{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:57:09Z","timestamp":1761663429416},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/icip.2015.7351474","type":"proceedings-article","created":{"date-parts":[[2015,12,13]],"date-time":"2015-12-13T01:34:48Z","timestamp":1449970488000},"page":"3595-3599","source":"Crossref","is-referenced-by-count":8,"title":["Countering anti-forensics of image resampling"],"prefix":"10.1109","author":[{"given":"Anjie","family":"Peng","sequence":"first","affiliation":[]},{"given":"Hui","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Xiaodan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2004.924603"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CRV.2005.33"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2011.08.012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2008214"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411333"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref7","first-page":"472","article-title":"UCID-An uncompressed color image database","author":"schaefer","year":"2004","journal-title":"Proceedings of SPIE Storage and Retrieval Methods and Applications for Multimedia"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","article-title":"Break our steganographic system - the ins and outs of organizing BOSS","author":"bas","year":"2011","journal-title":"13th Information Hiding"},{"key":"ref1","first-page":"2857","article-title":"Steganalysis in rescaled images","author":"kodovsky","year":"2013","journal-title":"ICASSP 2013"}],"event":{"name":"2015 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2015,9,27]]},"location":"Quebec City, QC, Canada","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328364\/7350743\/07351474.pdf?arnumber=7351474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T21:30:23Z","timestamp":1498253423000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7351474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icip.2015.7351474","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}