{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:00:51Z","timestamp":1761663651743},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T00:00:00Z","timestamp":1502668800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11432-016-0426-1","type":"journal-article","created":{"date-parts":[[2017,8,17]],"date-time":"2017-08-17T09:33:28Z","timestamp":1502962408000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Countering JPEG anti-forensics based on noise level estimation"],"prefix":"10.1007","volume":"61","author":[{"given":"Hui","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Jingjing","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Lyu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,14]]},"reference":[{"key":"426_CR1","first-page":"398","volume-title":"Proceedings of the 10th International Conference on Digital-Forensics and Watermarking, Atlantic","author":"C W Kwok","year":"2011","unstructured":"Kwok C W, Au O C, Chui S H. Alternative anti-forensics method for contrast enhancement. In: Proceedings of the 10th International Conference on Digital-Forensics and Watermarking, Atlantic, 2011. 398\u2013410"},{"key":"426_CR2","first-page":"3053","volume-title":"Proceedings of International Conference on Acoustics, Speech, and Signal Processing, Vancouver","author":"S Milani","year":"2013","unstructured":"Milani S, Tagliasacchi M, Tubaro S. Antiforensics attacks to Benford\u2019s law for the detection of double compressed images. In: Proceedings of International Conference on Acoustics, Speech, and Signal Processing, Vancouver, 2013. 3053\u20133057"},{"key":"426_CR3","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.jss.2013.12.043","volume":"91","author":"Z X Qian","year":"2014","unstructured":"Qian Z X, Zhang X P. Improved anti-forensics of JPEG compression. J Syst Softw, 2014, 91: 100\u2013108","journal-title":"J Syst Softw"},{"key":"426_CR4","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/2482513.2482536","volume-title":"Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier","author":"W Fan","year":"2013","unstructured":"Fan W, Wang K, Cayre F, et al. JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics. In: Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, 2013. 117\u2013122"},{"key":"426_CR5","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/TIFS.2012.2237397","volume":"8","author":"M Barni","year":"2013","unstructured":"Barni M, Tondi B. The source identification game: an information-theoretic perspective. IEEE Trans Inf Forens Secur, 2013, 8: 450\u2013463","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"426_CR6","first-page":"1749","volume-title":"Proceedings of International Conference on Acoustics, Speech, and Signal Processing, Kyoto","author":"M C Stamm","year":"2012","unstructured":"Stamm M C, Lin W S, Liu K J R. Forensics vs. anti-forensics: a decision and game theoretic framework. In: Proceedings of International Conference on Acoustics, Speech, and Signal Processing, Kyoto, 2012. 1749\u20131752"},{"key":"426_CR7","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"T Pevny","year":"2008","unstructured":"Pevny T, Fridrich J. Detection of double-compression in JPEG images for applications in steganography. IEEE Trans Inf Forens Secur, 2008, 3: 247\u2013258","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"426_CR8","first-page":"1","volume-title":"Proceedings of Digital Forensic Research Workshop, Cleveland","author":"J Lukas","year":"2003","unstructured":"Lukas J, Fridrich J. Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of Digital Forensic Research Workshop, Cleveland, 2003. 1\u201317"},{"key":"426_CR9","first-page":"65051L","volume-title":"Proceedings of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents, San Jose","author":"D D Fu","year":"2007","unstructured":"Fu D D, Shi Y Q, Su W. A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, 2007. 65051L"},{"key":"426_CR10","first-page":"423","volume-title":"Proceedings of 9th European Conference on Computer Vision, Graz","author":"J F He","year":"2006","unstructured":"He J F, Lin Z C, Wang L F, et al. Detecting doctored JPEG images via DCT coefficient analysis. In: Proceedings of 9th European Conference on Computer Vision, Graz, 2006. 