{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:16:47Z","timestamp":1761581807432},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11554-019-00866-x","type":"journal-article","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T09:47:07Z","timestamp":1552556827000},"page":"725-740","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["A multi-purpose image forensic method using densely connected convolutional neural networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Yifang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Yun Q.","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Z. Jane","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,14]]},"reference":[{"key":"866_CR1","unstructured":"Cao, G., Zhao, Y., Ni, R.: Detection of image sharpening based on histogram aberration and ringing artifacts. In: Proc. IEEE Int. conf. on multimedia and expo, New York, USA, pp.\u00a01026\u20131029 (2009)"},{"issue":"10","key":"866_CR2","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/LSP.2011.2164791","volume":"18","author":"G Cao","year":"2011","unstructured":"Cao, G., Zhao, Y., Ni, R., Kot, A.C.: Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Process. Lett. 18(10), 603\u2013606 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"866_CR3","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TIFS.2014.2300937","volume":"9","author":"G Cao","year":"2014","unstructured":"Cao, G., Zhao, Y., Ni, R., Li, X.: Contrast enhancement-based forensics in digital images. IEEE Trans. Inf. Forensics Secur. 9(3), 515\u2013525 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"866_CR4","first-page":"125","volume":"16","author":"N Singh","year":"2018","unstructured":"Singh, N., Gupta, A., Jain, R.C.: Adaptive histogram equalization based image forensics using statistics of DC DCT coefficients. Digital Image Process. Comput. Graph. 16(1), 125\u2013134 (2018)","journal-title":"Digital Image Process. Comput. Graph."},{"key":"866_CR5","first-page":"754110","volume":"7541","author":"M Kirchner","year":"2010","unstructured":"Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. Proc. SPIE Media Forensics Secur. II Part IS&T-SPIE Electron. Imaging Symp. 7541, 754110 (2010)","journal-title":"Proc. SPIE Media Forensics Secur. II Part IS&T-SPIE Electron. Imaging Symp."},{"issue":"4","key":"866_CR6","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"HD Yuan","year":"2011","unstructured":"Yuan, H.D.: Blind forensics of median filtering in digital images. IEEE Trans. Inf. Forensics Secur. 6(4), 1335\u20131345 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"866_CR7","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(2), 758\u2013767 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"866_CR8","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480\u2013491 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"866_CR9","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TIFS.2011.2170836","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi, T., Piva, A.: Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf Forensics Secur 7(2), 842\u2013848 (2012)","journal-title":"IEEE Trans. Inf Forensics Secur"},{"key":"866_CR10","doi-asserted-by":"crossref","unstructured":"Qiu, X., Li, H., Luo, W., Huang, J.: A universal image forensic strategy based on steganalytic model. In: Proc. ACM workshop on information hiding and multimedia security, Salzburg, Austria, pp.\u00a0165\u2013170 (2014)","DOI":"10.1145\/2600918.2600941"},{"key":"866_CR11","doi-asserted-by":"crossref","unstructured":"Fan, W., Wang, K., Cayre, F.: General-purpose image forensics using patch likelihood under image statistical models. In: Proc. IEEE Int. workshop on information forensics and security, Rome, Italy, pp.\u00a01\u20136 (2015)","DOI":"10.1109\/WIFS.2015.7368606"},{"key":"866_CR12","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.neucom.2015.12.089","volume":"189","author":"H Zeng","year":"2016","unstructured":"Zeng, H., Kang, X., Peng, A.: A multi-purpose countermeasure against image anti-forensics using autoregressive model. Neurocomputing 189, 117\u2013122 (2016)","journal-title":"Neurocomputing"},{"issue":"1","key":"866_CR13","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TCSVT.2016.2599849","volume":"28","author":"H Li","year":"2016","unstructured":"Li, H., Luo, W., Qiu, X., Huang, J.: Identification of various image operations using residual-based features. IEEE Trans. Circ Syst Video Technol 28(1), 31\u201345 (2016)","journal-title":"IEEE Trans. Circ Syst Video Technol"},{"key":"866_CR14","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, Lake Tahoe, USA, pp.\u00a01097\u20131105 (2012)"},{"issue":"1","key":"866_CR15","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/TPAMI.2015.2437384","volume":"38","author":"P Swietojanski","year":"2016","unstructured":"Swietojanski, P., Ghoshal, A., Renals, S.: Region-based convolutional networks for accurate object detection and segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 38(1), 142\u2013158 (2016)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"11","key":"866_CR16","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Signal Process. Lett. 22(11), 1849\u20131853 (2015)","journal-title":"IEEE Signal Process. Lett."},{"key":"866_CR17","doi-asserted-by":"crossref","unstructured":"Yu, J., Zhan, Y., Yang, J., Kang, X.: A multi-purpose image counter-antiforensic method using convolutional neural networks. In: Proc. 16th Int. Workshop on Digital Forensics and Watermarking, Beijing, China, pp.