{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:56:50Z","timestamp":1759964210972,"version":"3.41.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2018,2,22]],"date-time":"2018-02-22T00:00:00Z","timestamp":1519257600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001381","name":"Singapore National Research Foundation","doi-asserted-by":"crossref","award":["NRF2014NCR-NCR001-034"],"award-info":[{"award-number":["NRF2014NCR-NCR001-034"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11042-018-5756-4","type":"journal-article","created":{"date-parts":[[2018,2,22]],"date-time":"2018-02-22T06:29:40Z","timestamp":1519280980000},"page":"25027-25052","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A semi-feature learning approach for tampered region localization across multi-format images"],"prefix":"10.1007","volume":"77","author":[{"given":"Ying","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Vrizlynn L. L.","family":"Thing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,22]]},"reference":[{"key":"5756_CR1","unstructured":"Corel image features data set. https:\/\/archive.ics.uci.edu\/ml\/datasets\/corel+image+features\/"},{"issue":"1\u20132","key":"5756_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.diin.2008.06.004","volume":"5","author":"S Bayram","year":"2008","unstructured":"Bayram S, Sencar HT, Memon N (2008) Classification of digital camera-models based on demosaicing artifacts. Digit Investig 5(1\u20132):49\u201359","journal-title":"Digit Investig"},{"issue":"1","key":"5756_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio Y (2009) Learning deep architectures for ai. Foundations and trends\u24c7, in Machine Learning 2(1):1\u2013127","journal-title":"Foundations and trends\u24c7, in Machine Learning"},{"key":"5756_CR4","first-page":"153","volume":"19","author":"Y Bengio","year":"2007","unstructured":"Bengio Y, Lamblin P, Popovici D, Larochelle H et al. (2007) Greedy layer-wise training of deep networks. Adv. Neural Inf Proces Syst 19:153","journal-title":"Adv. Neural Inf Proces Syst"},{"issue":"3","key":"5756_CR5","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inf Forensics Secur 7(3):1003\u20131017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5756_CR6","doi-asserted-by":"crossref","unstructured":"Bianchi T, De Rosa A, Piva A (2011) Improved dct coefficient analysis for forgery localization in jpeg images. In: IEEE international conference on acoustics, speech and signal processing, pp 2444\u20132447","DOI":"10.1109\/ICASSP.2011.5946978"},{"issue":"3","key":"5756_CR7","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Digit Investig 10(3):226\u2013245","journal-title":"Digit Investig"},{"issue":"11","key":"5756_CR8","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TIP.2002.804279","volume":"11","author":"Tu Chengjie","year":"2002","unstructured":"Chengjie T u, Tran TD (2002) Context-based entropy coding of block transform coefficients for image compression. IEEE Trans Image Process 11(11):1271\u20131283","journal-title":"IEEE Trans Image Process"},{"key":"5756_CR9","doi-asserted-by":"crossref","unstructured":"Chierchia G, Cozzolino D, Poggi G, Sansone C, Verdoliva L (2014) Guided filtering for prnu-based localization of small-size image forgeries. In: IEEE international conference on acoustics, speech and signal processing, pp 6231\u20136235","DOI":"10.1109\/ICASSP.2014.6854802"},{"key":"5756_CR10","unstructured":"Cozzolino D, Gragnaniello D, Verdoliva L (2013) A novel framework for image forgery localization. arXiv: 1311.6932"},{"key":"5756_CR11","unstructured":"Dong J, Wang W (2011) Casia tampering detection dataset http:\/\/forensics.idealtest.org\/"},{"key":"5756_CR12","doi-asserted-by":"crossref","unstructured":"Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: Computer vision and pattern recognition workshop, vol 8, pp 94\u201394","DOI":"10.1109\/CVPRW.2003.10093"},{"issue":"2","key":"5756_CR13","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1023\/B:VISI.0000022288.19776.77","volume":"59","author":"PF Felzenszwalb","year":"2004","unstructured":"Felzenszwalb PF, Huttenlocher DP (2004) Efficient graph-based image segmentation. Int J Comput Vis 59(2):167\u2013181","journal-title":"Int J Comput Vis"},{"issue":"5","key":"5756_CR14","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566\u20131577","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5756_CR15","doi-asserted-by":"crossref","unstructured":"Gaborini L, Bestagini P, Milani S, Tagliasacchi M, Tubaro S (2014) Multi-clue image tampering localization. In: IEEE international workshop on information