-title":"Mach Learn"},{"issue":"3","key":"3409_CR21","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TIFS.2009.2024715","volume":"4","author":"WS Lin","year":"2009","unstructured":"Lin WS, Tjoa SK, Zhao HV, Liu KR (2009) Digital image source coder forensics via intrinsic fingerprints. IEEE Trans Inf Forensics Secur 4(3):460\u2013475","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"3409_CR22","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin Z, He J, Tang X, Tang CK (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn 42(11):2492\u20132501","journal-title":"Pattern Recogn"},{"key":"3409_CR23","unstructured":"Liu J, Ji S, Ye J (2011) SLEP: sparse learning with efficient projections Arizona State University 2011"},{"key":"3409_CR24","doi-asserted-by":"crossref","unstructured":"Liu Q, Sung AH, Qiao M (2011) A method to detect JPEG-based double compression. In: The 8th international conference on advances in neural networks, lecture notes in computer science, Part II, pp 466\u2013476","DOI":"10.1007\/978-3-642-21090-7_55"},{"key":"3409_CR25","doi-asserted-by":"crossref","unstructured":"Liu Q, Sung AH, Qiao M (2011) Neighboring joint density-based JPEG steganalysis. ACM Trans Intell Syst Technol (TIST) 2(2). article 16","DOI":"10.1145\/1899412.1899420"},{"key":"3409_CR26","unstructured":"Luk\u00e1\u0161 J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed JPEG images. In: Proc. Digital forensic research workshop"},{"key":"3409_CR27","unstructured":"van der Maaten L (2009) Learning a parametric embedding by preserving local structure. In: International conference on artificial intelligence and statistics, pp 384\u2013391"},{"key":"3409_CR28","first-page":"2579","volume":"9","author":"L van der Maaten","year":"2008","unstructured":"van der Maaten L, Hinton G (2008) Visualizing data using SNE. J Mach Learn Res 9:2579\u20132605","journal-title":"J Mach Learn Res"},{"key":"3409_CR29","unstructured":"van der Maaten L, Postma EO, van den Herik HJ (2009) Dimensionality reduction: a comparative review. Tech. Rep. tiCC-TR 2009-005, Tilburg Centre for Creative Computing Tilburg University"},{"issue":"3","key":"3409_CR30","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.diin.2011.06.004","volume":"8","author":"SD Mahalakshmi","year":"2012","unstructured":"Mahalakshmi SD, Vijayalakshmi K, Priyadharsini S (2012) Digital image forgery detection and estimation by exploring basic image manipulations. Digit Investig 8(3):215\u2013225","journal-title":"Digit Investig"},{"key":"3409_CR31","doi-asserted-by":"crossref","unstructured":"Milani S, Tagliasacchi M, Tubaro S (2012) Discriminating multiple JPEG compression using first digit features. In: IEEE International conference on acoustics, speech and signal processing (ICASSP), pp 2253\u20132256","DOI":"10.1109\/ICASSP.2012.6288362"},{"issue":"12","key":"3409_CR32","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1068\/p5321","volume":"33","author":"A Olmos","year":"2004","unstructured":"Olmos A, Kingdom FAA (2004) A biologically inspired algorithm for the recovery of shading and reflectance images. Perception 33(12):1463\u20131473","journal-title":"Perception"},{"issue":"11","key":"3409_CR33","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson K (1901) On lines and planes of closest fit to systems of points in space. Phil Mag 2(11):559\u2013572","journal-title":"Phil Mag"},{"issue":"23","key":"3409_CR34","doi-asserted-by":"crossref","first-page":"1452","DOI":"10.1049\/el.2013.2218","volume":"49","author":"Y Peng","year":"2013","unstructured":"Peng Y, Liu B (2013) Accurate estimation of primary quantisation table with applications to tampering detection. Electron Lett 49(23):1452\u20131454","journal-title":"Electron Lett"},{"key":"3409_CR35","doi-asserted-by":"crossref","unstructured":"Piva A (2013) An overview