{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:43:36Z","timestamp":1771476216365,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T00:00:00Z","timestamp":1688083200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T00:00:00Z","timestamp":1688083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["ECR\/2015\/000583"],"award-info":[{"award-number":["ECR\/2015\/000583"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15942-5","type":"journal-article","created":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T08:02:13Z","timestamp":1688112133000},"page":"9949-9971","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Block-level double JPEG compression detection for image forgery localization"],"prefix":"10.1007","volume":"83","author":[{"given":"Vinay","family":"Verma","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7571-9130","authenticated-orcid":false,"given":"Nitin","family":"Khanna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,30]]},"reference":[{"key":"15942_CR1","doi-asserted-by":"crossref","unstructured":"Amerini, I., Becarelli, R., Caldelli, R., Del\u00a0Mastio, A.: Splicing forgeries localization through the use of first digit features. In: IEEE International Workshop on Information Forensics and Security (WIFS), 143\u2013148 (2014)","DOI":"10.1109\/WIFS.2014.7084318"},{"key":"15942_CR2","doi-asserted-by":"crossref","unstructured":"Amerini, I., Uricchio, T., Ballan, L., Caldelli, R.: Localization of jpeg double compression through multi-domain convolutional neural networks. In: IEEE Conference on computer vision and pattern recognition workshops (CVPRW), 1865\u20131871. IEEE (2017)","DOI":"10.1109\/CVPRW.2017.233"},{"key":"15942_CR3","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"Barni M, Bondi L, Bonettini N, Bestagini P, Costanzo A, Maggini M, Tondi B, Tubaro S (2017) Aligned and non-aligned double JPEG detection using convolutional neural networks. Journal of Visual Communication and Image Representation 49:153\u2013163","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"15942_CR4","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., Pevn\u1ef3, T.: Break our steganographic system: The ins and outs of organizing boss. In: International Workshop on Information Hiding, 59\u201370. Springer Berlin Heidelberg (2011)","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"15942_CR5","doi-asserted-by":"crossref","unstructured":"Bianchi, T., De\u00a0Rosa, A., Piva, A.: Improved dct coefficient analysis for forgery localization in jpeg images. In: 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2444\u20132447 (2011)","DOI":"10.1109\/ICASSP.2011.5946978"},{"issue":"2","key":"15942_CR6","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TIFS.2011.2106121","volume":"6","author":"YL Chen","year":"2011","unstructured":"Chen YL, Hsu CT (2011) Detecting recompression of jpeg images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security 6(2):396\u2013406","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15942_CR7","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, 1251\u20131258 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"15942_CR8","doi-asserted-by":"crossref","unstructured":"Dang-Nguyen, D.T., Pasquini, C., Conotter, V., Boato, G.: Raise: A raw images dataset for digital image forensics. In: Proceedings of the 6th ACM Multimedia Systems Conference, MMSys \u201915, 219-224. Association for Computing Machinery (2015)","DOI":"10.1145\/2713168.2713194"},{"issue":"1","key":"15942_CR9","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid H (2009) Exposing digital forgeries from jpeg ghosts. IEEE transactions on information forensics and security 4(1):154\u2013160","journal-title":"IEEE transactions on information forensics and security"},{"key":"15942_CR10","series-title":"Steganography, and Watermarking of Multimedia Contents IX","first-page":"574","volume-title":"Security","author":"D Fu","year":"2007","unstructured":"Fu D, Shi YQ, Su W (2007) A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. Security, vol 6505. Steganography, and Watermarking of Multimedia Contents IX. International Society for Optics and Photonics, SPIE, pp 574\u2013584"},{"issue":"2\u20134","key":"15942_CR11","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1080\/15567281.2010.531500","volume":"3","author":"T Gloe","year":"2010","unstructured":"Gloe T, B\u00f6hme R (2010) The dresden image database for benchmarking digital image forensics. Journal of Digital Forensic Practice 3(2\u20134):150\u2013159","journal-title":"Journal of Digital Forensic Practice"},{"key":"15942_CR12","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, Proceedings of Machine Learning Research, vol.