423\u2013435"},{"key":"426_CR11","first-page":"2444","volume-title":"Proceedings of International Conference on Acoustics, Speech, and Signal Processing, Prague","author":"T Bianchi","year":"2011","unstructured":"Bianchi T, de Rosa A, Piva A. Improved DCT coefficient analysis for forgery localization in JPEG images. In: Proceedings of International Conference on Acoustics, Speech, and Signal Processing, Prague, 2011. 2444\u20132447"},{"key":"426_CR12","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid H. Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forens Secur, 2009, 4: 154\u2013160","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"426_CR13","volume-title":"Digital Image Ballistics from JPEG Quantization","author":"H Farid","year":"2008","unstructured":"Farid H. Digital Image Ballistics from JPEG Quantization. TR2006\u2013583. 2008"},{"key":"426_CR14","first-page":"1694","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Dallas","author":"M C Stamm","year":"2010","unstructured":"Stamm M C, Tjoa S K, Lin W S, et al. Anti-forensics of JPEG compression. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Dallas, 2010. 1694\u20131697"},{"key":"426_CR15","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"M C Stamm","year":"2011","unstructured":"Stamm M C, Liu K J R. Anti-forensics of digital image compression. IEEE Trans Inf Forens Secur, 2011, 6: 1050\u20131065","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"426_CR16","first-page":"1","volume-title":"Proceedings of Asian-Pacific Signal and Information Processing Association Annual Submit Conference, Taiwan","author":"Y W Jiang","year":"2013","unstructured":"Jiang Y W, Zeng H, Kang X G, et al. The game of countering JPEG anti-forensics based on the noise level estimation. In: Proceedings of Asian-Pacific Signal and Information Processing Association Annual Submit Conference, Taiwan, 2013. 1\u20139"},{"key":"426_CR17","first-page":"472","volume-title":"Proceedings of SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia, San Jose","author":"G Schaefer","year":"2004","unstructured":"Schaefer G, Stich M. UCID: an uncompressed color image database. In: Proceedings of SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia, San Jose, 2004. 472\u2013480"},{"key":"426_CR18","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Proceedings of International Conference on Information Hiding, Prague","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevny T. Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of International Conference on Information Hiding, Prague, 2011. 59\u201370"},{"key":"426_CR19","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/83.869177","volume":"9","author":"E Y Lam","year":"2000","unstructured":"Lam E Y, Goodman J W. A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans Image Process, 2000, 9: 1661\u20131666","journal-title":"IEEE Trans Image Process"},{"key":"426_CR20","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TIP.2002.807361","volume":"12","author":"Z G Fan","year":"2003","unstructured":"Fan Z G, de Queiroz R L. Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process, 2003, 12: 230\u2013235","journal-title":"IEEE Trans Image Process"},{"key":"426_CR21","first-page":"1","volume-title":"Proceedings of SPIE, Electronic Imaging, Media Forensics and Security II, San Jose","author":"M Kirchner","year":"2010","unstructured":"Kirchner M, Fridrich J. On detection of median filtering in digital images. In: Proceedings of SPIE, Electronic Imaging, Media Forensics and Security II, San Jose, 2010. 1\u201312"},{"key":"426_CR22","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/978-3-642-24178-9_20","volume-title":"Proceedings of International Conference on Information Hiding, Prague","author":"S Y Lai","year":"2011","unstructured":"Lai S Y, Bohme R. Countering counter-forensics: the case of JPEG compression. In: Proceedings of International Conference on Information Hiding, Prague, 2011. 285\u2013298"},{"key":"426_CR23","first-page":"1949","volume-title":"Proceedings of IEEE International Conference on Image Processing, Brussels","author":"G Valenzise","year":"2011","unstructured":"Valenzise G, Nobile V, Tagliasacchi M, et al. Countering JPEG anti-forensics. In: Proceedings of IEEE International Conference on Image Processing, Brussels, 2011. 