{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T03:24:10Z","timestamp":1768533850412,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51505191"],"award-info":[{"award-number":["51505191"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702226"],"award-info":[{"award-number":["61702226"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005952","name":"Ministry of Human Resources and Social Security","doi-asserted-by":"publisher","award":["18YJC760112"],"award-info":[{"award-number":["18YJC760112"]}],"id":[{"id":"10.13039\/501100005952","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"Chinese Postdoctoral Science Foundation","doi-asserted-by":"crossref","award":["2018M632229"],"award-info":[{"award-number":["2018M632229"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00893-8","type":"journal-article","created":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T11:03:44Z","timestamp":1562065424000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A real-time image forensics scheme based on multi-domain learning"],"prefix":"10.1007","volume":"17","author":[{"given":"Bin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zhenyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"893_CR1","doi-asserted-by":"crossref","unstructured":"Gloe, T., Kirchner, M., Winkler, A., B\u00f6hme, R.: Can we trust digital image forensics? In ACM International Conference on Multimedia, 2007","DOI":"10.1145\/1291233.1291252"},{"key":"893_CR2","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1007\/s11042-016-4289-y","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang, B., Sun, X., Guo, H., Xia, Z., Chen, X.: A copy-move forgery detection method based on CMFD-SIFT. Multimed. Tools Appl. 77, 837\u2013855 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"893_CR3","first-page":"1","volume":"28","author":"J Wang","year":"2015","unstructured":"Wang, J., Lian, S., Shi, Y.Q.: Hybrid multiplicative multi-watermarking in DWT domain. Multidimension. Syst. Signal Process. 28, 1\u201320 (2015)","journal-title":"Multidimension. Syst. Signal Process."},{"key":"893_CR4","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1109\/TMM.2012.2191946","volume":"14","author":"F Xiaoying","year":"2012","unstructured":"Xiaoying, F., Cox, I.J., Doerr, G.: Normalized energy density-based forensic detection of resampled images. IEEE Trans. Multimed. 14, 536\u2013545 (2012)","journal-title":"IEEE Trans. Multimed."},{"key":"893_CR5","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2017","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26, 1403\u20131416 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"893_CR6","unstructured":"Bappy, M.J.H., Roy-Chowdhury, A.K., Bunk, J., Nataraj, L., Manjunath, B.S.: Exploiting spatial structure for localizing manipulated image regions. In: International Conference on Computer Vision, 2017"},{"key":"893_CR7","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 5\u201310"},{"key":"893_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-016-4205-5","volume":"77","author":"L Xiang","year":"2018","unstructured":"Xiang, L., Wu, W., Xu, L., Yang, C.: A linguistic steganography based on word indexing compression and candidate selection. Multimed. Tools Appl. 77, 1\u201321 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"893_CR9","unstructured":"Khuspe, K., Mane, V.: Robust image forgery localization and recognition in copy\u2013move using bag of features and SVM. In: 2015 International Conference on Communication, Information & Computing Technology (ICCICT), 2015, pp. 1\u20135"},{"key":"893_CR10","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53, 758\u2013767 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"893_CR11","unstructured":"Gallagher, A.C.: Detection of linear and cubic interpolation in JPEG compressed images. In: The Canadian Conference on Computer and Robot Vision, 2005. Proceedings, 2005, pp. 65\u201372"},{"key":"893_CR12","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2010.2051254","volume":"5","author":"W Wei","year":"2010","unstructured":"Wei, W., Wang, S., Zhang, X., Tang, Z.: Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans. Inf. Forensics Secur. 5, 507\u2013517 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"893_CR13","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.patrec.2013.09.028","volume":"36","author":"SJ Ryu","year":"2014","unstructured":"Ryu, S.J., Lee, H.K.: Estimation of linear transformation by analyzing the periodicity of interpolation. Pattern Recogn. Lett. 36, 89\u201399 (2014)","journal-title":"Pattern Recogn. Lett."