{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:59:35Z","timestamp":1740142775302,"version":"3.37.3"},"reference-count":42,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T00:00:00Z","timestamp":1668902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,14]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The innovation in visual imagery has led to massive growth in technologies, wherein digital cameras are obtainable at affordable prices. Thus, the digital images are easily captured and processed due to the internet connectivity. On the other hand, the development of strong image editing software facilitated the forgers to manipulate the accessible images with different tampering operations. Several techniques are devised for detecting the forgeries. Accordingly, this paper devises an anti-forensic model, namely Exponentially Weighted Moving Average-Chaotic Biography Based Optimization (E-CBBO) for joint photographic experts group (JPEG) compression to mitigate the forgeries occurred on the internet while transmitting data. The proposed E-CBBO is designed by integrating the properties of the exponentially weighted moving average (EWMA) with the chaotic biography-based optimization (CBBO). The suggested JPEG anti-forensic model is used to eliminate JPEG compression artifacts through the use of unique deblocking, smoothing with dither and decalibration operations. In addition, the goal is to balance visual quality and forensic undetectability when compressing the JPEG image. The fitness function is developed using the structural similarity index (SSIM), universal image quality index (UIQI) and histogram deviation parameters. With a maximum accuracy of 93.2%, a minimal MSE of 0.110, a maximum SSIM of 0.932 and a maximum UIQI of 0.890, the suggested E-CBBO beat existing approaches.<\/jats:p>","DOI":"10.1093\/comjnl\/bxac148","type":"journal-article","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T14:17:11Z","timestamp":1668694631000},"page":"3038-3051","source":"Crossref","is-referenced-by-count":0,"title":["Digital Image Anti-Forensic Model Using Exponential Chaotic Biogeography-Based Optimization Algorithm"],"prefix":"10.1093","volume":"66","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7858-581X","authenticated-orcid":false,"given":"Dr R","family":"Sudhakar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science , Madanapalle, Andhra Pradesh 517325, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5925-0659","authenticated-orcid":false,"given":"Dr P V Venkateswara","family":"Rao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science , Madanapalle, Andhra Pradesh 517325, India"}]}],"member":"286","published-online":{"date-parts":[[2022,11,20]]},"reference":[{"key":"2023121811455297100_ref1","doi-asserted-by":"crossref","DOI":"10.3390\/ijerph17020562","article-title":"Night-time shift work and related stress responses: a study on security guards","volume":"17","author":"Cannizzaro","year":"2020","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"2023121811455297100_ref2","doi-asserted-by":"crossref","first-page":"45","DOI":"10.3233\/THC-202237","article-title":"Predicting cancer using supervised machine learning: mesothelioma","volume":"29","author":"Choudhury","year":"2021","journal-title":"Technol. Health Care"},{"volume-title":"J. Sociol","year":"2018","author":"Kandambige","key":"2023121811455297100_ref3"},{"key":"2023121811455297100_ref4","first-page":"55","article-title":"Clinical outcome of 215 transmucosal implants with a conical connection: a retrospective study after 5-year follow-up","volume":"30","author":"Lopez","year":"2016","journal-title":"J. Biol. Regul. Homeost. Agents"},{"volume-title":"2010 IEEE International Conference on Acoustics, Speech and Signal Processing","year":"2010","author":"Stamm","key":"2023121811455297100_ref5"},{"volume-title":"6th International Workshop on Information Hiding","year":"2004","author":"Popescu","key":"2023121811455297100_ref6"},{"volume-title":"Technical Report TR2006\u2013583","year":"2006","author":"Farid","key":"2023121811455297100_ref7"},{"key":"2023121811455297100_ref8","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","article-title":"Detection of double compression in JPEG images for applications in steganography","volume":"3","author":"Pevny","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2023121811455297100_ref9","doi-asserted-by":"crossref","first-page":"7749","DOI":"10.1007\/s11042-016-3409-z","article-title":"A novel forensic image analysis tool for discovering double JPEG compression clues","volume":"76","author":"Taimori","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"2023121811455297100_ref10","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TIP.2002.807361","article-title":"Identification of bitmap compression history: JPEG detection and quantizer estimation","volume":"12","author":"Fan","year":"2003","journal-title":"IEEE Trans. Image Process."