{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T08:26:55Z","timestamp":1750667215859},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T00:00:00Z","timestamp":1518652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Wuhan Science and Technology Bureau","award":["2017010201010105"],"award-info":[{"award-number":["2017010201010105"]}]},{"name":"Shenzhen Science and Technology Innovation Committee","award":["JCYJ20170306170559215"],"award-info":[{"award-number":["JCYJ20170306170559215"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11042-018-5732-z","type":"journal-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T12:55:59Z","timestamp":1518699359000},"page":"5305-5328","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value"],"prefix":"10.1007","volume":"78","author":[{"given":"Wenjia","family":"Ding","sequence":"first","affiliation":[]},{"given":"Yi","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Yulin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,15]]},"reference":[{"issue":"4","key":"5732_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MMUL.2001.959096","volume":"8","author":"F Andres","year":"2001","unstructured":"Andres F (2001) Multimedia and security. IEEE Trans Multimed 8(4):20\u201321","journal-title":"IEEE Trans Multimed"},{"issue":"4","key":"5732_CR2","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1109\/TIFS.2012.2194285","volume":"7","author":"S Battiato","year":"2002","unstructured":"Battiato S, Maria G, Messina F, Puglisi G (2002) Robust Image Alignment for Tampering Detection. IEEE Trans Inf Forensics Secur 7(4):1105\u20131117","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5732_CR3","first-page":"100","volume-title":"Introduction to Signal Transmission (Electrical & Electronic Engineering)","author":"W Bennett","year":"1970","unstructured":"Bennett W (1970) Introduction to Signal Transmission (Electrical & Electronic Engineering), 1st edn. McGraw-Hill Inc., New York, pp 100\u2013110","edition":"1"},{"issue":"9","key":"5732_CR4","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.1109\/TIFS.2013.2274041","volume":"8","author":"H Cao","year":"2013","unstructured":"Cao H, Kot AC (2013) On Establishing Edge Adaptive Grid for Bi-level Image Data Hiding. IEEE Trans Inf Forensics Secur 8(9):1508\u20131518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5732_CR5","unstructured":"CASIA (2017) Available: \n                    http:\/\/forensics.idealtest.org\/\n                    \n                   Accessed 28 Dec 2017"},{"key":"5732_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/MMCS.1999.778274","volume-title":"Proc. IEEE Int. Conf. Multimedia Computing and Systems","author":"J Dittmann","year":"1999","unstructured":"Dittmann J, Steinmetz A, Steinmetz R (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proc. IEEE Int. Conf. Multimedia Computing and Systems, vol II. IEEE Computer Society, New York, pp 209\u2013213"},{"issue":"1","key":"5732_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TIFS.2005.863505","volume":"1","author":"C Fei","year":"2006","unstructured":"Fei C, Kundur D, Kwong RH (2006) Analysis and design of secure watermark-based authentication systems. IEEE Trans Inf Forensics Secur 1(1):43\u201355","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"5732_CR8","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1109\/TIP.2008.2006435","volume":"17","author":"W Feng","year":"2008","unstructured":"Feng W, Liu ZQ (2008) Region-Level Image Authentication Using Bayesian Structural Content Abstraction. IEEE Trans Image Process 17(12):2413\u20132424","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"5732_CR9","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/0923-5965(90)90017-C","volume":"2","author":"CA Gonzales","year":"1990","unstructured":"Gonzales CA, Allman L, Mccarthy T (1990) DCT coding for motion video storage using adaptive arithmetic coding. Signal Process Image Commun 2(2):145\u2013154","journal-title":"Signal Process Image Commun"},{"issue":"1","key":"5732_CR10","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/TITB.2012.2207729","volume":"17","author":"AM Guzman","year":"2013","unstructured":"Guzman AM, Goryawala M, Wang J, Adjouadi M (2013) Thermal Imaging as a Biometrics Approach to Facial Signature Authentication. IEEE J Biomed Health Informatics 17(1):214\u2013222","journal-title":"IEEE J Biomed Health Informatics"},{"issue":"39","key":"5732_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"1","author":"A Haouzia","year":"2008","unstructured":"Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tool Appl 1(39):1\u201346","journal-title":"Multimed Tool Appl"},{"key":"5732_CR12","unstructured":"Lampson B, Rivest R (1997) Cryptography and information security group research project: a simple distributed security infrastructure. Technical report, MIT. \n                    http:\/\/www.people.csail.mit.edu\/rivest\/pubs.html#RL96"},{"key":"5732_CR13","doi-asserted-by":"crossref","unstructured":"Lin C-Y, Chang S-F (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153\u2013168","DOI":"10.1109\/76.905982"},{"key":"5732_CR14","doi-asserted-by":"publisher","unstructured":"Lin C, Chang S (2010) Semi-fragile watermarking for authenticating JPEG visual content. Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000). \n                    https:\/\/doi.org\/10.1117\/12.384968","DOI":"10.1117\/12.384968"},{"key":"5732_CR15","doi-asserted-by":"publisher","unstructured":"Lin ET, Podilchun CI, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000). \n                    https:\/\/doi.org\/10.1117\/12.384969","DOI":"10.1117\/12.384969"},{"issue":"6","key":"5732_CR16","doi-asserted-by":"publisher","first-page":"269","DOI":"10.3390\/e19060269","volume":"19","author":"S Liu","year":"2017","unstructured":"Liu S, Lu M, Liu G, Pan Z (2017) A novel distance metric: generalized relative entropy. Entropy 19(6):269. \n                    https:\/\/doi.org\/10.3390\/e19060269","journal-title":"Entropy"},{"issue":"10","key":"5732_CR17","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1049\/iet-ipr.2016.0862","volume":"11","author":"S Liu","year":"2017","unstructured":"Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding. IET Image Process 11(10):815\u2013821","journal-title":"IET Image Process"},{"issue":"4","key":"5732_CR18","doi-asserted-by":"publisher","first-page":"5787","DOI":"10.1007\/s11042-014-2408-1","volume":"76","author":"S Liu","year":"2017","unstructured":"Liu S, Fu W, He L, Zhou J, Ma M (2017) Distribution of primary additional errors in fractal encoding method. Multimed Tool Appl 76(4):5787\u20135802","journal-title":"Multimed Tool Appl"},{"issue":"11","key":"5732_CR19","doi-asserted-by":"publisher","first-page":"3452","DOI":"10.1109\/TIP.2006.881948","volume":"15","author":"V Monga","year":"2006","unstructured":"Monga V, Evans BL (2006) Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs. IEEE Trans Image Process 15(11):3452\u20133465","journal-title":"IEEE Trans Image Process"},{"key":"5732_CR20","first-page":"131","volume":"3","author":"W Nender","year":"1996","unstructured":"Nender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 3:131\u2013136","journal-title":"IBM Syst J"},{"key":"5732_CR21","first-page":"7\/1","volume-title":"Blind detection of malicious alterations on still images using robust watermarks","author":"C Rey","year":"2000","unstructured":"Rey C, Dugelay JL (2000) Blind detection of malicious alterations on still images using robust watermarks. Proc. IEE Secure Images and Image Authentication Colloquium, London, pp 7\/1\u20137\/6"},{"key":"5732_CR22","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/ICIP.1996.560425","volume":"3","author":"M Schneider","year":"1996","unstructured":"Schneider M, Chang S-F (1996) A robust content based digital signature for image authentication. Proc IEEE Int Conf on Image Processing 3:227\u2013230","journal-title":"Proc IEEE Int Conf on Image Processing"},{"issue":"11","key":"5732_CR23","doi-asserted-by":"publisher","first-page":"2491","DOI":"10.1109\/TIP.2009.2028251","volume":"18","author":"M Tagliasacchi","year":"2009","unstructured":"Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-Based Identification of Sparse Image Tampering. IEEE Trans Image Process 18(11):2491\u20132504","journal-title":"IEEE Trans Image Process"},{"key":"5732_CR24","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1117\/12.384998","volume":"3971","author":"K Toyokawa","year":"2000","unstructured":"Toyokawa K, Morimoto N, Tonegawa S, Kamijo K, Koide A (2000) Secure digital photograph handling with watermarking technique in insurance claim process. Proc SPIE 3971:438\u2013445","journal-title":"Proc SPIE"},{"key":"5732_CR25","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1017\/CBO9780511807213","volume-title":"Fundamentals of wireless communication","author":"D Tse","year":"2005","unstructured":"Tse D, Viswanath P (2005) Fundamentals of wireless communication, 1st edn. Cambridge University Press, Cambridge, pp 203\u2013210","edition":"1"},{"issue":"3","key":"5732_CR26","first-page":"385","volume":"4","author":"CW Wu","year":"2012","unstructured":"Wu CW (2012) On the design of content-based multimedia authentication systems. IEEE Trans Multimed 4(3):385\u2013393","journal-title":"IEEE Trans Multimed"},{"issue":"7","key":"5732_CR27","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1117\/1.1384885","volume":"40","author":"GW Yu","year":"2001","unstructured":"Yu GW, Lu CS, Liao HYM (2001) Mean quantization-based fragile watermarking for image authentication. Opt Eng 40(7):1396\u20131408","journal-title":"Opt Eng"},{"issue":"10","key":"5732_CR28","doi-asserted-by":"publisher","first-page":"3189","DOI":"10.1109\/TIP.2006.877310","volume":"15","author":"H Yuan","year":"2006","unstructured":"Yuan H, Zhang XP (2006) Multi-scale Fragile Watermarking Based on the Gaussian Mixture Model. IEEE Trans Image Process 15(10):3189\u20133200","journal-title":"IEEE Trans Image Process"},{"key":"5732_CR29","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.optlastec.2016.09.004","volume":"88","author":"L Yuan","year":"2017","unstructured":"Yuan L, Ran Q, Zhao T (2017) Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain. Opt Laser Technol 88:111\u2013120","journal-title":"Opt Laser Technol"},{"issue":"2","key":"5732_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.1276112","volume":"21","author":"BB Zhu","year":"2004","unstructured":"Zhu BB, Swanson MD, Tewfik AH (2004) When seeing isn't believing [multimedia authentication technologies]. IEEE Signal Process Mag 21(2):40\u201349","journal-title":"IEEE Signal Process Mag"},{"issue":"2","key":"5732_CR31","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.1276112","volume":"21","author":"BB Zhu","year":"2004","unstructured":"Zhu BB, Swanson MD, Tewfik AH (2004) When seeing isn\u2019t believing. IEEE Signal Processing Mag 21(2):40\u201349","journal-title":"IEEE Signal Processing Mag"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5732-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5732-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5732-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T07:51:34Z","timestamp":1554796294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5732-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,15]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["5732"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5732-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,15]]},"assertion":[{"value":"25 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}