{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T18:02:06Z","timestamp":1774634526542,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61379155 U1536204 61332012 and 61502547"],"award-info":[{"award-number":["61379155 U1536204 61332012 and 61502547"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NSF of Guangdong province","award":["s2013020012788"],"award-info":[{"award-number":["s2013020012788"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11042-016-3712-8","type":"journal-article","created":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T05:02:56Z","timestamp":1467349376000},"page":"4783-4799","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":69,"title":["Image splicing localization using PCA-based noise level estimation"],"prefix":"10.1007","volume":"76","author":[{"given":"Hui","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Yifeng","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Xiaodan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"key":"3712_CR1","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"231","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284\u2013295","journal-title":"Forensic Sci Int"},{"issue":"5","key":"3712_CR2","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1109\/TIFS.2015.2394231","volume":"10","author":"K Bahrami","year":"2015","unstructured":"Bahrami K, Kot AC, Li L, Li H (2015) Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans Inf Forensics Secur 10(5):999\u20131009","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3712_CR3","first-page":"59","volume":"6958","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevny T (2011) 'Break our Steganographic System': the ins and outs of organizing BOSS. Filler T et al. (Eds.): IH 2011. LNCS 6958:59\u201370","journal-title":"LNCS"},{"issue":"3","key":"3712_CR4","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf Forensics Secur 7(3):1003\u20131017","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"3712_CR5","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1109\/TIFS.2011.2106121","volume":"6","author":"YL Chen","year":"2011","unstructured":"Chen YL, Hsu CT (2011) Detecting recompression of jpeg images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans Inf Forensics Secur 6(2):396\u2013406","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"3712_CR6","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M Chen","year":"2008","unstructured":"Chen M, Fridrich J, Goljan M, Lukas J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inf Forensics Secur 3(1):74\u201390","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3712_CR7","doi-asserted-by":"crossref","unstructured":"Chierchia G, Parrilli S, Poggi G, Sansone C, Verdoliva L (2010) On the influence of denoising in PRNU based forgery detection. In Proc. of the 2nd ACM workshop on Multimedia in Forensics, Security and Intelligence, pp. 117\u2013122","DOI":"10.1145\/1877972.1878002"},{"key":"3712_CR8","doi-asserted-by":"crossref","unstructured":"Chierchia G, Cozzolino D, Poggi G, Sansone C, Verdoliva L (2014a) Guided filtering for PRNU-based localization of small-size image forgeries, in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process., pp. 6272\u20136276","DOI":"10.1109\/ICASSP.2014.6854802"},{"issue":"4","key":"3712_CR9","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1109\/TIFS.2014.2302078","volume":"9","author":"G Chierchia","year":"2014","unstructured":"Chierchia G, Poggi G, Sansone C, Verdoliva L (2014b) A bayesian-MRF approach for PRNU-based image forgery detection. IEEE Trans Inf Forensics Secur 9(4):554\u2013567","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3712_CR10","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Gragnaniello D, Verdoliva L (2014) Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques, In Proc. of IEEE Int. Conf. Image Processing, pp. 5302\u20135306","DOI":"10.1109\/ICIP.2014.7026073"},{"issue":"8","key":"3712_CR11","doi-asserted-by":"crossref","first-page":"2080","DOI":"10.1109\/TIP.2007.901238","volume":"16","author":"K Dabov","year":"2007","unstructured":"Dabov K, Foi A, Katkovnik V, Egiazarian K (2007) Image denoising by sparse 3-D transform-domain collaborative filtering. IEEE Trans Image Process 16(8):2080\u20132095","journal-title":"IEEE Trans Image Process"},{"key":"3712_CR12","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1093\/biomet\/81.3.425","volume":"8","author":"D Donoho","year":"1994","unstructured":"Donoho D, Johnstone I (1994) Ideal spatial adaption by wavelet shrinkage. Biometrika 8:425\u2013455","journal-title":"Biometrika"},{"issue":"9","key":"3712_CR13","doi-asserted-by":"crossref","first-page":"2676","DOI":"10.1109\/TIP.2006.877363","volume":"15","author":"H Faraji","year":"2006","unstructured":"Faraji H, MacLean WJ (2006) Ccd noise removal in digital images. IEEE Trans Image Process 15(9):2676\u20132685","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"3712_CR14","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1109\/TPAMI.2012.213","volume":"35","author":"K He","year":"2013","unstructured":"He K, Sun J, Tang X (2013) Guided image filtering. IEEE Trans Pattern Anal Mach Intell 