{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T11:59:18Z","timestamp":1773835158002,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/wifs.2014.7084318","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T20:32:15Z","timestamp":1429734735000},"page":"143-148","source":"Crossref","is-referenced-by-count":68,"title":["Splicing forgeries localization through the use of first digit features"],"prefix":"10.1109","author":[{"given":"Irene","family":"Amerini","sequence":"first","affiliation":[]},{"given":"Rudy","family":"Becarelli","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Caldelli","sequence":"additional","affiliation":[]},{"given":"Andrea Del","family":"Mastio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"518","article-title":"Image forensics using generalised Benford's law for accurate detection of unknown JPEG compression in watermarked images","author":"zhao","year":"2009","journal-title":"Proceedings of the 16th International Conference on Digital Signal Processing Ser DSP'09"},{"key":"ref11","first-page":"75","article-title":"JPEG recompression detection","author":"feng","year":"2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.05.014"},{"key":"ref13","first-page":"169","article-title":"Benford's law for natural and synthetic images","author":"acebo","year":"2005","journal-title":"Proceedings of the First Eurographics Conference on Computational Aesthetics in Graphics Visualization and Imaging ser Computational Aesthetics'05"},{"key":"ref14","article-title":"Estimation of primary quantization matrix in double compressed JPEG images","author":"lukas","year":"2003","journal-title":"Proc of DFRWS"},{"key":"ref15","first-page":"472","article-title":"UCID - an uncompressed colour image database","author":"schaefer","year":"2004","journal-title":"Storage and Retrieval Methods and Applications for Multimedia 2004 volume 5307 of Proc of SPIE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774427"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288362"},{"key":"ref3","first-page":"730","article-title":"Detecting doubly compressed JPEG images by using mode based first digit features","author":"li","year":"2008","journal-title":"Multimedia Signal Processing 2008 IEEE 10th Workshop on"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2013.03.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2487228.2487236"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2260814"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","article-title":"Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis","volume":"42","author":"zhouchen","year":"2009","journal-title":"Pattern Recognition"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/978-3-540-30114-1_10","article-title":"Statistical tools for digital forensics","volume":"3200","author":"popescu","year":"2005","journal-title":"Information Hiding ser Lecture Notes in Computer Science"}],"event":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"Atlanta, GA, USA","start":{"date-parts":[[2014,12,3]]},"end":{"date-parts":[[2014,12,5]]}},"container-title":["2014 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7070475\/7084286\/07084318.pdf?arnumber=7084318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T10:02:44Z","timestamp":1498212164000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7084318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wifs.2014.7084318","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}