{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:12:59Z","timestamp":1760346779015},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T00:00:00Z","timestamp":1551484800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11554-019-00860-3","type":"journal-article","created":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T09:02:05Z","timestamp":1551517325000},"page":"741-750","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Real-time detecting one specific tampering operation in multiple operator chains"],"prefix":"10.1007","volume":"16","author":[{"given":"Shangde","family":"Gao","sequence":"first","affiliation":[]},{"given":"Xin","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Xuchong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,2]]},"reference":[{"key":"860_CR1","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"MC Stamm","year":"2013","unstructured":"Stamm, M.C., Wu, M., Liu, K.J.R.: Information forensics: an overview of the first decade. IEEE Access 1, 167\u2013200 (2013)","journal-title":"IEEE Access"},{"key":"860_CR2","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao, X., Qin, Z., Ding, L.: Data embedding in digital images using critical functions. Signal Process. Image Commun. 58, 146\u2013156 (2017)","journal-title":"Signal Process. Image Commun."},{"issue":"3","key":"860_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","volume":"25","author":"C Qin","year":"2018","unstructured":"Qin, C., Ji, P., Chang, C., Dong, J.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. 25(3), 36\u201348 (2018)","journal-title":"IEEE Multimed."},{"key":"860_CR4","doi-asserted-by":"publisher","unstructured":"Liao, X., Yu, Y., Li, B., Li, Z.: A new payload partition strategy in color image steganpgraphy. IEEE Trans. Circuits Syst. Video Technol. \n                    https:\/\/doi.org\/10.1109\/TCSVT.2019.2896270\n                    \n                   (2019)","DOI":"10.1109\/TCSVT.2019.2896270"},{"key":"860_CR5","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.ins.2017.09.060","volume":"423","author":"C Qin","year":"2018","unstructured":"Qin, C., Chen, X., Luo, X., Zhang, X.: Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423, 284\u2013302 (2018)","journal-title":"Inf. Sci."},{"issue":"2","key":"860_CR6","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2008","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(2), 758\u2013767 (2008)","journal-title":"IEEE Trans. Signal Process."},{"issue":"4","key":"860_CR7","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TIFS.2008.2008214","volume":"3","author":"M Kirchner","year":"2008","unstructured":"Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582\u2013592 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"860_CR8","doi-asserted-by":"publisher","first-page":"128","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-336","volume":"10","author":"M Boroumand","year":"2017","unstructured":"Boroumand, M., Fridrich, J.: Scalable processing history detector for JPEG images. Electron. Imaging 10, 128\u2013137 (2017)","journal-title":"Electron. Imaging"},{"issue":"3","key":"860_CR9","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1109\/TMM.2012.2191946","volume":"14","author":"X Feng","year":"2012","unstructured":"Feng, X., Cox, I., Doerr, G.: Normalized energy density-based forensic detection of resampled images. IEEE Trans. Multimed. 14(3), 536\u2013545 (2012)","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"860_CR10","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","volume":"5","author":"MC Stamm","year":"2010","unstructured":"Stamm, M.C., Liu, K.J.R.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Transactions on Information Forensics and Security 5(3), 492\u2013506 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"860_CR11","doi-asserted-by":"publisher","first-page":"509","DOI":"10.15598\/aeee.v15i3.2189","volume":"15","author":"N Singh","year":"2017","unstructured":"Singh, N., Gupta, A., Jain, R.C.: Global contrast enhancement based image forensics using statistical features. Adv. Electric. Electron. Eng. 15(3), 509\u2013516 (2017)","journal-title":"Adv. Electric. Electron. Eng."},{"issue":"12","key":"860_CR12","doi-asserted-by":"publisher","first-page":"4699","DOI":"10.1109\/TIP.2013.2277814","volume":"22","author":"C Chen","year":"2013","unstructured":"Chen, C., Ni, J., Huang, J.: Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans. Image Process. 22(12), 4699\u20134710 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"9","key":"860_CR13","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X Kang","year":"2013","unstructured":"Kang, X., Stamm, M.C., Peng, A., Liu, K.J.R.: Robust median filtering forensics using an autoregressive model. IEEE Trans. Inf. Forensics Secur. 