\u00a09, 249\u2013256. PMLR (2010)"},{"key":"15942_CR13","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"15942_CR14","doi-asserted-by":"crossref","unstructured":"Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE International Conference on Multimedia and Expo, 549\u2013552 (2006)","DOI":"10.1109\/ICME.2006.262447"},{"key":"15942_CR15","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"15942_CR16","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint http:\/\/arxiv.org\/abs\/1412.6980arXiv:1412.6980 (2014)"},{"key":"15942_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2017.08.009","volume":"71","author":"P Korus","year":"2017","unstructured":"Korus P (2017) Digital image integrity-a survey of protection and verification techniques. Digital Signal Processing 71:1\u201326","journal-title":"Digital Signal Processing"},{"key":"15942_CR18","unstructured":"Li, B., Luo, H., Zhang, H., Tan, S., Ji, Z.: A multi-branch convolutional neural network for detecting double jpeg compression. arXiv preprint http:\/\/arxiv.org\/abs\/1710.05477arXiv:1710.05477 (2017)"},{"key":"15942_CR19","unstructured":"Li, B., Shi, Y.Q., Huang, J.: Detecting doubly compressed jpeg images by using mode based first digit features. In: Proceedings of IEEE 10th Workshop on Multimedia Signal Processing, 730\u2013735 (2008)"},{"issue":"7","key":"15942_CR20","doi-asserted-by":"publisher","first-page":"8577","DOI":"10.1007\/s11042-018-7073-3","volume":"78","author":"B Li","year":"2019","unstructured":"Li B, Zhang H, Luo H, Tan S (2019) Detecting Double JPEG Compression and Its Related Anti-Forensic Operations with CNN. Multimedia Tools and Applications 78(7):8577\u20138601","journal-title":"Multimedia Tools and Applications"},{"issue":"9","key":"15942_CR21","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1016\/j.sigpro.2009.03.025","volume":"89","author":"W Li","year":"2009","unstructured":"Li W, Yuan Y, Yu N (2009) Passive detection of doctored JPEG image via block artifact grid extraction. Signal Processing 89(9):1821\u20131829","journal-title":"Signal Processing"},{"issue":"11","key":"15942_CR22","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin Z, He J, Tang X, Tang CK (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42(11):2492\u20132501","journal-title":"Pattern Recognition"},{"key":"15942_CR23","unstructured":"Luk\u00e1\u0161, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed jpeg images. In: Proceedings Digital Forensic Research Workshop, 5\u20138 (2003)"},{"key":"15942_CR24","doi-asserted-by":"crossref","unstructured":"Luo, W., Qu, Z., Huang, J., Qiu, G.: A novel method for detecting cropped and recompressed image block. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol.\u00a02, II\u2013217\u2013II\u2013220 (2007)","DOI":"10.1109\/ICASSP.2007.366211"},{"key":"15942_CR25","doi-asserted-by":"crossref","unstructured":"Milani, S., Tagliasacchi, M., Tubaro, S.: Discriminating multiple jpeg compressions using first digit features. APSIPA Transactions on Signal and Information Processing 3 (2014)","DOI":"10.1017\/ATSIP.2014.19"},{"key":"15942_CR26","doi-asserted-by":"crossref","unstructured":"Park, J., Cho, D., Ahn, W., Lee, H.K.: Double jpeg detection in mixed jpeg quality factors using deep convolutional neural network. In: Proceedings of the European Conference on Computer Vision (ECCV), 636\u2013652 (2018)","DOI":"10.1007\/978-3-030-01228-1_39"},{"key":"15942_CR27","doi-asserted-by":"crossref","unstructured":"Pasquini, C., Boato, G., Perez-Gonzalez, F.: Multiple jpeg compression detection by means of benford-fourier coefficients. In: Proceedings IEEE International Workshop on Information Forensics and Security (WIFS), 113\u2013118 (2014)","DOI":"10.1109\/WIFS.2014.7084313"},{"key":"15942_CR28","doi-asserted-by":"crossref","unstructured":"Piva, A.: An overview on image forensics. Hindawi Publishing Corporation, International Scholarly Research Notices (ISRN) Signal Processing 2013 (2013)","DOI":"10.1155\/2013\/496701"},{"key":"15942_CR29","doi-asserted-by":"crossref","unstructured":"Popescu, A.C., Farid, H.: Statistical tools for digital forensics. In: Information Hiding, vol. 3200, 395\u2013407. Springer (2004)","DOI":"10.1007\/978-3-540-30114-1_10"},{"issue":"1","key":"15942_CR30","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133\u2013162","journal-title":"Multimedia Tools and Applications"},{"key":"15942_CR31","unstructured":"Schaefer, G., Stich, M.: