{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T04:28:11Z","timestamp":1770956891405,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61702235"],"award-info":[{"award-number":["61702235"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772281"],"award-info":[{"award-number":["61772281"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["BK20141006"],"award-info":[{"award-number":["BK20141006"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00929-z","type":"journal-article","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T23:02:36Z","timestamp":1574809356000},"page":"7-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain"],"prefix":"10.1007","volume":"17","author":[{"given":"Jinwei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Sunil Kr.","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,26]]},"reference":[{"issue":"4","key":"929_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1978802.1978805","volume":"43","author":"Anderson Rocha","year":"2011","unstructured":"Rocha, A., Scheirer, W., Boult, T., Goldenstein, S.: Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Comput. Surv. 1\u201342 (2011)","journal-title":"ACM Computing Surveys"},{"key":"929_CR2","doi-asserted-by":"crossref","unstructured":"Piva, A.: An overview on image forensics. ISRN Signal Processing 2013. 22 (2013)","DOI":"10.1155\/2013\/496701"},{"key":"929_CR3","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.ins.2018.11.030","volume":"480","author":"L Qi","year":"2019","unstructured":"Qi, L., Wang, R., Li, S., He, Q., Xu, X., Hu, C.: Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480, 354\u2013364 (2019)","journal-title":"Inf. Sci."},{"key":"929_CR4","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.future.2018.02.050","volume":"88","author":"L Qi","year":"2018","unstructured":"Qi, L., Zhang, X., Dou, W., Hu, C., Yang, C., Chen, J.: A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Future Gen. Comput. Syst. 88, 636\u2013643 (2018)","journal-title":"Future Gen. Comput. Syst."},{"key":"929_CR5","doi-asserted-by":"publisher","unstructured":"Zhou, Z., Jonathan Wu, Q.M., Sun, X.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data. (2019). https:\/\/doi.org\/10.1109\/TBDATA.2019.2919570","DOI":"10.1109\/TBDATA.2019.2919570"},{"issue":"13","key":"929_CR6","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Mu, Y., Jonathan Wu, Q.M.: Coverless image steganography using partial-duplicate image rretrieval. Soft Comput. 23(13), 4927\u20134938 (2019)","journal-title":"Soft Comput."},{"key":"929_CR7","doi-asserted-by":"publisher","first-page":"95364","DOI":"10.1109\/ACCESS.2019.2928857","volume":"7","author":"X Jiang","year":"2019","unstructured":"Jiang, X., He, P., Sun, T., Wang, R.: Detection of double compressed HEVC videos using GOP-Based PU type statistics. IEEE Access 7, 95364\u201395375 (2019)","journal-title":"IEEE Access"},{"key":"929_CR8","doi-asserted-by":"publisher","unstructured":"He, P., Li, H., Wang, H.: Detection of fake images via the ensemble of deep representations from multi color spaces. 2019 IEEE International Conference on Image Processing (ICIP). https:\/\/doi.org\/10.1109\/ICIP.2019.8803740","DOI":"10.1109\/ICIP.2019.8803740"},{"issue":"22","key":"929_CR9","doi-asserted-by":"publisher","first-page":"23721","DOI":"10.1007\/s11042-016-4153-0","volume":"76","author":"J Wang","year":"2017","unstructured":"Wang, J., Li, T., Shi, Y.Q., Lian, S., Ye, J.: Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tools Appl. 76(22), 23721\u201323737 (2017)","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"929_CR10","first-page":"99","volume":"11","author":"Y Ma","year":"2018","unstructured":"Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set positive region reduction. IEEE Trans. Circuits Syst. Video Technol. 11(2), 99\u2013102 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"929_CR11","first-page":"1","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant per-formances for a class of roubust image steganography. IEEE Trans. Signal Process. 146(3), 1\u2013132 (2018)","journal-title":"IEEE Trans. Signal Process."},{"key":"929_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"T Pevny","year":"2008","unstructured":"Pevny, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Secur. (TIFS). 3, 247\u2013258 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)."},{"key":"929_CR13","doi-asserted-by":"publisher","unstructured":"Wang, J., Wang, H., Li, J., Luo, X., Shi, Y. Q., Jha, S. K.: Detecting double jpeg compressed color images with the same quantization matrix in spherical coordinates. IEEE Trans. Circuits Syst. Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2019.2922309","DOI":"10.1109\/TCSVT.2019.2922309"},{"issue":"4","key":"929_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"34","author":"GK Wallace","year":"1991","unstructured":"Wallace, G.K.: The JPEG still picture compression standard. Commun. ACM. 34(4), 30\u201344 (1991)","journal-title":"Commun. ACM."},{"key":"929_CR15","unstructured":"Li, B., Shi, Y., Huang, J.: Detecting doubly compressed JPEG images by using mode based first digit features. In: IEEE workshop on multimedia signal processing (MMSP) (2008)"},{"issue":"3","key":"929_CR16","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1109\/TIP.2016.2518870","volume":"25","author":"P Korus","year":"2016","unstructured":"Korus, P., Huang, J.: Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans. Image Process. 