{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:34:53Z","timestamp":1767141293650,"version":"build-2238731810"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10581-0","type":"journal-article","created":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T04:20:56Z","timestamp":1613017256000},"page":"17721-17744","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Median filtering detection using LBP encoding pattern\u2605"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0861-8193","authenticated-orcid":false,"given":"Xiaofeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xinai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Shaolin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,10]]},"reference":[{"key":"10581_CR1","unstructured":"Bas P, Furon T (2007) Break Our Watermarking System, [Online]. Available: https:\/\/bows2.gipsa-lab.inpg.fr, 2nd ed"},{"issue":"4","key":"10581_CR2","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/TASSP.1987.1165153","volume":"35","author":"AC Bovik","year":"1987","unstructured":"Bovik AC (1987) Streaking in median filtered images. IEEE Trans Acoust, Speech, Signal Process 35(4):493\u2013503","journal-title":"IEEE Trans Acoust, Speech, Signal Process"},{"key":"10581_CR3","doi-asserted-by":"crossref","unstructured":"Cancelli G, Do\u00ebrr G, Barni M, Cox IJ (2008) A comparative study of 1 steganalyzers in Proc ACM Multimed Secur Workshop, 2008, pp.791\u2013796","DOI":"10.1109\/MMSP.2008.4665182"},{"key":"10581_CR4","doi-asserted-by":"crossref","unstructured":"Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images, 2010 IEEE International Conference on Multimedia and Expo (ICME), Singapore","DOI":"10.1109\/ICME.2010.5583869"},{"issue":"11","key":"10581_CR5","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen J, Kang X, Liu Y, Jane Wang Z (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849\u20131853","journal-title":"IEEE Signal Process Lett"},{"issue":"12","key":"10581_CR6","doi-asserted-by":"publisher","first-page":"4699","DOI":"10.1109\/TIP.2013.2277814","volume":"22","author":"C Chen","year":"2013","unstructured":"Chen C, Ni J, Huang J (2013) Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach. IEEE Trans Image Process 22(12):4699\u20134710","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"10581_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/LSP.2008.2008951","volume":"16","author":"YS Chen","year":"2009","unstructured":"Chen YS, Wang RZ (2009) Steganalysis of reversible contrast mapping watermarking. IEEE Signal Process Lett 16(2):125\u2013128","journal-title":"IEEE Signal Process Lett"},{"key":"10581_CR8","doi-asserted-by":"crossref","unstructured":"Chuang WH, Swaminathan A, Mu M (2009) Tampering identification using empirical frequency response, in Proc IEEE Int Conf Acoust, Speech, Signal Process, pp. 1517\u20131520","DOI":"10.1109\/ICASSP.2009.4959884"},{"issue":"1","key":"10581_CR9","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forensics Secur 4(1):154\u2013160","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10581_CR10","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s11554-019-00860-3","volume":"16","author":"S Gao","year":"2019","unstructured":"Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Proc 16(3):741\u2013750","journal-title":"J Real-Time Image Proc"},{"issue":"4","key":"10581_CR11","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1109\/TPAMI.2006.68","volume":"28","author":"M Heikkil\u00e4","year":"2006","unstructured":"Heikkil\u00e4 M, Pietik\u00e4inen M (2006) A texture-based method for modeling the background and detecting moving objects. IEEE Trans Pattern Anal Mach Intell 28(4):657\u2013662","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"9","key":"10581_CR12","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X Kang","year":"2013","unstructured":"Kang X, Stamm MC, Peng A, Liu KJR (2013) Robust median filtering forensics using an autoregressive model. IEEE Trans Inf Forens Sec 8(9):1456\u20131468","journal-title":"IEEE Trans Inf Forens Sec"},{"issue":"6","key":"10581_CR13","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"A Ker","year":"2005","unstructured":"Ker A (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441\u2013444","journal-title":"IEEE Signal Process Lett"},{"key":"10581_CR14","doi-asserted-by":"crossref","unstructured":"Ker A, B\u00f6hme R (2008) Revisiting weighted stego-image steganalysis in Proc SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, Vol.6819, pp.501\u2013517","DOI":"10.1117\/12.766820"},{"issue":"4","key":"10581_CR15","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TIFS.2008.2008214","volume":"3","author":"M Kirchner","year":"2008","unstructured":"Kirchner M, Bohme R (2008) Hiding traces of resampling in digital images. IEEE Trans Inform Forensics Secur 3(4):582\u2013592","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"10581_CR16","doi-asserted-by":"crossref","unstructured":"Kirchner M, Fridrich J (2010) On detection of median filtering in digital images in Electron Imaging, Media Forensics and Security II, vol. 7541 of Proc