Ucid: an uncompressed color image database. In: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, 472 \u2013 480. International Society for Optics and Photonics, SPIE (2003)"},{"key":"15942_CR32","doi-asserted-by":"crossref","unstructured":"Sencar, H.T., Memon, N.: Overview of state-of-the-art in digital image forensics. Algorithms, Architectures and Information Systems Security 325\u2013347 (2009)","DOI":"10.1142\/9789812836243_0015"},{"key":"15942_CR33","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint http:\/\/arxiv.org\/abs\/1409.1556arXiv:1409.1556 (2014)"},{"key":"15942_CR34","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"MC Stamm","year":"2013","unstructured":"Stamm MC, Wu M, Liu KR (2013) Information forensics: An overview of the first decade. IEEE access 1:167\u2013200","journal-title":"IEEE access"},{"issue":"6","key":"15942_CR35","doi-asserted-by":"publisher","first-page":"7749","DOI":"10.1007\/s11042-016-3409-z","volume":"76","author":"A Taimori","year":"2017","unstructured":"Taimori A, Razzazi F, Behrad A, Ahmadi A, Babaie-Zadeh M (2017) A novel forensic image analysis tool for discovering double jpeg compression clues. Multimedia Tools and Applications 76(6):7749\u20137783","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"15942_CR36","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva L (2020) Media forensics and deepfakes: An overview. IEEE Journal of Selected Topics in Signal Processing 14(5):910\u2013932. https:\/\/doi.org\/10.1109\/JSTSP.2020.3002101","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"15942_CR37","first-page":"22","volume":"67","author":"V Verma","year":"2018","unstructured":"Verma V, Agarwal N, Khanna N (2018) DCT-domain deep convolutional neural networks for multiple JPEG compression classification. Signal Processing: Image Communication 67:22\u201333","journal-title":"Signal Processing: Image Communication"},{"key":"15942_CR38","doi-asserted-by":"crossref","unstructured":"Wallace, G.K.: The jpeg still picture compression standard. IEEE transactions on consumer electronics 38(1), xviii\u2013xxxiv (1992)","DOI":"10.1109\/30.125072"},{"issue":"1","key":"15942_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-018-0071-1","volume":"23","author":"Q Wang","year":"2016","unstructured":"Wang Q, Zhang R (2016) Double jpeg compression forensics based on a convolutional neural network. EURASIP Journal on Information Security 23(1):1\u201312","journal-title":"EURASIP Journal on Information Security"},{"issue":"10","key":"15942_CR40","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1109\/TIFS.2014.2345479","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang W, Dong J, Tan T (2014) Exploring dct coefficient quantization effects for local tampering detection. IEEE Transactions on Information Forensics and Security 9(10):1653\u20131666","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15942_CR41","doi-asserted-by":"crossref","unstructured":"Ye, S., Sun, Q., Chang, E.: Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact. In: IEEE International Conference on Multimedia and Expo, 12\u201315 (2007)","DOI":"10.1109\/ICME.2007.4284574"},{"issue":"7","key":"15942_CR42","doi-asserted-by":"publisher","first-page":"8183","DOI":"10.1007\/s11042-018-6737-3","volume":"78","author":"X Zeng","year":"2019","unstructured":"Zeng X, Feng G, Zhang X (2019) Detection of double jpeg compression using modified densenet model. Multimedia Tools and Applications 78(7):8183\u20138196","journal-title":"Multimedia Tools and Applications"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15942-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15942-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15942-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T09:55:39Z","timestamp":1704880539000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15942-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,30]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15942"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15942-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,30]]},"assertion":[{"value":"16 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This material is based upon work partially supported by a grant from the Department of Science and Technology (DST), New Delhi, India, under Award Number ECR\/2015\/000583. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the funding agencies. Address all correspondence to Nitin Khanna at nitin@iitbhilai.ac.in.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}