forensics and security, pp 125\u2013130","DOI":"10.1109\/WIFS.2014.7084315"},{"issue":"8","key":"5756_CR16","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/TIFS.2014.2330312","volume":"9","author":"F Galvan","year":"2014","unstructured":"Galvan F, Puglisi G, Bruna AR, Battiato S (2014) First quantization matrix estimation from double compressed jpeg images. IEEE Trans Inf Forensics Secur 9(8):1299\u20131310","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"5756_CR17","first-page":"598","volume":"4","author":"Dipalee Gupta","year":"2015","unstructured":"Gupta Dipalee, Choubey Siddhartha (2015) Discrete wavelet transform for image processing. International Journal of Emerging Technology and Advanced Engineering 4(3):598\u2013602","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"issue":"5786","key":"5756_CR18","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504\u2013507","journal-title":"Science"},{"key":"5756_CR19","unstructured":"ImageMagick. https:\/\/www.imagemagick.org\/script\/index.php\/"},{"key":"5756_CR20","doi-asserted-by":"crossref","unstructured":"Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on multimedia and security, ACM, pp 1\u201310","DOI":"10.1145\/1073170.1073171"},{"issue":"3","key":"5756_CR21","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TMM.2011.2121056","volume":"13","author":"P Kakar","year":"2011","unstructured":"Kakar P, Sudha N, Ser W (2011) Exposing digital image forgeries by detecting discrepancies in motion blur. IEEE Trans Multimedia 13(3):443\u2013452","journal-title":"IEEE Trans Multimedia"},{"issue":"1","key":"5756_CR22","doi-asserted-by":"publisher","first-page":"325","DOI":"10.14257\/ijmue.2014.9.1.30","volume":"9","author":"Y Ke","year":"2014","unstructured":"Ke Y, Zhang Q, Min W, Zhang S (2014) Detecting image forgery based on noise estimation. International Journal of Multimedia and Ubiquitous Engineering 9(1):325\u2013336","journal-title":"International Journal of Multimedia and Ubiquitous Engineering"},{"key":"5756_CR23","unstructured":"Kocio\u0142ek M, Materka A, Strzelecki M, Szczypi\u0144ski P (2001) Discrete wavelet transform-derived features for digital image texture analysis. In: International conference on signals and electronic systems, \u0141\u00f3d\u017a-Poland, pp 99\u2013104"},{"key":"5756_CR24","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"issue":"11","key":"5756_CR25","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin Z, He J, Tang X, Tang C-K (2009) Fast, automatic and fine-grained tampered jpeg image detection via dct coefficient analysis. Pattern Recogn 42(11):2492\u20132501","journal-title":"Pattern Recogn"},{"key":"5756_CR26","unstructured":"Luk\u00e1\u0161 J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed jpeg images. In: Digital forensic research workshop, pp 5\u20138"},{"key":"5756_CR27","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161 J, Fridrich J, Goljan M (2006) Detecting digital image forgeries using sensor pattern noise. In: Electronic imaging, pp 60720Y\u201360720Y","DOI":"10.1117\/12.640109"},{"issue":"1","key":"5756_CR28","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/s11263-011-0444-0","volume":"95","author":"H Mobahi","year":"2011","unstructured":"Mobahi H, Rao SR, Yang AY, Sastry SS, Ma Y (2011) Segmentation of natural images by texture and boundary compression. Int J Comput Vis 95(1):86\u201398","journal-title":"Int J Comput Vis"},{"key":"5756_CR29","doi-asserted-by":"crossref","unstructured":"Mori G (2005) Guiding model search using segmentation. In: IEEE international conference on computer vision, IEEE, vol 2, pp 1417\u20131423","DOI":"10.1109\/ICCV.2005.112"},{"key":"5756_CR30","unstructured":"Ngiam J, Coates A, Lahiri A, Prochnow B, Le Quoc V, Ng AY (2011) On optimization methods for deep learning. In: Proceedings of the 28th international conference on machine learning (ICML-11), pp 265\u2013272"},{"key":"5756_CR31","doi-asserted-by":"crossref","unstructured":"Piva A (2013) An overview on image forensics. ISRN Signal Processing 2013","DOI":"10.1155\/2013\/496701"},{"issue":"1","key":"5756_CR32","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133\u2013162","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"5756_CR33","doi-asserted-by":"publisher","first-page":"4168","DOI":"10.1016\/j.eswa.2009.11.006","volume":"37","author":"N Saravanan","year":"2010","unstructured":"Saravanan N, Ramachandran KI (2010) Incipient gear box fault diagnosis using discrete wavelet transform (dwt) for feature extraction and classification using artificial neural network (ann). Expert Systems