SPIE, pp.1\u201312","DOI":"10.1117\/12.839100"},{"key":"10581_CR17","doi-asserted-by":"crossref","unstructured":"X. Liao, K. Li, X. Zhu, K.J.R. Liu (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Sign Proces 14(5):955\u2013968","DOI":"10.1109\/JSTSP.2020.3002391"},{"issue":"3","key":"10581_CR18","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"WQ Luo","year":"2010","unstructured":"Luo WQ, Huang JW, Qiu GP (2010) JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Secur 5(3):480\u2013491","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"10581_CR19","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TIFS.2010.2074195","volume":"5","author":"WQ Luo","year":"2010","unstructured":"Luo WQ, Wang YG, Huang JW (2010) Detection of quantization artifacts and its applications to transform encoder identification. IEEE Trans Inf Forensics Secur 5(4):810\u2013815","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"10581_CR20","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971\u2013987","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"7","key":"10581_CR21","doi-asserted-by":"publisher","first-page":"1425","DOI":"10.1109\/TIFS.2016.2530636","volume":"11","author":"C Pasquini","year":"2016","unstructured":"Pasquini C, Boato G, Alajlan N, de Natale FGB (2016) A Deterministic Approach to Detect Median Filtering in 1D Data. IEEE Trans Inf Forens Sec 11(7):1425\u20131437","journal-title":"IEEE Trans Inf Forens Sec"},{"issue":"2","key":"10581_CR22","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevn\u2019Y","year":"2010","unstructured":"Pevn\u2019Y T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10581_CR23","doi-asserted-by":"crossref","unstructured":"Pev\u00fd T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography in Proc 12th Information Hiding, Jun 28\u201330, LNCS6387, pp.161\u2013177","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"10581_CR24","unstructured":"Schaefer G, Stich M (2004) UCID-An uncompressed colour image database in Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp. 472\u2013480."},{"key":"10581_CR25","doi-asserted-by":"publisher","unstructured":"Shen Z, Ni J, Chen C (2014) Blind detection of median filtering using linear and nonlinear descriptors. Multimed Tools Appl, doi https:\/\/doi.org\/10.1007\/s11042-014-2407-2.","DOI":"10.1007\/s11042-014-2407-2"},{"issue":"3","key":"10581_CR26","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","volume":"5","author":"MC Stamm","year":"2010","unstructured":"Stamm MC, Liu KJR (2010) Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans Inf Forensics Secur 5(3):492\u2013506","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10581_CR27","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MC Stamm","year":"2011","unstructured":"Stamm MC, Liu KJR (2011) Anti-forensics of digital image compression. IEEE Trans Inform Forensics Secur 6(3):1050\u20131065","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"1","key":"10581_CR28","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TIFS.2007.916010","volume":"3","author":"A Swaminathan","year":"2008","unstructured":"Swaminathan A, Wu M, Liu KJR (2008) Digital image forensics via intrinsic fingerprints. IEEE Trans Inf Forensics Secur 3(1):101\u2013117","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10581_CR29","unstructured":"United States Department of Agriculture, \u201cNatural Resources Conservation Service Photo Gallery 2002\u201d [Online]. Available: http:\/\/photogallery.nrcs.usda.gov"},{"key":"10581_CR30","doi-asserted-by":"crossref","unstructured":"Yu X, Babaguchi N (2008) Breaking the YASS algorithm via pixel and DCT coefficients analysis, in Proc. 19th IEEE Int. Conf. Pattern Recogn, pp. 1\u20134.","DOI":"10.1109\/ICPR.2008.4761636"},{"issue":"4","key":"10581_CR31","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"H Yuan","year":"2011","unstructured":"Yuan H (2011) Blind forensics of median filtering in digital images. IEEE Trans Inf Forensics Secur 6(4):1335\u20131345","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10581_CR32","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/LSP.2013.2295858","volume":"21","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Li S, Wang S, Shi YQ (2014) Revealing the traces of median filtering using high-order local ternary patterns. IEEE Signal Process Lett 21(3):275\u2013280","journal-title":"IEEE Signal Process Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10581-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10581-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10581-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T04:52:30Z","timestamp":1621486350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10581-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,10]]},"references-count":32,"aliases":["10.1007\/s11042-022-12346-9"],"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10581"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10581-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,10]]},"assertion":[{"value":"21 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}