{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T11:17:24Z","timestamp":1767871044815,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T00:00:00Z","timestamp":1613088000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T00:00:00Z","timestamp":1613088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Ministry of Science and ICT (MSIT) of Korea Government","award":["2017-0-01671"],"award-info":[{"award-number":["2017-0-01671"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-10552-5","type":"journal-article","created":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T09:05:20Z","timestamp":1613120720000},"page":"30879-30906","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Dual-path convolutional neural network for classifying fine-grained manipulations in H.264 videos"],"prefix":"10.1007","volume":"80","author":[{"given":"Woogeun","family":"Bae","sequence":"first","affiliation":[]},{"given":"Seung-Hun","family":"Nam","sequence":"additional","affiliation":[]},{"given":"In-Jae","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Myung-Joon","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Minseok","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Heung-Kyu","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,12]]},"reference":[{"key":"10552_CR1","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: 2018 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1\u20137","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"10552_CR2","doi-asserted-by":"publisher","first-page":"137789","DOI":"10.1109\/ACCESS.2020.3011752","volume":"8","author":"W Ahn","year":"2020","unstructured":"Ahn W, Jang H, Nam SH, Yu IJ, Lee HK (2020) Local-source enhanced residual network for steganalysis of digital images. IEEE Access 8:137789\u2013137798","journal-title":"IEEE Access"},{"key":"10552_CR3","doi-asserted-by":"crossref","unstructured":"Ahn W, Nam SH, Son M, Lee HK, Choi S (2019) End-to-end double jpeg detection with a 3d convolutional network in the dct domain. Electronics Letters","DOI":"10.1049\/el.2019.2719"},{"key":"10552_CR4","unstructured":"Al Qurashi F, Almohamedh H, Kostanic I (2014) Raw video database of mobile video quality prediction (mvqp). In: Proceedings of the international conference on image processing, computer vision, and pattern recognition (IPCV)"},{"key":"10552_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"Barni M, Bondi L, Bonettini N, Bestagini P, Costanzo A, Maggini M, Tondi B, Tubaro S (2017) Aligned and non-aligned double jpeg detection using convolutional neural networks. J Vis Commun Image Represent 49:153\u2013163","journal-title":"J Vis Commun Image Represent"},{"key":"10552_CR6","doi-asserted-by":"crossref","unstructured":"Bayar B, Stamm MC (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security, pp 5\u201310","DOI":"10.1145\/2909827.2930786"},{"issue":"7","key":"10552_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-328","volume":"2017","author":"B Bayar","year":"2017","unstructured":"Bayar B, Stamm MC (2017) Design principles of convolutional neural networks for multimedia forensics. Electronic Imaging 2017(7):77\u201386","journal-title":"Electronic Imaging"},{"issue":"11","key":"10552_CR8","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar B, Stamm MC (2018) Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Transactions on Information Forensics and Security 13(11):2691\u20132706","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10552_CR9","doi-asserted-by":"crossref","unstructured":"Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2018.2871749"},{"issue":"1-3","key":"10552_CR10","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.forsciint.2012.12.014","volume":"226","author":"CH Choi","year":"2013","unstructured":"Choi CH, Lee HY, Lee HK (2013) Estimation of color modification in digital images by cfa pattern change. Forensic Science International 226 (1-3):94\u2013105","journal-title":"Forensic Science International"},{"key":"10552_CR11","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1251\u20131258","DOI":"10.1109\/CVPR.2017.195"},{"key":"10552_CR12","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li LJ, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE, pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"3","key":"10552_CR13","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868\u2013882","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10552_CR14","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on imagenet classification. In: The IEEE international conference on computer vision (ICCV)","DOI":"10.1109\/ICCV.2015.123"},{"key":"10552_CR15","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"10552_CR16","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.jvcir.2017.06.010","volume":"48","author":"P He","year":"2017","unstructured":"He P, Jiang X, Sun T, Wang S, Li B, Dong Y (2017) Frame-wise detection of relocated i-frames in double compressed h. 264 videos based on convolutional neural network. J Vis Commun Image Represent 48:149\u2013158","journal-title":"J Vis Commun Image Represent"},{"issue":"8","key":"10552_CR17","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/TCSVT.2016.2539828","volume":"27","author":"JU Hou","year":"2016","unstructured":"Hou JU, Lee HK (2016) Detection of hue modification using photo response nonuniformity. IEEE Transactions on Circuits and Systems for Video Technology 27(8):1826\u20131832","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10552_CR18","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167"},{"issue":"1","key":"10552_CR19","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TIFS.2017.2745687","volume":"13","author":"X Jiang","year":"2018","unstructured":"Jiang X, He P, Sun T, Xie F, Wang S (2018) Detection of double compression with the same coding parameters based on quality degradation mechanism analysis. IEEE Transactions on Information Forensics and Security 13 (1):170\u2013185","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10552_CR20","doi-asserted-by":"crossref","unstructured":"Johnston P, Elyan E (2019) A review of digital video tampering: from simple editing to full synthesis. Digital Investigation","DOI":"10.1016\/j.diin.2019.03.006"},{"key":"10552_CR21","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv:1412.6980"},{"key":"10552_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jvcir.2015.02.012","volume":"30","author":"JY