on image forensics. ISRN Signal Processing p article ID 496701","DOI":"10.1155\/2013\/496701"},{"issue":"1","key":"3409_CR36","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimedia Tools Appl 51(1):133\u2013162","journal-title":"Multimedia Tools Appl"},{"key":"3409_CR37","doi-asserted-by":"crossref","first-page":"S88","DOI":"10.1016\/j.diin.2009.06.007","volume":"6","author":"HT Sencar","year":"2009","unstructured":"Sencar HT, Memon N (2009) Identification and recovery of JPEG files with missing fragments. Digit Investig 6:S88\u2013S98","journal-title":"Digit Investig"},{"key":"3409_CR38","first-page":"1","volume":"26","author":"BW Silverman","year":"1986","unstructured":"Silverman BW (1986) Density estimation for statistics and data analysis. Monogr Stat Appl Probab 26:1\u201322","journal-title":"Monogr Stat Appl Probab"},{"key":"3409_CR39","doi-asserted-by":"crossref","unstructured":"Soille P (2004) Morphological image analysis: principles and applications. Springer-verlag New York, Inc. The 2nd edition","DOI":"10.1007\/978-3-662-05088-0"},{"issue":"23","key":"3409_CR40","doi-asserted-by":"crossref","first-page":"10,735","DOI":"10.1007\/s11042-014-2204-y","volume":"74","author":"A Taimori","year":"2015","unstructured":"Taimori A, Behrad A (2015) A new deformable mesh model for face tracking using edge based features and novel sets of energy functions. Multimedia Tools Appl 74(23):10,735\u201310,759","journal-title":"Multimedia Tools Appl"},{"key":"3409_CR41","doi-asserted-by":"crossref","unstructured":"Taimori A, Razzazi F, Behrad A, Ahmadi A, Babaie-Zadeh M (2012) A proper transform for satisfying Benford\u2019s law and its application to double JPEG image forensics. In: IEEE International symposium on signal processing and information technology (ISSPIT), pp. 000,240\u2013000,244","DOI":"10.1109\/ISSPIT.2012.6621294"},{"key":"3409_CR42","doi-asserted-by":"publisher","unstructured":"Taimori A, Razzazi F, Behrad A, Ahmadi A, Babaie-Zadeh M (2015) Quantization-unaware double JPEG compression detection. Journal of Mathematical Imaging and Vision. doi: 10.1007\/s10851-015-0602-z","DOI":"10.1007\/s10851-015-0602-z"},{"issue":"10","key":"3409_CR43","doi-asserted-by":"crossref","first-page":"4389","DOI":"10.1109\/TIP.2014.2350914","volume":"23","author":"H Tian","year":"2014","unstructured":"Tian H, Fang Y, Yao Z, Lin W, Ni R, Zhu Z (2014) Salient region detection by fusing bottom-up and top-down features extracted from a single image. IEEE Trans Image Process 23(10):4389\u20134398","journal-title":"IEEE Trans Image Process"},{"key":"3409_CR44","doi-asserted-by":"crossref","unstructured":"Ulusoy I, Bishop CM (2005) Generative versus discriminative methods for object recognition. In: IEEE Computer society conference on computer vision and pattern recognition (CVPR), vol 2, pp 258\u2013265","DOI":"10.1109\/CVPR.2005.167"},{"issue":"1","key":"3409_CR45","doi-asserted-by":"crossref","first-page":"xviii","DOI":"10.1109\/30.125072","volume":"38","author":"GK Wallace","year":"1992","unstructured":"Wallace GK (1992) The JPEG still picture compression standard. IEEE Trans Consum Electron 38(1):xviii\u2013xxxiv","journal-title":"IEEE Trans Consum Electron"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3409-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3409-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3409-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3409-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:32:47Z","timestamp":1559345567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3409-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,15]]},"references-count":45,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["3409"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3409-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,15]]}}}