},{"key":"2023121811455297100_ref11","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1049\/el.2017.4444","article-title":"Two-stream neural networks to detect manipulation of JPEG compressed images","volume":"54","author":"Kim","year":"2018","journal-title":"Electron. Lett."},{"key":"2023121811455297100_ref12","first-page":"423","article-title":"Detecting doctored JPEG images via dct coef\u00bfcient analysis","volume":"3593","author":"He","year":"2006","journal-title":"Proc. of ECCV"},{"key":"2023121811455297100_ref13","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","article-title":"Information forensics: an overview of the first decade","volume":"1","author":"Stamm","year":"2013","journal-title":"IEEE Access"},{"key":"2023121811455297100_ref14","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.forsciint.2017.06.003","article-title":"Improved JPEG anti-forensics with better image visual quality and forensic undetectability","volume":"277","author":"Singh","year":"2017","journal-title":"Forensic Sci. Int."},{"key":"2023121811455297100_ref15","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","article-title":"JPEG error analysis and its application to digital image forensics","volume":"5","author":"Luo","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2023121811455297100_ref16","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/TIFS.2008.2008214","article-title":"Hiding traces of resampling in digital images","volume":"3","author":"Kirchner","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Security"},{"volume-title":"Proc. SPIE-IS&T Electronic Imaging: Media Forensics and Security","year":"2009","author":"Kirchner","key":"2023121811455297100_ref17"},{"key":"2023121811455297100_ref18","first-page":"20","article-title":"Multi-objective HSDE algorithm for energy-aware cluster head selection in WSN","volume":"2","author":"John","year":"2019","journal-title":"J. Netw. Comm. Syst."},{"key":"2023121811455297100_ref19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/79.939835","article-title":"Digital watermarking: algorithms and applications","volume":"18","author":"Podilchuk","year":"2001","journal-title":"IEEE Signal Process. Mag."},{"key":"2023121811455297100_ref20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.46253\/jcmps.v2i2.a1","article-title":"Fault recognition and diagnosis based on a decision tree for power distribution systems","volume":"2","author":"Srinivasa Rao","year":"2019","journal-title":"J. Comput. Mech. Power Syst. Control"},{"key":"2023121811455297100_ref21","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TSMCA.2012.2223670","article-title":"Tracking generic human motion via fusion of low- and high-dimensional approaches","volume":"43","author":"Cui","year":"2013","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"2023121811455297100_ref22","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","article-title":"From action to activity: sensor-based activity recognition","volume":"181","author":"Liu","year":"2016","journal-title":"Neurocomputing"},{"key":"2023121811455297100_ref23","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/30.267415","article-title":"The trustworthy digital camera: restoring credibility to the photographic image","volume":"39","author":"Friedman","year":"1993","journal-title":"IEEE Trans. Consum. Electron."},{"key":"2023121811455297100_ref24","doi-asserted-by":"crossref","first-page":"2890","DOI":"10.1109\/TIFS.2017.2725201","article-title":"Statistical detection of JPEG traces in digital images in uncompressed formats","volume":"12","author":"Pasquini","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2023121811455297100_ref25","doi-asserted-by":"crossref","first-page":"12805","DOI":"10.1007\/s11042-017-4915-3","article-title":"JPEG image classification in digital forensic via DCT coefficient analysis","volume":"77","author":"Alherbawi","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"2023121811455297100_ref26","first-page":"1694","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing","author":"Stamm","year":"2010"},{"key":"2023121811455297100_ref27","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/978-3-642-24178-9_20","volume-title":"Information Hiding: 13th International Conference, IH 2011","author":"Lai","year":"2011"},{"key":"2023121811455297100_ref28","first-page":"19","article-title":"Face image forgery detection by weight optimized neural network model","volume":"2","author":"Cristin","year":"2019","journal-title":"Multimed. Res."