{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T06:48:10Z","timestamp":1769064490942,"version":"3.49.0"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010251","name":"Ganpo Talent Program of Jiangxi Province","doi-asserted-by":"publisher","award":["gpyc20240012"],"award-info":[{"award-number":["gpyc20240012"]}],"id":[{"id":"10.13039\/501100010251","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201233"],"award-info":[{"award-number":["62201233"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tip.2025.3593911","type":"journal-article","created":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T18:08:53Z","timestamp":1754417333000},"page":"5023-5037","source":"Crossref","is-referenced-by-count":1,"title":["Hard EXIF: Protecting Image Authorship Through Metadata, Hardware, and Content"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8183-8435","authenticated-orcid":false,"given":"Yushu","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7303-0290","authenticated-orcid":false,"given":"Bowen","family":"Shi","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0574-2313","authenticated-orcid":false,"given":"Shuren","family":"Qi","sequence":"additional","affiliation":[{"name":"Department of Mathematics, The Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3250-0603","authenticated-orcid":false,"given":"Xiangli","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China"}]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Engineering, Westlake University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3098-4640","authenticated-orcid":false,"given":"Wenying","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Copyright Law","volume":"85","author":"Joyce","year":"2016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2009.09.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2368255"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/278476.278484"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.028"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/83.826780"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2005.858742"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475324"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547950"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3157867"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969990"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3237685"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2009.5234757"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835573"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2015.2476318"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3466972"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3387568"},{"key":"ref19","first-page":"1","article-title":"Using extended file information (EXIF) file headers in digital evidence analysis","volume":"2","author":"Alvarez","year":"2004","journal-title":"Int. J. Digit. Evid."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00671"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIRO.2018.00042"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151341"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.779263"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.638587"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00015-2"},{"key":"ref26","first-page":"104","article-title":"A digital watermarking algorithm based on DCT and DWT","volume-title":"Proc. - Web Inf. Syst. Appl. Conf.","author":"Jiansheng"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S1665-6423(14)70091-4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3479428"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.01.024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3036727"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.04.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.060"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS55849.2022.9975409"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3285981"},{"key":"ref35","article-title":"Quality assessment for AI generated images with instruction tuning","author":"Wang","year":"2024","journal-title":"arXiv:2405.07346"},{"key":"ref36","article-title":"AIGV-assessor: Benchmarking and evaluating the perceptual quality of text-to-video generation with LMM","author":"Wang","year":"2024","journal-title":"arXiv:2411.17221"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3251695"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.2988148"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548329"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3319020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2996463"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.2966082"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2757-1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1004.2010.00221"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2017.8096051"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICE.2018.8436315"},{"issue":"4","key":"ref49","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: A survey","volume":"14","author":"Wang","year":"2018","journal-title":"Int. J. Web Grid Serv."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10258"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2302078"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2701335"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2926777"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.2478\/msr-2013-0021"},{"key":"ref56","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proc. 44th Annu. Conf. Design Autom.","author":"Suh"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4130-7"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115747"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-020-0372-5"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/83\/10795784\/11114780.pdf?arnumber=11114780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T17:36:34Z","timestamp":1755106594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11114780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/tip.2025.3593911","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}