with Applications 37(6):4168\u20134181","journal-title":"Expert Systems with Applications"},{"key":"5756_CR34","doi-asserted-by":"crossref","unstructured":"Satiyan M, Hariharan M, Nagarajan R (2010) Comparison of performance using daubechies wavelet family for facial expression recognition. In: 2010 6th international colloquium on signal processing its applications, pp 1\u20135","DOI":"10.1109\/CSPA.2010.5545262"},{"issue":"8","key":"5756_CR35","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/34.868688","volume":"22","author":"J Shi","year":"2000","unstructured":"Shi J, Malik J (2000) Normalized cuts and image segmentation. IEEE Trans Pattern Anal Mach Intell 22(8):888\u2013905","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5756_CR36","doi-asserted-by":"crossref","unstructured":"Simoncelli EP (1999) Modeling the joint statistics of images in the wavelet domain. In: SPIE\u2019s international symposium on optical science, engineering, and instrumentation, pp 188\u2013195. International Society for Optics and Photonics","DOI":"10.1117\/12.366779"},{"key":"5756_CR37","doi-asserted-by":"crossref","unstructured":"Taigman Y, Yang M, Marc\u2019Aurelio R, Wolf L (2014) Deepface: Closing the gap to human-level performance in face verification. In: IEEE conference on computer vision and pattern recognition, pp 1701\u20131708","DOI":"10.1109\/CVPR.2014.220"},{"key":"5756_CR38","doi-asserted-by":"crossref","unstructured":"Thing VLL, Chen Y, Cheh C (2012) An improved double compression detection method for jpeg image forensics. In: IEEE international symposium on multimedia, pp 290\u2013297","DOI":"10.1109\/ISM.2012.61"},{"issue":"24","key":"5756_CR39","doi-asserted-by":"publisher","first-page":"16881","DOI":"10.1007\/s11042-015-2961-2","volume":"75","author":"D Tralic","year":"2016","unstructured":"Tralic D, Grgic S, Sun X, Rosin PL (2016) Combining cellular automata and local binary patterns for copy-move forgery detection. Multimedia Tools and Applications 75(24):16881\u201316903","journal-title":"Multimedia Tools and Applications"},{"key":"5756_CR40","doi-asserted-by":"crossref","unstructured":"Verdoliva L, Cozzolino D, Poggi G (2014) A feature-based approach for image tampering detection and localization. In: IEEE international workshop on information forensics and security, pp 149\u2013154","DOI":"10.1109\/WIFS.2014.7084319"},{"issue":"17","key":"5756_CR41","doi-asserted-by":"publisher","first-page":"10201","DOI":"10.1007\/s11042-015-3079-2","volume":"75","author":"Q Yang","year":"2016","unstructured":"Yang Q, Peng F, Li J-T, Long M (2016) Image tamper detection based on noise estimation and lacunarity texture. Multimedia Tools and Applications 75 (17):10201\u201310211","journal-title":"Multimedia Tools and Applications"},{"key":"5756_CR42","doi-asserted-by":"crossref","unstructured":"Ye S, Sun Q, Chang EC (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: International conference on multimedia and expo, pp 12\u201315","DOI":"10.1109\/ICME.2007.4284574"},{"issue":"6","key":"5756_CR43","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s11042-014-2431-2","volume":"75","author":"Z Ye","year":"2016","unstructured":"Ye Z, Shen X, Chen H (2016) Copy-move forgery detection based on scaled orb. Multimedia Tools and Applications 75(6):3221\u20133233","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"5756_CR44","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s11042-014-2362-y","volume":"75","author":"L Yu","year":"2016","unstructured":"Yu L, Qi H, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications 75(2):1159\u20131176","journal-title":"Multimedia Tools and Applications"},{"key":"5756_CR45","doi-asserted-by":"crossref","unstructured":"Zhang Y, Goh J, Win LL, Thing V (2016) Image region forgery detection: A deep learning approach. In: Proceedings of the Singapore cyber-security conference: cyber-security by design, vol 14, p 1","DOI":"10.3233\/978-1-61499-617-0-1"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5756-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5756-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5756-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T23:18:30Z","timestamp":1751411910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5756-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,22]]},"references-count":45,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5756"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5756-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,2,22]]},"assertion":[{"value":"22 April 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}