},{"key":"2023121811455297100_ref29","doi-asserted-by":"crossref","first-page":"31835","DOI":"10.1007\/s11042-018-6170-7","article-title":"Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients","volume":"77","author":"Das","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"2023121811455297100_ref30","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s11042-016-4290-5","article-title":"Forensics for partially double compressed doctored JPEG images","volume":"77","author":"Singh","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"2023121811455297100_ref31","doi-asserted-by":"crossref","first-page":"2772","DOI":"10.1109\/TIFS.2018.2834147","article-title":"Distinguishing between natural and computer-generated images using convolutional neural networks","volume":"13","author":"Quan","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2023121811455297100_ref32","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/TIFS.2016.2604208","article-title":"JPEG quantization step estimation and its applications to digital image forensics","volume":"12","author":"Thai","year":"2017","journal-title":"IEEE Trans. Inform. Forensics Security"},{"key":"2023121811455297100_ref33","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TCSVT.2016.2599849","article-title":"Identification of various image operations using residual-based features","volume":"28","author":"Li","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2023121811455297100_ref34","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1049\/iet-ipr.2017.0992","article-title":"Revealing the traces of histogram equalisation in digital images","volume":"12","author":"Akhtar","year":"2017","journal-title":"IET Image Process."},{"key":"2023121811455297100_ref35","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-016-0426-1","article-title":"Countering JPEG anti-forensics based on noise level estimation","volume":"61","author":"Zeng","year":"2018","journal-title":"Sci. China Inf. Sci."},{"key":"2023121811455297100_ref36","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1080\/13682199.2017.1389832","article-title":"An improved anti-forensics JPEG compression using least cuckoo search algorithm","volume":"66","author":"Shelke","year":"2018","journal-title":"Imag. Sci. J."},{"key":"2023121811455297100_ref37","doi-asserted-by":"crossref","first-page":"4364","DOI":"10.1109\/ACCESS.2020.3048246","article-title":"Digital image forensic approach to counter the JPEG anti-forensic attacks","volume":"9","author":"Kumar","year":"2021","journal-title":"IEEE Access"},{"key":"2023121811455297100_ref38","article-title":"Anti-forensics of median filtered images using non-linear optimization techniques","volume":"9","author":"Seema","year":"2020","journal-title":"Int. J. Eng. Res. Technol."},{"key":"2023121811455297100_ref39","doi-asserted-by":"crossref","first-page":"1811","DOI":"10.1049\/iet-ipr.2018.6587","article-title":"Bibliography of digital image anti-forensics and anti-anti-forensics techniques","volume":"13","author":"Quereshi","year":"2019","journal-title":"IET Image Process."},{"key":"2023121811455297100_ref40","first-page":"122","article-title":"Chaotic biogeography-based optimization algorithm","volume":"44","author":"Wang","year":"2017","journal-title":"IAENG Int. J. Comput. Sci."},{"key":"2023121811455297100_ref41","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1080\/03610919208813040","article-title":"Exponentially weighted moving average control schemes with variable sampling intervals","volume":"21","author":"Saccucci","year":"1992","journal-title":"Comm. Stat. Simul. Comput."},{"key":"2023121811455297100_ref42","first-page":"472","article-title":"UCID: an uncompressed color image database","volume":"5307","author":"Schaefer","year":"2004","journal-title":"Storage Retriev. Methods Appl. Multimed."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/12\/3038\/54446690\/bxac148.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/12\/3038\/54446690\/bxac148.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T11:47:08Z","timestamp":1702900028000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/66\/12\/3038\/6777261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,20]]},"references-count":42,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,11,20]]},"published-print":{"date-parts":[[2023,12,14]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxac148","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2023,12]]},"published":{"date-parts":[[2022,11,20]]}}}