{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T13:09:20Z","timestamp":1770296960887,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"21-23","license":[{"start":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T00:00:00Z","timestamp":1628553600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T00:00:00Z","timestamp":1628553600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11042-021-11213-3","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T18:02:27Z","timestamp":1628618547000},"page":"32905-32924","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Image tampering detection based on a statistical model"],"prefix":"10.1007","volume":"80","author":[{"given":"Thi Ngoc Canh","family":"Doan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9273-4260","authenticated-orcid":false,"given":"Florent","family":"Retraint","sequence":"additional","affiliation":[]},{"given":"Cathel","family":"Zitzmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,10]]},"reference":[{"key":"11213_CR1","doi-asserted-by":"crossref","unstructured":"Bayar B, Stamm MC (2017) On the robustness of constrained convolutional neural networks to jpeg post-compression for image resampling detection. In: acoustics, speech and signal processing (ICASSP), 2017 IEEE international conference on, pp 2152\u20132156","DOI":"10.1109\/ICASSP.2017.7952537"},{"key":"11213_CR2","doi-asserted-by":"crossref","unstructured":"Doan TNC, Retraint F, Zitzmann C (2017) Blind forensics tool of falsification for im- ages. In: 2017 IEEE international symposium on signal processing and information technology (ISSPIT), pp 018\u2013023","DOI":"10.1109\/ISSPIT.2017.8388312"},{"issue":"2\u20134","key":"11213_CR3","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1080\/15567281.2010.531500","volume":"3","author":"T Gloe","year":"2010","unstructured":"Gloe T, Bohme R (2010) The Dresden image database for benchmarking digital image forensics. Journal of Digital Forensic Practice 3(2\u20134):150\u2013159","journal-title":"Journal of Digital Forensic Practice"},{"key":"11213_CR4","doi-asserted-by":"crossref","unstructured":"Hwang JJ, Rhee KH (2016) Gaussian filtering detection based on features of residuals in image forensics. In: Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), 2016 IEEE RIVF International Conference on, pp153\u2013157","DOI":"10.1109\/RIVF.2016.7800286"},{"key":"11213_CR5","doi-asserted-by":"publisher","first-page":"50459","DOI":"10.1109\/ACCESS.2018.2867370","volume":"6","author":"J Jin","year":"2019","unstructured":"Jin J, Jing P, Su Y (2019) AMFNet: an adversarial network for median filtering detection. IEEE Access 6:50459\u201350467","journal-title":"IEEE Access"},{"key":"11213_CR6","doi-asserted-by":"crossref","unstructured":"Julliand T, Nozick V, Talbot H (2016) Automatic image splicing detection based on noise density analysis in raw images. In: International Conference on Advanced Concepts for Intelligent Vision Systems, Springer, pp. 126\u2013134","DOI":"10.1007\/978-3-319-48680-2_12"},{"key":"11213_CR7","doi-asserted-by":"crossref","unstructured":"Le N, Retraint F (2018) Statistical detector of resampled tiff images. In: 2018 IEEE international symposium on signal processing and information technology (ISSPIT), pp 331\u2013335","DOI":"10.1109\/ISSPIT.2018.8642651"},{"key":"11213_CR8","doi-asserted-by":"publisher","first-page":"125038","DOI":"10.1109\/ACCESS.2019.2938467","volume":"7","author":"N Le","year":"2019","unstructured":"Le N, Retraint F (2019) An improved algorithm for digital image authentication and forgery localization using Demosaicing artifacts. IEEE Access 7:125038\u2013125053","journal-title":"IEEE Access"},{"issue":"5","key":"11213_CR9","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"XL Liu","year":"2018","unstructured":"Liu XL, Lin CC, Yuan SM (2018) Blind dual watermarking for color images au- thentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047\u20131055","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"10","key":"11213_CR10","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1109\/TIFS.2019.2902826","volume":"14","author":"Y Liu","year":"2019","unstructured":"Liu Y, Zhu X, Zhao X, Cao Y (2019) Adversarial learning for constrained image splicing detection and localization based on atrous convolution. IEEE Transactions on Informa- tion Forensics and Security 14(10):2551\u20132566","journal-title":"IEEE Transactions on Informa- tion Forensics and Security"},{"key":"11213_CR11","doi-asserted-by":"publisher","first-page":"80614","DOI":"10.1109\/ACCESS.2019.2923000","volume":"7","author":"S Luo","year":"2019","unstructured":"Luo S, Peng A, Zeng H, Kang X, Liu L (2019) Deep residual learning using data aug- mentation for median filtering forensics of digital images. IEEE Access 7:80614\u201380621","journal-title":"IEEE Access"},{"issue":"4","key":"11213_CR12","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1093\/comjnl\/7.4.308","volume":"7","author":"JA Nelder","year":"1965","unstructured":"Nelder JA, Mead R (1965) A simplex method for function minimization. Comput J 7(4):308\u2013313","journal-title":"Comput J"},{"key":"11213_CR13","doi-asserted-by":"publisher","first-page":"487","DOI":"10.5220\/0007412804870494","volume":"2019","author":"HP Nguyen","year":"2019","unstructured":"Nguyen HP, Retraint F, Morain-Nicolier F, Delahaies A (2019) An image forgery De- tection solution based on DCT coefficient analysis. International Conference on Information Systems Security and Privacy 2019:487\u2013494","journal-title":"International Conference on Information Systems Security and Privacy"},{"key":"11213_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.image.2017.01.008","volume":"53","author":"Y Niu","year":"2017","unstructured":"Niu Y, Zhao Y, Ni R (2017) Robust median filtering detection based on local difference descriptor. Signal Process Image Commun 53:65\u201372","journal-title":"Signal Process Image