{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:43:12Z","timestamp":1763664192008,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/apsipaasc47483.2019.9023173","type":"proceedings-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T17:03:54Z","timestamp":1583514234000},"page":"1303-1307","source":"Crossref","is-referenced-by-count":5,"title":["Multiple-Operation Image Anti-Forensics with WGAN-GP Framework"],"prefix":"10.1109","author":[{"given":"Jianyuan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2119314"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553259"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638217"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2782363"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32205-1_32"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"53","DOI":"10.4018\/jdcf.2013070104","article-title":"Anti-forensics for unsharp masking sharpening in digital images","volume":"5","author":"lu","year":"2013","journal-title":"Int J Digital Crime Forensics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2509477"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2234117"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.12.089"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206013"},{"key":"ref28","first-page":"694","article-title":"Perceptual losses for realtime style transfer and super-resolution","author":"johnson","year":"2016","journal-title":"Proc Comput Des Conf"},{"key":"ref4","first-page":"361","article-title":"Median filtering detection using edge based prediction matrix","author":"chen","year":"2011","journal-title":"Proc of the 10th International Workshop on Digital Forensics and Watermarking"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCI.2016.2644865"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2170836"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053202"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-328"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2273394"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2164791"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2300937"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TIP.2002.807361","article-title":"Identification of bitmap compression history: JPEG detection and quantizer estimation","volume":"12","author":"fan","year":"2003","journal-title":"IEEE Trans Image Process"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2008214"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref22","first-page":"214","article-title":"Wasserstein Generative Adversarial Networks","author":"arjovsky","year":"2017","journal-title":"Proc Int Conf Machine Learning (ICML)"},{"key":"ref21","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in Neural Information Processing Systems(NIPS)"},{"key":"ref24","first-page":"5767","article-title":"Improved training of wasserstein gans","author":"gulrajani","year":"2017","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2991\/acaai-18.2018.24"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083248"}],"event":{"name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2019,11,18]]},"location":"Lanzhou, China","end":{"date-parts":[[2019,11,21]]}},"container-title":["2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8989870\/9023008\/09023173.pdf?arnumber=9023173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:52:55Z","timestamp":1658094775000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9023173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/apsipaasc47483.2019.9023173","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}