25(3), 1312\u20131326 (2016)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"929_CR17","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10851-015-0602-z","volume":"54","author":"A Taimori","year":"2016","unstructured":"Taimori, A., Razzazi, F., Behrad, A., Ahmadi, A., Babaie-Zadeh, M.: Quantization-unaware double jpeg compression detection. J. Math. Imaging Vis. 54(3), 269\u2013286 (2016)","journal-title":"J. Math. Imaging Vis."},{"key":"929_CR18","doi-asserted-by":"crossref","unstructured":"Pasquini, C., Boato, G., Perez-Gonzalez, F.: Multiple jpeg compression detection by means of benford-fourier coefficients. In: Information Forensics and Security (WIFS), 2014 IEEE International Workshop on IEEE, pp. 113\u2013118 (2014)","DOI":"10.1109\/WIFS.2014.7084313"},{"key":"929_CR19","doi-asserted-by":"crossref","unstructured":"Pasquini, C., Sch\u00f6ttle, P., B\u00f6hme, R., Boato, G., P\u00e8rez-Gonz\u00e0lez, F.: Forensics of high quality and nearly identical jpeg image recompression. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, ACM, 11\u201321 (2016)","DOI":"10.1145\/2909827.2930787"},{"issue":"11","key":"929_CR20","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1109\/TIFS.2014.2359368","volume":"9","author":"J Yang","year":"2014","unstructured":"Yang, J., Xie, J., Zhu, G., Kwong, S., Shi, Y.Q.: An effective method for detecting double jpeg compression with the same quantization matrix. IEEE Trans. Inf. Forensics Secur. 9(11), 1933\u20131942 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"929_CR21","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin, Z., He, J., Tang, X., Tang, C.-K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 42(11), 2492\u20132501 (2009)","journal-title":"Pattern Recognit."},{"key":"929_CR22","doi-asserted-by":"crossref","unstructured":"Bianchi, T., De Rosa, A., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2011)","DOI":"10.1109\/ICASSP.2011.5946978"},{"issue":"2","key":"929_CR23","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TIFS.2011.2106121","volume":"6","author":"Y-L Chen","year":"2011","unstructured":"Chen, Y.-L., Hsu, C.-T.: Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forensics Secur. 6(2), 396\u2013406 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"929_CR24","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TIFS.2011.2170836","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi, T., Piva, A.: Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842\u2013848 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"929_CR25","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi, T., Piva, A.: Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans. Inf. Forensics Secur. 7(3), 1003\u20131017 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8389","key":"929_CR26","first-page":"167","volume":"2013","author":"J Yang","year":"2014","unstructured":"Yang, J., Zhu, G., Wang, J., Shi, Y.Q.: Detecting non-aligned double JPEG compression based on refined intensity difference and calibration. IWDW 2013(8389), 167\u2013179 (2014)","journal-title":"IWDW"},{"key":"929_CR27","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"Barni, M., Bondi, L., Bonettini, N., Bestagini, P., Costanzo, A., Maggini, M., Tondi, B., Tubaro, S.: Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49, 153\u2013163 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"929_CR28","doi-asserted-by":"crossref","unstructured":"Leon-Garcia, A.: Probability and Random Processes for Electrical Engineering, 2nd Edition, Addison-Wesley Publishing Company. 33(3), 372-373 (1994)","DOI":"10.1080\/00401706.1991.10484859"},{"issue":"2","key":"929_CR29","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/CISP.2008.61","volume":"5","author":"Feng Wei","year":"2008","unstructured":"Wei, Feng, Bo, Hu: Quaternion discrete cosine transform and its application in color template matching. IEEE Congr. Image Signal Process. 5(2), 252\u2013256 (2008)","journal-title":"IEEE Congr. Image Signal Process."},{"key":"929_CR30","first-page":"472","volume":"5307","author":"G Schaefer","year":"2004","unstructured":"Schaefer, G., Stich, M.: UCID\u2014an uncompressed colour image database. Proc. SPIE. Speech, Signal Process. 5307, 472\u2013480 (2004)","journal-title":"Speech, Signal Process."},{"key":"929_CR31","doi-asserted-by":"crossref","unstructured":"Chang, C.-C., Lin, C.-J.: Libsvm: a library for support vector machines. ACM Trans. Intelligent Systems and Technology (TIST) (2011)","DOI":"10.1145\/1961189.1961199"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00929-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00929-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00929-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:43:42Z","timestamp":1606265022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00929-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,26]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["929"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00929-z","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,26]]},"assertion":[{"value":"13 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}