\u00a03\u201315 (2016)","DOI":"10.1007\/978-3-319-53465-7_1"},{"issue":"3","key":"866_CR18","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/LSP.2016.2641006","volume":"24","author":"L Bondi","year":"2017","unstructured":"Bondi, L., Guera, D., Bestagini, P., Delp, E.J., Tubaro, S.: First steps toward camera model identification with convolutional neural networks. IEEE Signal Process. Lett. 24(3), 259\u2013263 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"866_CR19","doi-asserted-by":"publisher","first-page":"1556","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13, 1556\u20136013(c) 2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"866_CR20","doi-asserted-by":"crossref","unstructured":"Chen, Y., Lyu, Z., Kang, X., Wang, Z.J.: A rotation-invariant convolutional neural network for image enhancement forensics. In: Proc. IEEE Int. Conf. on acoustics, speech and signal processing, Calgary, Canada, pp.\u00a02111\u20132115 (2018)","DOI":"10.1109\/ICASSP.2018.8462057"},{"key":"866_CR21","doi-asserted-by":"crossref","unstructured":"Chen, Y., Kang, X., Wang, Z.J., Zhang, Q.: Densely connected convolutional neural network for multi-purpose image forensics under anti-forensic attacks. In: Proc. ACM workshop on information hiding and multimedia security, Innsbruck, Austria, pp.\u00a091\u201396 (2018)","DOI":"10.1145\/3206004.3206013"},{"key":"866_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Y., Guan, Q., Zhao, X., Cao, Y.: Image forgery localization based on multi-scale convolutional neural networks. In: Proc. ACM workshop on information hiding and multimedia security, Innsbruck, Austria, pp.\u00a085\u201390 (2018)","DOI":"10.1145\/3206004.3206010"},{"key":"866_CR23","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proc. IEEE conf. on computer vision and pattern recognition, Honolulu, USA, pp.\u00a0770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"866_CR24","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Identity mappings in deep residual networks. In: Proc. European conf. on computer vision, Amsterdam, Netherlands, pp.\u00a0630\u2013645 (2016)","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"866_CR25","doi-asserted-by":"crossref","unstructured":"Huang, G., Sun, Y., Liu, Z., Sedra, D., Weinberger, K.Q.: Deep networks with stochastic depth. In: Proc. European conf. on computer vision, Amsterdam, Netherlands, pp.\u00a0646\u2013661 (2016)","DOI":"10.1007\/978-3-319-46493-0_39"},{"key":"866_CR26","unstructured":"Larsson, G., Maire, M., Shakhnarovich, G.: Fractalnet: ultra-deep neural networks without residuals. arXiv preprint arXiv:1605.07648 (2016)"},{"key":"866_CR27","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proc. IEEE Conf. on computer vision and pattern recognition, Hawaii, USA, pp.\u00a077\u201386 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"866_CR28","unstructured":"Yang, J., Shi, Y., Wong, E.K., Kang, X.: JPEG steganalysis based on DenseNet. arXiv preprint arXiv: 1711.09335 (2017)"},{"issue":"3","key":"866_CR29","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MC Stamm","year":"2011","unstructured":"Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050\u20131065 2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"866_CR30","doi-asserted-by":"crossref","unstructured":"Xu, J., Ling, Y., Zheng, X.: Forensic detection of Gaussian low-pass filtering in digital images. In: Proc. 8th International congress on image and signal processing, Shenyang, China, pp.\u00a0819\u2013823 (2015)","DOI":"10.1109\/CISP.2015.7407990"},{"key":"866_CR31","doi-asserted-by":"crossref","unstructured":"Chuang, W., Swaminathan, A., Wu, M.: Tampering identification using empirical frequency response. In: Proc. IEEE Int. conf. on acoustics, speech and signal processing, Taipei, Taiwan, pp.\u00a01517\u20131520 (2009)","DOI":"10.1109\/ICASSP.2009.4959884"},{"key":"866_CR32","doi-asserted-by":"crossref","unstructured":"Hwang, J., Rhee, K.: Gaussian filtering detection based on features of residuals in image forensics. In: Proc. IEEE RIVF int. conf. on computing & communication technologies, research, innovation, and vision for the future, Hanoi, Vietnam, pp\u00a0153\u2013157 (2016)","DOI":"10.1109\/RIVF.2016.7800286"},{"key":"866_CR33","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Proc. SPIE, media watermarking, security, and forensics, San Jose, CA, USA, pp.\u00a094090J0\u201394090J10 (2015)","DOI":"10.1117\/12.2083479"},{"key":"866_CR34","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: proc. int. conf. on international conference on machine learning, Haifa, Israel, pp.\u00a0807\u2013814 (2010)"},{"key":"866_CR35","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: Proc. int. conf. on international conference on machine learning, Lille, France, pp.\u00a0448\u2013456 (2015)"},{"issue":"3","key":"866_CR36","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00866-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00866-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00866-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T00:30:45Z","timestamp":1584059445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00866-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,14]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["866"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00866-x","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,14]]},"assertion":[{"value":"30 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}