{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:35:45Z","timestamp":1742978145747,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582180"},{"type":"electronic","value":"9783030582197"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58219-7_8","type":"book-chapter","created":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T23:09:25Z","timestamp":1600124965000},"page":"85-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["File Forgery Detection Using a Weighted Rule-Based System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0729-2264","authenticated-orcid":false,"given":"Jo\u00e3o Rafael","family":"Almeida","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1957-4947","authenticated-orcid":false,"given":"Olga","family":"Fajarda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6672-6176","authenticated-orcid":false,"given":"Jos\u00e9 Lu\u00eds","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,15]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-02620-1_4","volume-title":"Information Security and Privacy","author":"I Ahmed","year":"2009","unstructured":"Ahmed, I., Lhee, K., Shin, H., Hong, M.P.: On improving the accuracy and performance of content-based file type identification. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 44\u201359. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02620-1_4"},{"issue":"7","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1162\/neco.1997.9.7.1545","volume":"9","author":"Y Amit","year":"1997","unstructured":"Amit, Y., Geman, D.: Shape quantization and recognition with randomized trees. Neural Comput. 9(7), 1545\u20131588 (1997). https:\/\/doi.org\/10.1162\/neco.1997.9.7.1545","journal-title":"Neural Comput."},{"key":"8_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2017.02.003","author":"AA Attaby","year":"2017","unstructured":"Attaby, A.A., Ahmed, M.F.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. (2017). https:\/\/doi.org\/10.1016\/j.asej.2017.02.003","journal-title":"Ain Shams Eng. J."},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Caruana, R., Niculescu-Mizil, A.: An empirical comparison of supervised learning algorithms. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 161\u2013168. ACM (2006). https:\/\/doi.org\/10.1145\/1143844.1143865","DOI":"10.1145\/1143844.1143865"},{"issue":"13","key":"8_CR6","doi-asserted-by":"publisher","first-page":"18169","DOI":"10.1007\/s11042-019-7217-0","volume":"78","author":"S Chutani","year":"2019","unstructured":"Chutani, S., Goyal, A.: A review of forensic approaches to digital image Steganalysis. Multimed. Tools Appl. 78(13), 18169\u201318204 (2019). https:\/\/doi.org\/10.1007\/s11042-019-7217-0","journal-title":"Multimed. Tools Appl."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-1-4419-9326-7_5","volume-title":"Ensemble Machine Learning","author":"A Cutler","year":"2012","unstructured":"Cutler, A., Cutler, D.R., Stevens, J.R.: Random forests. In: Zhang, C., Ma, Y. (eds.) Ensemble Machine Learning, pp. 157\u2013175. Springer, Boston (2012). https:\/\/doi.org\/10.1007\/978-1-4419-9326-7_5"},{"key":"8_CR8","unstructured":"Evensen, J.D., Lindahl, S., Goodwin, M.: File-type detection using na\u00efve Bayes and n-gram analysis. In: Norwegian Information Security Conference, NISK, vol. 7 (2014)"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Gloe, T.: Forensic analysis of ordered data structures on the example of JPEG files. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 139\u2013144. IEEE (2012). https:\/\/doi.org\/10.1109\/WIFS.2012.6412639","DOI":"10.1109\/WIFS.2012.6412639"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Gopal, S., Yang, Y., Salomatin, K., Carbonell, J.: Statistical learning for file-type identification. In: 2011 10th International Conference on Machine Learning and Applications and Workshops, vol. 1, pp. 68\u201373. IEEE (2011). https:\/\/doi.org\/10.1109\/ICMLA.2011.135","DOI":"10.1109\/ICMLA.2011.135"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-030-28577-7_28","volume-title":"Experimental IR Meets Multilinguality, Multimodality, and Interaction","author":"B Ionescu","year":"2019","unstructured":"Ionescu, B., et al.: ImageCLEF 2019: multimedia retrieval in medicine, lifelogging, security and nature. In: Crestani, F., et al. (eds.) CLEF 2019. LNCS, vol. 11696, pp. 358\u2013386. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-28577-7_28"},{"issue":"4","key":"8_CR12","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/91.940964","volume":"9","author":"H Ishibuchi","year":"2001","unstructured":"Ishibuchi, H., Nakashima, T.: Effect of rule weights in fuzzy rule-based classification systems. IEEE Trans. Fuzzy Syst. 9(4), 506\u2013515 (2001). https:\/\/doi.org\/10.1109\/91.940964","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.jisa.2018.04.005","volume":"40","author":"K Karampidis","year":"2018","unstructured":"Karampidis, K., Kavallieratou, E., Papadourakis, G.: A review of image steganalysis techniques for digital forensics. J. Inf. Secur. Appl. 40, 217\u2013235 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2018.04.005","journal-title":"J. Inf. Secur. Appl."},{"key":"8_CR14","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-319-39564-7_25","volume-title":"Advanced Information Systems Engineering Workshops","author":"K Karampidis","year":"2016","unstructured":"Karampidis, K., Papadourakis, G.: File type identification for digital forensics. In: Krogstie, J., Mouratidis, H., Su, J. (eds.) CAiSE 2016. LNBIP, vol. 249, pp. 266\u2013274. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39564-7_25"},{"key":"8_CR15","unstructured":"Karampidis, K., Vasillopoulos, N., Cuevas Rodr\u00edguez, C., del Blanco, C.R., Kavallieratou, E., Garcia, N.: Overview of the ImageCLEFsecurity 2019: fileforgery detection tasks. In: CLEF2019 Working Notes. CEUR Workshop Proceedings, 09\u201312 September 2019, vol. 2381. CEUR-WS.org, Lugano (2019)"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Karresand, M., Shahmehri, N.: File type identification of data fragments by their binary structure. In: Proceedings of the IEEE Information Assurance Workshop, pp. 140\u2013147 (2006). https:\/\/doi.org\/10.1109\/IAW.2006.1652088","DOI":"10.1109\/IAW.2006.1652088"},{"key":"8_CR17","unstructured":"Khalid, S.K.A., Deris, M.M., Mohamad, K.M.: A steganographic technique for highly compressed JPEG images. In: The Second International Conference on Informatics Engineering & Information Science (ICIEIS 2013), pp. 107\u2013118 (2013)"},{"issue":"5","key":"8_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v028.i05","volume":"28","author":"M Kuhn","year":"2008","unstructured":"Kuhn, M., et al.: Building predictive models in R using the caret package. J. Stat. Softw. 28(5), 1\u201326 (2008)","journal-title":"J. Stat. Softw."},{"issue":"3","key":"8_CR19","doi-asserted-by":"publisher","first-page":"141","DOI":"10.4304\/jait.1.3.141-145","volume":"1","author":"M Kumari","year":"2010","unstructured":"Kumari, M., Khare, A., Khare, P.: JPEG compression steganography & crypography using image-adaptation technique. J. Adv. Inf. Technol. 1(3), 141\u2013145 (2010). https:\/\/doi.org\/10.4304\/jait.1.3.141-145","journal-title":"J. Adv. Inf. Technol."},{"issue":"4","key":"8_CR20","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s41066-016-0021-6","volume":"1","author":"H Liu","year":"2016","unstructured":"Liu, H., Gegov, A., Cocea, M.: Rule-based systems: a granular computing perspective. Granular Comput. 1(4), 259\u2013274 (2016). https:\/\/doi.org\/10.1007\/s41066-016-0021-6","journal-title":"Granular Comput."},{"key":"8_CR21","doi-asserted-by":"publisher","unstructured":"McDaniel, M., Heydari, M.H.: Content based file type detection algorithms. In: 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences, pp. 10\u2013pp. IEEE (2003). https:\/\/doi.org\/10.1109\/HICSS.2003.1174905","DOI":"10.1109\/HICSS.2003.1174905"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Reddy, V.L., Subramanyam, A., Reddy, P.C.: Steganpeg steganography + JPEG. In: 2011 International Conference on Ubiquitous Computing and Multimedia Applications, pp. 42\u201348. IEEE (2011). https:\/\/doi.org\/10.1109\/UCMA.2011.17","DOI":"10.1109\/UCMA.2011.17"},{"key":"8_CR23","first-page":"192","volume":"5","author":"MTSA Singh","year":"2019","unstructured":"Singh, M.T.S.A., Sharma, A.: A survey on various techniques of image data cryptography techniques and features. Int. J. Sci. Res. Eng. Trends 5, 192\u2013195 (2019)","journal-title":"Int. J. Sci. Res. Eng. Trends"}],"container-title":["Lecture Notes in Computer Science","Experimental IR Meets Multilinguality, Multimodality, and Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58219-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T13:17:08Z","timestamp":1709644628000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58219-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582180","9783030582197"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58219-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CLEF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of the Cross-Language Evaluation Forum for European Languages","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thessaloniki","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"clef2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/clef2020.clef-initiative.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}