},{"key":"893_CR14","doi-asserted-by":"crossref","unstructured":"Liu, A., Zhao, Z., Zhang, C., Su, Y.: Smooth filtering identification based on convolutional neural networks. Multimed. Tools Appl. 1\u201315 (2016)","DOI":"10.1007\/s11042-016-4251-z"},{"key":"893_CR15","unstructured":"Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. In: Media Forensics and Security II, 2010, p. 754110"},{"key":"893_CR16","unstructured":"Cao, G., Zhao, Y., Ni, R., Yu, L., Tian, H.: Forensic detection of median filtering in digital images. In: IEEE International Conference on Multimedia and Expo, 2010, pp. 89\u201394 (2010)"},{"key":"893_CR17","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"HD Yuan","year":"2011","unstructured":"Yuan, H.D.: Blind forensics of median filtering in digital images. IEEE Trans. Inf. Forensics Secur. 6, 1335\u20131345 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"893_CR18","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10, 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"893_CR19","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1587\/transinf.2015EDP7341","volume":"E99-D","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Yang, C.-N., Chen, B., Sun, X., Liu, Q., Wu, Q.M.J.: Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inf. Syst. E99-D, 1531\u20131540 (2016)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"893_CR20","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X Kang","year":"2013","unstructured":"Kang, X., Stamm, M.C., Peng, A., Liu, K.J.R.: Robust median filtering forensics using an autoregressive model. IEEE Trans. Inf. Forensics Secur. 8, 1456\u20131468 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"893_CR21","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Signal Process. Lett. 22, 1849\u20131853 (2015)","journal-title":"IEEE Signal Process. Lett."},{"key":"893_CR22","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s00607-014-0413-x","volume":"98","author":"L Qi","year":"2016","unstructured":"Qi, L., Dou, W., Chen, J.: Weighted principal component analysis-based service selection method for multimedia services in cloud. Computing 98, 195\u2013214 (2016)","journal-title":"Computing"},{"key":"893_CR23","first-page":"229","volume":"55","author":"Q Cui","year":"2018","unstructured":"Cui, Q., Mcintosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. Comput. Mater. Continua. 55, 229\u2013241 (2018)","journal-title":"Comput. Mater. Continua."},{"key":"893_CR24","doi-asserted-by":"publisher","first-page":"11","DOI":"10.32604\/cmc.2018.02617","volume":"57","author":"S Zhou","year":"2018","unstructured":"Zhou, S., Liang, W., Li, J., Kim, J.U.: Improved VGG Model for Road Traffic Sign Recognition. Comput. Mater. Continua. 57, 11\u201324 (2018)","journal-title":"Comput. Mater. Continua."},{"key":"893_CR25","first-page":"285","volume":"56","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Wang, Q., Li, Y., Wu, X.: Sentiment classification based on piecewise pooling convolutional neural network. Comput. Mater. Continua. 56, 285\u2013297 (2018)","journal-title":"Comput. Mater. Continua."},{"key":"893_CR26","doi-asserted-by":"publisher","first-page":"2647","DOI":"10.1016\/j.mcm.2011.06.026","volume":"57","author":"G Liu","year":"2013","unstructured":"Liu, G., Wang, J., Lian, S., Dai, Y.: Detect image splicing with artificial blurred boundary. Math. Comput. Model. 57, 2647\u20132659 (2013)","journal-title":"Math. Comput. Model."},{"key":"893_CR27","doi-asserted-by":"publisher","first-page":"212-1","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-212","volume":"2018","author":"A Flenner","year":"2018","unstructured":"Flenner, A., Peterson, L., Bunk, J., Mohammed, T.M., Manjunath, B.S.: Resampling forgery detection using deep learning and A-contrario analysis. Electron. Imaging 2018, 212-1\u2013212-7 (2018)","journal-title":"Electron. Imaging"},{"key":"893_CR28","unstructured":"Yang, Y., Hospedales, T.M.: A unified perspective on multi-domain and multi-task learning (2014)"},{"issue":"11","key":"893_CR29","doi-asserted-by":"publisher","first-page":"2616","DOI":"10.1109\/JSAC.2017.2760458","volume":"35","author":"L Qi","year":"2017","unstructured":"Qi, L., Zhang, X., Dou, W., Qiang, N., Qi, L., Zhang, X., et al.: A distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J. Sel. Areas Commun. 