8(9), 1456\u20131468 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"860_CR14","doi-asserted-by":"crossref","unstructured":"Su, B., Lu, S., Tan, C.L.: Blurred image region detection and classification. In: ACM International Conference on Multimedia, pp. 1397\u20131400 (2011)","DOI":"10.1145\/2072298.2072024"},{"issue":"3","key":"860_CR15","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"860_CR16","doi-asserted-by":"crossref","unstructured":"Cai, K., Lu, X., Song, J., Wang, X.: Blind image tampering identification based on histogram features. In: International Conference on Multimedia Information Networking and Security (MINES), pp. 300\u2013303 (2011)","DOI":"10.1109\/MINES.2011.116"},{"issue":"1","key":"860_CR17","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TCSVT.2016.2599849","volume":"28","author":"H Li","year":"2018","unstructured":"Li, H., Luo, W., Qiu, X.: Identification of various image operations using residual-based features. IEEE Trans. Circuits Syst. Video Technol. 28(1), 31\u201345 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"860_CR18","doi-asserted-by":"crossref","unstructured":"Qiu, X., Li, H., Luo, W.: A universal image forensic strategy based on steganalytic model. In: ACM workshop on Information hiding and multimedia security, pp. 165\u2013170 (2014)","DOI":"10.1145\/2600918.2600941"},{"issue":"3","key":"860_CR19","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TIFS.2014.2300937","volume":"9","author":"G Cao","year":"2014","unstructured":"Cao, G., Zhao, Y., Ni, R.: Contrast enhancement-based forensics in digital images. IEEE Trans. Inf. Forensics Secur. 9(3), 515\u2013525 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"860_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.image.2017.04.008","volume":"57","author":"Z Chen","year":"2017","unstructured":"Chen, Z., Zhao, Y., Ni, R.: Detection of operation chain: JPEG-resampling-JPEG. Signal Process. Image Commun. 57, 8\u201320 (2017)","journal-title":"Signal Process. Image Commun."},{"key":"860_CR21","doi-asserted-by":"crossref","unstructured":"Comesa\n                    \n                      \n                    \n                    $$\\tilde{n}$$\n                    \n                      \n                        \n                          n\n                          ~\n                        \n                      \n                    \n                  a, P.: Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains. In: IEEE International Workshop on Information Forensics and Security, pp. 211\u2013216 (2012)","DOI":"10.1109\/WIFS.2012.6412651"},{"key":"860_CR22","doi-asserted-by":"crossref","unstructured":"Stamm, M. C., Chu, X., Liu, K. J. R.: Forensically determining the order of signal processing operations. In: IEEE International Workshop on Information Forensics and Security, pp. 162\u2013167 (2013)","DOI":"10.1109\/WIFS.2013.6707812"},{"key":"860_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhao, Y., Ni, R.: Forensics of image blurring and sharpening history based on NSCT domain. In: Signal and Information Processing Association Annual Summit and Conference, pp. 1\u20134 (2014)","DOI":"10.1109\/APSIPA.2014.7041728"},{"key":"860_CR24","doi-asserted-by":"crossref","unstructured":"Chu, X., Chen, Y., Liu, K. R.: An information theoretic framework for order of operations forensics. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2049\u20132053 (2016)","DOI":"10.1109\/ICASSP.2016.7472037"},{"key":"860_CR25","doi-asserted-by":"crossref","unstructured":"Gao, S., Liao, X., Guo, S.: Forensic detection for image operation order: resizing and contrast Enhancement. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 570\u2013580 (2017)","DOI":"10.1007\/978-3-319-72395-2_52"},{"key":"860_CR26","doi-asserted-by":"crossref","unstructured":"Li, J., Liao, X., Hu, R., Liu, X.: Detectability of the image operation order: upsampling and mean filtering. In: IEEE Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, pp. 1544\u20131549 (2018)","DOI":"10.23919\/APSIPA.2018.8659597"},{"key":"860_CR27","doi-asserted-by":"crossref","unstructured":"Patrick, B., Filler, T., Pevn\n                    \n                      \n                    \n                    $$\\acute{y}$$\n                    \n                      \n                        \n                          y\n                          \u00b4\n                        \n                      \n                    \n                  , T.: Break our steganographic system: the ins and outs of organizing BOSS. In: International Workshop on Information Hiding, pp. 59\u201370 (2011)","DOI":"10.1007\/978-3-642-24178-9_5"},{"issue":"1","key":"860_CR28","first-page":"472","volume":"5307","author":"G Schaefer","year":"2004","unstructured":"Schaefer, G., Stich, M.: UCID: an uncompressed color image database. Storage Retr. Methods Appl. Multimed. 5307(1), 472\u2013481 (2004)","journal-title":"Storage Retr. Methods Appl. Multimed."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00860-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00860-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00860-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:09:48Z","timestamp":1583021388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00860-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,2]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["860"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00860-3","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,2]]},"assertion":[{"value":"1 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}