{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:52:31Z","timestamp":1763347951062},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T00:00:00Z","timestamp":1438214400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11424-015-4023-2","type":"journal-article","created":{"date-parts":[[2015,7,28]],"date-time":"2015-07-28T19:10:33Z","timestamp":1438110633000},"page":"1164-1176","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The detecting system of image forgeries with noise features and EXIF information"],"prefix":"10.1007","volume":"28","author":[{"given":"Xiaoting","family":"Sun","sequence":"first","affiliation":[]},{"given":"Yezhou","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shaozhang","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yanli","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,30]]},"reference":[{"key":"4023_CR1","first-page":"395","volume-title":"The 8th International Conference on Singnal Image Technology and Internet Based Systems","author":"M Hussain","year":"2012","unstructured":"Hussain M, Muhammad G, Saleh S Q, et al., Copy-move image forgery detection using multiresolution weber descriptors, The 8th International Conference on Singnal Image Technology and Internet Based Systems, 2012, 395\u2013401."},{"key":"4023_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ICCIC.2012.6510180","volume-title":"IEEE International Conference on Computational Intelligence and Computing Research","author":"R M Bora","year":"2012","unstructured":"Bora R M and Shahane N M, Image forgery detection through motion blur estimates, IEEE International Conference on Computational Intelligence and Computing Research, 2012, 1\u20134."},{"issue":"6","key":"4023_CR3","first-page":"16","volume":"35","author":"Y Z Li","year":"2012","unstructured":"Li Y Z, Wu X M, Niu S Z, et al., Detecting forgeries of Chinese character based on camera calibration, The Journal of Beijing Universities of Posts and Telecommunications, 2012, 35(6): 16\u201319.","journal-title":"The Journal of Beijing Universities of Posts and Telecommunications"},{"key":"4023_CR4","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/TIFS.2007.903848","volume":"2","author":"M K Johnson","year":"2007","unstructured":"Johnson M K and Farid H, Exposing digital forgeries in complex lighting environments, IEEE Transactions on Information Forensics and Security, 2007, 2: 450\u2013461.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"4023_CR5","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"A C Popescu","year":"2005","unstructured":"Popescu A C and Farid H, Exposing digital forgeries by detecting traces of re-sampling, IEEE Trans. Signal Processing, 2005, 53(2): 758\u2013767.","journal-title":"IEEE Trans. Signal Processing"},{"issue":"10","key":"4023_CR6","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"A C Popescu","year":"2005","unstructured":"Popescu A C and Farid H, Exposing digital forgeries in color filter array interpolated images, IEEE Transactions on Signal Processing, 2005, 53(10): 3948\u20133959.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"4023_CR7","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TIFS.2012.2234117","volume":"8","author":"G Valenzise","year":"2013","unstructured":"Valenzise G, Tagliasacchi M, and Tubaro S, Revealing the traces of JPEG compression antiforensics, IEEE Trans. Information Forensics and Security, 2013, 8(2): 335\u2013349.","journal-title":"IEEE Trans. Information Forensics and Security"},{"issue":"4","key":"4023_CR8","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/TIFS.2010.2072921","volume":"5","author":"F Huang","year":"2010","unstructured":"Huang F, Huang J, and Yun Q, Detecting double JPEG compression with the same quantization matri, IEEE Trans. Information Forensics and Security, 2010, 5(4): 848\u2013856.","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"4023_CR9","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-540-92238-4_3","volume":"5041","author":"M K Johnson","year":"2008","unstructured":"Johnson M K and Farid H, Detecting photographic composites of people, Digital Watermarking, Lecture Notes in Computer Science, 2008, 5041: 19\u201333.","journal-title":"Digital Watermarking, Lecture Notes in Computer Science"},{"issue":"4","key":"4023_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2487228.2487236","volume":"32","author":"E Kee","year":"2013","unstructured":"Kee E, O\u2019Brien J, and Farid H, Exposing photo manipulation with inconsistent shadows, ACM Transaction on Graphics, 2013, 32(4): 1\u201311.","journal-title":"ACM Transaction on Graphics"},{"issue":"10","key":"4023_CR11","first-page":"203","volume":"38","author":"J Zhao","year":"2012","unstructured":"Zhao J and Kang W, Detection algorithm of image forgery based on principal components analysis of projection data, Computer Engineering, 2012, 38(10): 203\u2013205.","journal-title":"Computer Engineering"},{"issue":"3","key":"4023_CR12","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1109\/TIFS.2011.2128309","volume":"6","author":"E Kee","year":"2011","unstructured":"Kee E, Johnson M K, and Farid H, Digital image authentication from jpeg headers, IEEE Trans. Inf. Forensics Security, 2011, 6(3): 1066\u20131075.","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"4023_CR13","first-page":"1945","volume-title":"IEEE Press","author":"J Y Fan","year":"2011","unstructured":"Fan J Y, Cao H, and Sattar F, Modeling the EXIF-image correlation for image manipulation detection, IEEE Press, 2011, 1945\u20131948."},{"issue":"1","key":"4023_CR14","first-page":"123","volume":"20","author":"J H L\u00fc","year":"2003","unstructured":"L\u00fc J H, Chen G R, and Zhang S C, A unified chaotic system and its research, Journal of the Graduate School of the Chinese Academy of Science, 2003, 20(1): 123\u2013129.","journal-title":"Journal of the Graduate School of the Chinese Academy of Science"},{"issue":"4","key":"4023_CR15","first-page":"17","volume":"24","author":"J H L\u00fc","year":"2004","unstructured":"L\u00fc J H, Mathematical models and synchronization criterions of complex dynamical networks, Journal of Systems Engineering \u2014 Theory and Practice, 2004, 24(4): 17\u201322.","journal-title":"Journal of Systems Engineering \u2014 Theory and Practice"},{"key":"4023_CR16","first-page":"791","volume-title":"Proceedings of the 29th Chinese Control Conference","author":"P Wang","year":"2010","unstructured":"Wang P, Li D M, Wu X Q, and Lv J H, Estimating the ultimate bound for the generalized quadratic autonomous chaotic systems, Proceedings of the 29th Chinese Control Conference, 2010, 791\u2013795."},{"key":"4023_CR17","volume-title":"Society of Photo Optical","author":"G C Holst","year":"2007","unstructured":"Holst G C and Lomheim T S, CMOS\/CCD Sensors and Camera Systems, Society of Photo Optical, 2007."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-015-4023-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-015-4023-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-015-4023-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:54:09Z","timestamp":1559386449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-015-4023-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,30]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["4023"],"URL":"https:\/\/doi.org\/10.1007\/s11424-015-4023-2","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,30]]}}}