Commun"},{"key":"11213_CR15","doi-asserted-by":"publisher","first-page":"78038","DOI":"10.1109\/ACCESS.2018.2884710","volume":"6","author":"T Qiao","year":"2018","unstructured":"Qiao T, Retraint F (2018) Identifying individual camera device from RAW images. IEEE Access 6:78038\u201378054","journal-title":"IEEE Access"},{"key":"11213_CR16","doi-asserted-by":"crossref","unstructured":"Qiao T, Retraint F, Cogranne R, Thai TH (2017) Individual camera device identification from JPEG images. Sig. Proc.: image Comm. 52: 74\u201386","DOI":"10.1016\/j.image.2016.12.011"},{"issue":"2","key":"11213_CR17","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1007\/s11042-016-4314-1","volume":"77","author":"T Qiao","year":"2018","unstructured":"Qiao T, Zhu A, Retraint F (2018) Exposing image resampling forgery by using linear parametric model. Multimedia Tools Appl 77(2):1501\u20131523","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"11213_CR18","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51(1):133\u2013162","journal-title":"Multimed Tools Appl"},{"key":"11213_CR19","doi-asserted-by":"crossref","unstructured":"Rhee KH (2016) Gaussian filtering detection using band pass residual and contrast of forgery image. In: information technology, electronics and Mobile communication conference (IEMCON), 2016 IEEE 7th annual, pp 1\u20134","DOI":"10.1109\/IEMCON.2016.7746310"},{"issue":"5","key":"11213_CR20","doi-asserted-by":"publisher","first-page":"3811","DOI":"10.3906\/elk-1606-410","volume":"25","author":"KH Rhee","year":"2017","unstructured":"Rhee KH (2017) Median filtering detection based on variations and residuals in image forensics. Turkish Journal of Electrical Engineering & Computer Sciences 25(5):3811\u20133826","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"key":"11213_CR21","doi-asserted-by":"publisher","first-page":"92586","DOI":"10.1109\/ACCESS.2019.2927540","volume":"7","author":"KH Rhee","year":"2019","unstructured":"Rhee KH (2019) Forensic detection using bit-planes slicing of median filtering image. IEEE Access 7:92586\u201392597","journal-title":"IEEE Access"},{"key":"11213_CR22","unstructured":"Romano JP, Lehmann E (2005) Testing statistical hypotheses"},{"issue":"424","key":"11213_CR23","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1080\/01621459.1993.10476408","volume":"88","author":"PJ Rousseeuw","year":"1993","unstructured":"Rousseeuw PJ, Croux C (1993) Alternatives to the median absolute deviation. J Am Stat Assoc 88(424):1273\u20131283","journal-title":"J Am Stat Assoc"},{"issue":"8","key":"11213_CR24","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.1109\/TIT.2007.901152","volume":"53","author":"C Scott","year":"2007","unstructured":"Scott C (2007) Performance measures for neyman\u2013Pearson classification. IEEE Trans- actions on Information Theory 53(8):2852\u20132863","journal-title":"IEEE Trans- actions on Information Theory"},{"issue":"10","key":"11213_CR25","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1049\/iet-ipr.2017.1131","volume":"12","author":"H Sheng","year":"2018","unstructured":"Sheng H, Shen X, Lyu Y, Shi Z, Ma S (2018) Image splicing detection based on Markov features in discrete octonion cosine transform domain. IET Image Process 12(10):1815\u20131823","journal-title":"IET Image Process"},{"key":"11213_CR26","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.jvcir.2017.01.009","volume":"48","author":"Y Su","year":"2017","unstructured":"Su Y, Jin X, Zhang C, Chen Y (2017) Hierarchical image resampling detection based on blind deconvolution. J Vis Commun Image Represent 48:480\u2013490","journal-title":"J Vis Commun Image Represent"},{"key":"11213_CR27","doi-asserted-by":"crossref","unstructured":"Thai TH, Retraint F, Cogranne R (2012) Statistical model of natural images. In: image processing (ICIP), 2012 19th IEEE international conference on, pp 2525\u20132528","DOI":"10.1109\/ICIP.2012.6467412"},{"issue":"1","key":"11213_CR28","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TIP.2013.2290596","volume":"23","author":"TH Thai","year":"2014","unstructured":"Thai TH, Cogranne R, Retraint F (2014) Camera model identification based on the heteroscedastic noise model. IEEE Trans Image Process 23(1):250\u2013263","journal-title":"IEEE Trans Image Process"},{"key":"11213_CR29","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.sigpro.2015.02.020","volume":"114","author":"TH Thai","year":"2015","unstructured":"Thai TH, Retraint F, Cogranne R (2015) Generalized signal-dependent noise model and parameter estimation for natural images. Signal Process 114:164\u2013170","journal-title":"Signal Process"},{"key":"11213_CR30","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.dsp.2015.10.002","volume":"48","author":"TH Thai","year":"2016","unstructured":"Thai TH, Retraint F, Cogranne R (2016) Camera model identification based on the generalized noise model in natural images. Digital Signal Processing 48:285\u2013297","journal-title":"Digital Signal Processing"},{"key":"11213_CR31","doi-asserted-by":"publisher","first-page":"120594","DOI":"10.1109\/ACCESS.2019.2932810","volume":"7","author":"L Yu","year":"2019","unstructured":"Yu L, Zhang Y, Han H, Zhang L, Wu F (2019) Robust median filtering forensics by CNN-based multiple residuals learning. IEEE Access 7:120594\u2013120602","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11213-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11213-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11213-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T05:23:48Z","timestamp":1633843428000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11213-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,10]]},"references-count":31,"journal-issue":{"issue":"21-23","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["11213"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11213-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,10]]},"assertion":[{"value":"4 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}