1949\u20131952"},{"key":"426_CR24","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TIFS.2012.2234117","volume":"8","author":"G Valenzise","year":"2013","unstructured":"Valenzise G, Tagliasacchi M, Tubaro S. Revealing the traces of JPEG compression anti-forensics. IEEE Trans Inf Forens Secur, 2013, 8: 335\u2013349","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"426_CR25","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/0167-2789(92)90242-F","volume":"60","author":"L I Rudin","year":"1992","unstructured":"Rudin L I, Osher S, Fatemi E. Nonlinear total variation based noise removal algorithms. Physica D: Nonl Phenom, 1992, 60: 259\u2013268","journal-title":"Physica D: Nonl Phenom"},{"key":"426_CR26","first-page":"241","volume-title":"Proceedings of IEEE International Conference on Image Processing, Orlando","author":"H D Li","year":"2012","unstructured":"Li H D, Luo W Q, Huang J W. Countering anti-JPEG compression forensics. In: Proceedings of IEEE International Conference on Image Processing, Orlando, 2012. 241\u2013244"},{"key":"426_CR27","first-page":"665","volume-title":"Proceedings of IEEE International Conference on Image Processing, Orlando","author":"X H Liu","year":"2012","unstructured":"Liu X H, Tanaka M, Okutomi M. Noise level estimation using weak textured patches of a single noisy image. In: Proceedings of IEEE International Conference on Image Processing, Orlando, 2012. 665\u2013668"},{"key":"426_CR28","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/TCE.2005.1405723","volume":"51","author":"D H Shin","year":"2005","unstructured":"Shin D H, Park R H, Yang S, et al. Block-based noise estimation using adaptive Gaussian filtering. IEEE Trans Consum Electr, 2005, 51: 218\u2013226","journal-title":"IEEE Trans Consum Electr"},{"key":"426_CR29","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1109\/TIP.2012.2221728","volume":"22","author":"S Pyatykh","year":"2013","unstructured":"Pyatykh S, Hesser J, Zheng L. Image noise level estimation by principal component analysis. IEEE Trans Image Process, 2013, 22: 687\u2013699","journal-title":"IEEE Trans Image Process"},{"key":"426_CR30","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1109\/TIP.2012.2219544","volume":"22","author":"W Liu","year":"2013","unstructured":"Liu W, Lin W S. Additive white Gaussian noise level estimation in SVD domain for images. IEEE Trans Image Process, 2013, 22: 872\u2013883","journal-title":"IEEE Trans Image Process"},{"key":"426_CR31","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s11263-013-0688-y","volume":"110","author":"S W Lyu","year":"2014","unstructured":"Lyu S W, Pan X Y, Zhang X. Exposing region splicing forgeries with blind local noise estimation. Int J Comput Vis, 2014, 110: 202\u2013221","journal-title":"Int J Comput Vis"},{"key":"426_CR32","volume-title":"A Course in Game Theory","author":"M J Osborne","year":"1994","unstructured":"Osborne M J, Rubinstein A. A Course in Game Theory. Cambridge: MIT Press. 1994"},{"key":"426_CR33","unstructured":"Hespanha J P. An Introductory Course in Noncooperative Game Theory. http:\/\/www.ece.ucsb. edu\/~hespanha\/"},{"key":"426_CR34","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-1-84800-155-8_7","volume-title":"Recent Advances in Learning and Control","author":"M C Grant","year":"2008","unstructured":"Grant M C, Boyd S P. Graph Implementations for Non-smooth Convex Programs. Recent Advances in Learning and Control. Heidelberg: Springer-Verlag, 2008. 95\u2013110"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-0426-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-016-0426-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-0426-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T09:48:18Z","timestamp":1719395298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-016-0426-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,14]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["426"],"URL":"https:\/\/doi.org\/10.1007\/s11432-016-0426-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"type":"print","value":"1674-733X"},{"type":"electronic","value":"1869-1919"}],"subject":[],"published":{"date-parts":[[2017,8,14]]},"article-number":"032103"}}