35(6):1397\u20131409","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3712_CR15","doi-asserted-by":"crossref","unstructured":"Hsu YF, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In International Conference on Multimedia and Expo, pp. 549\u2013552","DOI":"10.1109\/ICME.2006.262447"},{"key":"3712_CR16","doi-asserted-by":"crossref","unstructured":"Huang DY, Huang CN, Hu WC, Chou CH (2015) Robustness of copy-move forgery detection under high JPEG compression artifacts, Multimed. Tools Appl., published online","DOI":"10.1007\/s11042-015-3152-x"},{"issue":"9","key":"3712_CR17","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X Kang","year":"2013","unstructured":"Kang X, Stamm MC, Peng A, Liu KJR (2013) Robust median filtering forensics using an autoregressive model. IEEE Trans Inf Forensics Secur 8(9):1456\u20131468","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3712_CR18","doi-asserted-by":"crossref","unstructured":"Lin X, Li CT, Hu Y (2013) Exposing image forgery through the detection of contrast enhancement, In Proc. of IEEE Int. Conf. Image Processing, pp. 4467\u20134471","DOI":"10.1109\/ICIP.2013.6738920"},{"key":"3712_CR19","doi-asserted-by":"crossref","unstructured":"Liu X, Tanaka M, Okutomi M (2012) Noise level estimation using weak textured patches of a single noisy image. In Proc. of IEEE Int. Conf. Image Processing, pp. 665\u2013668","DOI":"10.1109\/ICIP.2012.6466947"},{"key":"3712_CR20","unstructured":"Lukas J, Fridrich J, Goljan M (2006) Detecting digital image forgeries using sensor pattern noise. In SPIE Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents VIII, 6072: 362\u2013372"},{"issue":"2","key":"3712_CR21","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s11263-013-0688-y","volume":"110","author":"S Lyu","year":"2014","unstructured":"Lyu S, Pan X, Zhang X (2014) Exposing region splicing forgeries with blind local noise estimation. Int J Comput Vis 110(2):202\u2013221","journal-title":"Int J Comput Vis"},{"issue":"10","key":"3712_CR22","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497\u20131503","journal-title":"Image Vis Comput"},{"key":"3712_CR23","doi-asserted-by":"crossref","unstructured":"Pan X, Zhang X, Lyu S (2011) Exposing image forgery with blind noise estimation. In the 13th ACM Workshop on Multimedia and Security, pp. 15\u201320","DOI":"10.1145\/2037252.2037256"},{"key":"3712_CR24","doi-asserted-by":"crossref","unstructured":"Pan X, Zhang X, Lyu S (2012) Exposing image splicing with inconsistent local noise variances. In IEEE International Conference on Computational Photography (ICCP), pp. 1\u201310","DOI":"10.1109\/ICCPhot.2012.6215223"},{"key":"3712_CR25","unstructured":"Petteri M (2008) Dependence of the parameters of digital image noise model on ISO number, temperature and shutter time. Project work report, Dec. 2008, Tampere, Finland. [online] http:\/\/www.cs.tut.fi\/~foi\/MobileImagingReport_PetteriOjala_Dec2008.pdf"},{"key":"3712_CR26","doi-asserted-by":"crossref","unstructured":"Popescu C, Farid H (2004) Statistical tools for digital forensics, in 6th International Workshop on Information Hiding. Toronto, Canada, pp. 128\u2013147","DOI":"10.1007\/978-3-540-30114-1_10"},{"issue":"2","key":"3712_CR27","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"C Popescu","year":"2005","unstructured":"Popescu C, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758\u2013767","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"3712_CR28","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1109\/TIP.2012.2221728","volume":"22","author":"S Pyatykh","year":"2013","unstructured":"Pyatykh S, Hesser J, Zheng L (2013) Image noise level estimation by principal component analysis. IEEE Trans Image Process 22(2):687\u2013699","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"3712_CR29","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MC Stamm","year":"2011","unstructured":"Stamm MC, Liu KJR (2011) Anti-forensics of digital image compression. IEEE Trans Inf Forensics Secur 6(3):1050\u20131065","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3712_CR30","doi-asserted-by":"crossref","first-page":"3221","DOI":"10.1007\/s11042-014-2431-2","volume":"75","author":"Y Zhu","year":"2016","unstructured":"Zhu Y, Shen X, Chen H (2016) Copy-move forgery detection based on scaled ORB. Multimed Tools Appl 75:3221\u20133233","journal-title":"Multimed Tools Appl"},{"key":"3712_CR31","unstructured":"Zoran D, Weiss Y (2009) Scale invariance and noise in nature image. In Proc. of IEEE International Conference on Computer Vision, pp. 2209\u20132216"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3712-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3712-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3712-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3712-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T10:15:23Z","timestamp":1568110523000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3712-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,1]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["3712"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3712-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,1]]}}}