35(11), 2616\u20132624 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"893_CR30","doi-asserted-by":"publisher","first-page":"64131","DOI":"10.1109\/ACCESS.2018.2878273","volume":"6","author":"L Xiang","year":"2018","unstructured":"Xiang, L., Yu, J., Yang, C., Zeng, D., Shen, X.: A word-embedding-based steganalysis method for linguistic steganography via synonym-substitution. IEEE Access 6, 64131\u201364141 (2018)","journal-title":"IEEE Access"},{"key":"893_CR31","unstructured":"Ehrlich, M., Shields, T.J., Almaev, T., Amer, M.R.: Facial attributes classification using multi-task representation learning. In: Computer Vision and Pattern Recognition Workshops, 2016"},{"key":"893_CR32","unstructured":"Shields, T.J., Amer, M.R., Ehrlich, M., Tamrakar, A.: Action-affect-gender classification using multi-task representation learning. In: Computer Vision & Pattern Recognition Workshops, 2017"},{"key":"893_CR33","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-319-58347-1_16","volume-title":"Domain Adaptation in Computer Vision Applications","author":"Yongxin Yang","year":"2017","unstructured":"Yang, Y., Hospedales, T.M.: Unifying multi-domain multitask learning: tensor and neural network perspectives (2017)"},{"key":"893_CR34","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/TNNLS.2016.2544779","volume":"28","author":"B Gu","year":"2017","unstructured":"Gu, B., Sun, X., Sheng, V.S.: Structural minimax probability machine. IEEE Trans. Neural Netw. Learn. Syst. 28, 1646\u20131656 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"893_CR35","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.3390\/s18072037","volume":"18","author":"L Qi","year":"2018","unstructured":"Qi, L., Meng, S., Zhang, X., Wang, R., Xu, X., Zhou, Z., et al.: An exception handling approach for privacy-preserving service recommendation failure in a cloud environment. Sensors 18, 2037 (2018)","journal-title":"Sensors"},{"key":"893_CR36","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","volume":"3","author":"B Mahdian","year":"2008","unstructured":"Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 3, 529\u2013538 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"893_CR37","doi-asserted-by":"crossref","unstructured":"V\u00e1zquez-Pad\u00edn, D., Mosquera, C., P\u00e9rez-Gonz\u00e1lez, F.: Two-dimensional statistical test for the presence of almost cyclostationarity on images, vol. 119, pp. 1745\u20131748 (2010)","DOI":"10.1109\/ICIP.2010.5652513"},{"key":"893_CR38","doi-asserted-by":"crossref","unstructured":"Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: ACM Workshop on Multimedia and Security, 2008, pp. 11\u201320 (2008)","DOI":"10.1145\/1411328.1411333"},{"key":"893_CR39","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.1109\/TIP.2017.2682963","volume":"26","author":"C Chen","year":"2017","unstructured":"Chen, C., Ni, J., Shen, Z., Shi, Y.Q.: Blind forensics of successive geometric transformations in digital images using spectral method: theory and applications. IEEE Trans. Image Process. 26, 2811\u20132824 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"893_CR40","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: International Conference on Machine Learning, 2010, pp. 807\u2013814 (2010)"},{"key":"893_CR41","unstructured":"Shang, W., Sohn, K., Almeida, D., Lee, H.: Understanding and improving convolutional neural networks via concatenated rectified linear units, pp. 2217\u20132225 (2016)"},{"key":"893_CR42","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., et al.: Going deeper with convolutions, pp. 1\u20139 (2014)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"893_CR43","unstructured":"Pons, G., Masip, D.: Multi-task, multi-label and multi-domain learning with residual convolutional networks for emotion recognition (2018)"},{"key":"893_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31","volume-title":"A Discriminative Feature Learning Approach for Deep Face Recognition","author":"Y Wen","year":"2016","unstructured":"Wen, Y., Zhang, K., Li, Z., Qiao, Y.: A Discriminative Feature Learning Approach for Deep Face Recognition. Springer, Berlin (2016)"},{"key":"893_CR45","unstructured":"Sakr, C., Patil, A., Zhang, S., Kim, Y., Shanbhag, N.: Minimum precision requirements for the SVM-SGD learning algorithm. In: IEEE International Conference on Acoustics, 2017"},{"key":"893_CR46","unstructured":"Bas, P., Filler, T., Pevn, Tom: \u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS. In: International Conference on Information Hiding, 2011, pp. 59\u201370 (2011)"},{"key":"893_CR47","unstructured":"Xu, J., Ling, Y., Zheng, X.: Forensic detection of Gaussian low-pass filtering in digital images. In: 2015 8th International Congress on Image and Signal Processing (CISP), 2015, pp. 819\u2013823 (2015)"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00893-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00893-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00893-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T18:44:18Z","timestamp":1663872258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00893-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["893"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00893-8","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"18 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}