{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:42:24Z","timestamp":1740181344249,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032001"],"award-info":[{"award-number":["62032001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2020AAA0104602"],"award-info":[{"award-number":["2020AAA0104602"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. HPC"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s42514-023-00177-5","type":"journal-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T08:03:01Z","timestamp":1705910581000},"page":"488-502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A security JPEG image system accelerated by NEON technology based on FT-2000\/4"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1715-3500","authenticated-orcid":false,"given":"Yu","family":"Hu","sequence":"first","affiliation":[]},{"given":"Ziteng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Junbo","family":"Tie","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,22]]},"reference":[{"key":"177_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15806-y","author":"L Agilandeeswari","year":"2023","unstructured":"Agilandeeswari, L., Aberna, P.: Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimed. Tools Appl. (2023). https:\/\/doi.org\/10.1007\/s11042-023-15806-y","journal-title":"Multimed. Tools Appl."},{"issue":"9","key":"177_CR2","first-page":"1574","volume":"44","author":"W Deng","year":"2022","unstructured":"Deng, W., Liu, S., Liu, F., Huang, R.: An image encryption algorithm based on compressed sensing and DNA coding. Comput. Eng. Sci. 44(9), 1574\u20131582 (2022)","journal-title":"Comput. Eng. Sci."},{"issue":"10","key":"177_CR3","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"A Edoardo","year":"2015","unstructured":"Edoardo, A., Alessandro, B., Giuseppe, M.: Copy\u2013move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10(10), 2084\u20132094 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2445742","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"177_CR4","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid, H.: Exposing digital forgeries from JPEG ghosts. IEEE Trans. Inf. Forensics Secur. 4(1), 154\u2013160 (2009). https:\/\/doi.org\/10.1109\/TIFS.2008.2012215","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"177_CR5","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)"},{"key":"177_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.jpdc.2022.01.014","volume":"163","author":"M Johnson","year":"2022","unstructured":"Johnson, M., Playne, D.: A fast and concise parallel implementation of the 8x8 2D forward and inverse DCTs using halide. J. Parallel Distrib. Comput. 163, 20\u201329 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"key":"177_CR8","unstructured":"Kingma, D., Ba, J.: Adam: a method for stochastic optimization. In: Proceedings of the 3rd International Conference for Learning Representations (ICLR) (2015)"},{"issue":"3","key":"177_CR6","first-page":"155","volume":"48","author":"F Li","year":"2021","unstructured":"Li, F., He, S., Li, H.: FPGA optimization implementation method for SM4 algorithm. J. Xidian Univ. 48(3), 155\u2013162 (2021)","journal-title":"J. Xidian Univ."},{"issue":"1","key":"177_CR9","first-page":"123","volume":"44","author":"Q Lu","year":"2023","unstructured":"Lu, Q.: National secret algorithms application research. Comput. Eng. Softw. 44(1), 123\u2013125 (2023)","journal-title":"Comput. Eng. Softw."},{"key":"177_CR10","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"T Pevny","year":"2008","unstructured":"Pevny, T., Fridrich, J.: Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3, 247\u2013258 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"177_CR11","unstructured":"Phytium: Phytium CPU. https:\/\/www.phytium.com.cn\/article\/709 (2014). Accessed 30 Oct 2014"},{"key":"177_CR12","doi-asserted-by":"crossref","unstructured":"Popescu, A., Farid, H.: Statistical tools for digital forensics. In: Proceedings of the International Workshop on Information Hiding (2004)","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"177_CR13","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum, R., Ren, Y., Jay Kuo, C.: Image splicing localization using a multi-task fully convolutional network (MFCN). J. Vis. Commun. Image Represent. 51, 201\u2013209 (2018)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"177_CR14","first-page":"4343","volume":"8","author":"T Saptariani","year":"2018","unstructured":"Saptariani, T., Madenda, S., Ernastuti, S.W.: Accelerating compression time of the standard jpeg by employing the quantized YCbCr color space algorithm. Int. J. Electr. Comput. Eng. 8, 4343\u20134351 (2018)","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"177_CR15","first-page":"30","volume":"34","author":"GK Wallace","year":"1991","unstructured":"Wallace, G.K.: The jpeg still picture compression standard. Commun. Assoc. Comput. Mach. 34, 30\u201344 (1991)","journal-title":"Commun. Assoc. Comput. Mach."},{"key":"177_CR16","unstructured":"Wang, Q.: Research on techniques of JPEG image forgery detection. PhD thesis, University of Science and Technology of China (2017)"},{"key":"177_CR17","doi-asserted-by":"crossref","unstructured":"Wei\u00dfenberger, A., Schmidt, B.: Accelerating jpeg decompression on gpus. In: 2021 IEEE 28th International Conference on High Performance Computing, Data, and Analytics (HiPC) (2021)","DOI":"10.1109\/HiPC53243.2021.00026"},{"key":"177_CR18","unstructured":"Wright Laboratory US Air Force Materiel Command: The air force moving and stationary target recognition database. https:\/\/www.sdms.afrl.af.mil\/index.php?collection=mstar. Accessed 2014 (2014)"},{"key":"177_CR19","unstructured":"Wu, J.: Research and implementation of low illumination image enhancement model compress algorithm for embedded devices. Master\u2019s thesis, Beijing University of Posts and Telecommunications (2021)"},{"key":"177_CR20","unstructured":"Yang, Q.: Research on image data compression based on embedded platform. Master\u2019s thesis, Huazhong University of Science and Technology (2021)"},{"key":"177_CR22","unstructured":"Zhang, C.: Survey on image contrast enhancement detection. PhD thesis, School of Computer Science and Technology, Chinese Academy of Sciences (2020)"},{"key":"177_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Ou, H., He, J.: JPEG compression coding optimization based on NEON instruction. In: 5th International Conference on Computer Information Science and Application Technology (CISAT 2022) (2022a)","DOI":"10.1117\/12.2656582"},{"issue":"3","key":"177_CR23","first-page":"56","volume":"7","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Zhao, X., Cao, Y.: A survey on blind detection of tampered digital images. J. Cyber Secur. 7(3), 56\u201390 (2022b)","journal-title":"J. Cyber Secur."},{"key":"177_CR24","unstructured":"Zi, Y.: Hardware acceleration engine design for financial IC chip based on state cryptograph. Master thesis, Huazhong University of Science and Technology, 5 (2016)"}],"container-title":["CCF Transactions on High Performance Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42514-023-00177-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42514-023-00177-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42514-023-00177-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T07:06:28Z","timestamp":1729494388000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42514-023-00177-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,22]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["177"],"URL":"https:\/\/doi.org\/10.1007\/s42514-023-00177-5","relation":{},"ISSN":["2524-4922","2524-4930"],"issn-type":[{"type":"print","value":"2524-4922"},{"type":"electronic","value":"2524-4930"}],"subject":[],"published":{"date-parts":[[2024,1,22]]},"assertion":[{"value":"29 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}