Lin","year":"2015","unstructured":"Lin JY, Song R, Wu CH, Liu T, Wang H, Kuo CCJ (2015) Mcl-v: a streaming video quality assessment database. J Vis Commun Image Represent 30:1\u20139","journal-title":"J Vis Commun Image Represent"},{"key":"10552_CR23","unstructured":"Lin M, Chen Q, Yan S (2013) Network in network. arXiv:1312.4400"},{"issue":"7","key":"10552_CR24","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1109\/TCSVT.2018.2859633","volume":"29","author":"Q Liu","year":"2018","unstructured":"Liu Q (2018) An improved approach to exposing jpeg seam carving under recompression. IEEE Transactions on Circuits and Systems for Video Technology 29(7):1907\u20131918","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10552_CR25","unstructured":"Montgomery C, et al. (1994) Xiph. org video test media (derf\u2019s collection), the xiph open source community. Online, https:\/\/media.xiph.org\/video\/derf"},{"key":"10552_CR26","unstructured":"Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th international conference on machine learning (ICML-10), pp 807\u2013814"},{"key":"10552_CR27","doi-asserted-by":"crossref","unstructured":"Nam SH, Ahn W, Mun SM, Park J, Kim D, Yu IJ, Lee HK (2019) Content-aware image resizing detection using deep neural network. In: 2019 IEEE international conference on image processing (ICIP). IEEE, pp 106\u2013110","DOI":"10.1109\/ICIP.2019.8802946"},{"key":"10552_CR28","doi-asserted-by":"crossref","unstructured":"Nam SH, Ahn W, Yu IJ, Kwon MJ, Son M, Lee HK (2020) Deep convolutional neural network for identifying seam-carving forgery. IEEE Transactions on Circuits and Systems for Video Technology","DOI":"10.1109\/TCSVT.2020.3037662"},{"issue":"7","key":"10552_CR29","doi-asserted-by":"publisher","first-page":"7811","DOI":"10.1007\/s11042-017-4678-x","volume":"77","author":"SH Nam","year":"2018","unstructured":"Nam SH, Kim WH, Mun SM, Hou JU, Choi S, Lee HK (2018) A sift features based blind watermarking for dibr 3d images. Multimedia Tools and Applications 77(7):7811\u20137850","journal-title":"Multimedia Tools and Applications"},{"key":"10552_CR30","doi-asserted-by":"publisher","first-page":"93760","DOI":"10.1109\/ACCESS.2020.2994966","volume":"8","author":"SH Nam","year":"2020","unstructured":"Nam SH, Mun SM, Ahn W, Kim D, Yu IJ, Kim WH, Lee HK (2020) Nsct-based robust and perceptual watermarking for dibr 3d images. IEEE Access 8:93760\u201393781","journal-title":"IEEE Access"},{"key":"10552_CR31","doi-asserted-by":"crossref","unstructured":"Nam SH, Park J, Kim D, Yu IJ, Kim TY, Lee HK (2019) Two-stream network for detecting double compression of h. 264 videos. In: 2019 IEEE international conference on image processing (ICIP). IEEE, pp 111\u2013115","DOI":"10.1109\/ICIP.2019.8802966"},{"key":"10552_CR32","doi-asserted-by":"crossref","unstructured":"Park J, Cho D, Ahn W, Lee HK (2018) Double jpeg detection in mixed jpeg quality factors using deep convolutional neural network. In: Proceedings of the European conference on computer vision (ECCV), pp 636\u2013652","DOI":"10.1007\/978-3-030-01228-1_39"},{"key":"10552_CR33","first-page":"132","volume":"67","author":"JS Park","year":"2018","unstructured":"Park JS, Kim HG, Kim DG, Yu IJ, Lee HK (2018) Paired mini-batch training: a new deep network training for image forensics and steganalysis. Signal Processing: Image Communication 67:132\u2013139","journal-title":"Signal Processing: Image Communication"},{"issue":"2","key":"10552_CR34","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53(2):758\u2013767","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10552_CR35","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE international conference on computer vision, pp 1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"issue":"8","key":"10552_CR36","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Transactions on Information Forensics and Security 8(8):1355\u20131370","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10552_CR37","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556"},{"key":"10552_CR38","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"MC Stamm","year":"2013","unstructured":"Stamm MC, Wu M, Liu KR (2013) Information forensics: an overview of the first decade. IEEE Access 1:167\u2013200","journal-title":"IEEE Access"},{"issue":"1","key":"10552_CR39","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/TASSP.1979.1163188","volume":"27","author":"S Thomas","year":"1979","unstructured":"Thomas S, Huang George J, Yang GYT (1979) A fast two-dimentional median filtering algorithm. IEEE Transactions on Acoustics, Speech and Signal Processing 27(1):13\u201318","journal-title":"IEEE Transactions on Acoustics, Speech and Signal Processing"},{"key":"10552_CR40","doi-asserted-by":"crossref","unstructured":"Verdoliva L (2020) Media forensics and deepfakes:, an overview. arXiv:2001.06564","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"10552_CR41","doi-asserted-by":"crossref","unstructured":"Woolson R (2007) Wilcoxon signed-rank test. Wiley Encyclopedia of Clinical Trials, pp 1\u20133","DOI":"10.1002\/9780471462422.eoct979"},{"key":"10552_CR42","doi-asserted-by":"publisher","first-page":"210837","DOI":"10.1109\/ACCESS.2020.3037735","volume":"8","author":"IJ Yu","year":"2020","unstructured":"Yu IJ, Nam SH, Ahn W, Kwon MJ, Lee HK (2020) Manipulation classification for jpeg images using multi-domain features. IEEE Access 8:210837\u2013210854","journal-title":"IEEE Access"},{"key":"10552_CR43","doi-asserted-by":"crossref","unstructured":"Zhang Z, Ding S, Sun Y (2020) A support vector regression model hybridized with chaotic krill herd algorithm and empirical mode decomposition for regression task. Neurocomputing","DOI":"10.1016\/j.neucom.2020.05.075"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10552-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10552-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10552-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T05:42:49Z","timestamp":1631684569000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10552-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,12]]},"references-count":43,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["10552"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10552-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,12]]},"assertion":[{"value":"30 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}