{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:28:05Z","timestamp":1725456485483},"reference-count":24,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2,19]]},"DOI":"10.1117\/12.2042234","type":"proceedings-article","created":{"date-parts":[[2014,2,19]],"date-time":"2014-02-19T02:59:52Z","timestamp":1392778792000},"page":"902810","source":"Crossref","is-referenced-by-count":1,"title":["Image counter-forensics based on feature injection"],"prefix":"10.1117","volume":"9028","author":[{"given":"M.","family":"Iuliani","sequence":"additional","affiliation":[]},{"given":"S.","family":"Rossetto","sequence":"additional","affiliation":[]},{"given":"T.","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"Alessia","family":"De Rosa","sequence":"additional","affiliation":[]},{"given":"A.","family":"Piva","sequence":"additional","affiliation":[]},{"given":"M.","family":"Barni","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"key":"c2","unstructured":"B\u00f6hme, R. and Kirchner, M., [Counter-Forensics: Attacking Image Forensics], 327\u2013366, Springer-Verlag (2013)."},{"key":"c3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2008214"},{"key":"c4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932"},{"key":"c5","doi-asserted-by":"crossref","unstructured":"Gloe, T., Kirchner, M., Winkler, A., and B\u00f6hme, R., \u201cCan we trust digital image forensics?,\u201d in [International Conference on Multimedia], 78\u201386 (2007).","DOI":"10.1145\/1291233.1291252"},{"key":"c6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2099220"},{"key":"c7","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123122"},{"key":"c8","doi-asserted-by":"crossref","unstructured":"Kirchner, M. and B\u00f6hme, R., \u201cSynthesis of color filter array pattern in digital images,\u201d in [SPIE Conference on Media Forensics and Security], Delp, E. J., Dittmann, J., Memon, N., and Wong, P. W., eds. (2009).","DOI":"10.1117\/12.805988"},{"key":"c9","doi-asserted-by":"crossref","unstructured":"Stamm, M., Tjoa, S., Lin, W. S., and Liu, K. J. R., \u201cAnti-forensics of JPEG compression,\u201d in [International Conference on Acoustics, Speech, and Signal Processing], 1694\u20131697 (2010).","DOI":"10.1109\/ICASSP.2010.5495491"},{"key":"c10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2119314"},{"key":"c11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024715"},{"key":"c12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946874"},{"key":"c13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6115854"},{"key":"c14","doi-asserted-by":"crossref","unstructured":"Lai, S. and B\u00f6hme, R., \u201cCountering counter-forensics: The case of JPEG compression,\u201d in [, 13th International Conference on Information Hiding], Filler, T., Pevny, T., Craver, S., and Ker, A., eds., 6958, 285\u2013298, Springer-Verlag (2011).","DOI":"10.1007\/978-3-642-24178-9_20"},{"key":"c15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652553"},{"key":"c16","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.807361"},{"key":"c17","doi-asserted-by":"publisher","DOI":"10.1145\/2361407"},{"key":"c18","doi-asserted-by":"crossref","unstructured":"Fan, W., Wang, K., Cayre, F., and Xiong, Z., \u201cA variational approach to JPEG anti-forensics,\u201d in [Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on], 3058\u20133062 (2013).","DOI":"10.1109\/ICASSP.2013.6638220"},{"key":"c19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931078"},{"key":"c20","doi-asserted-by":"crossref","unstructured":"Kivanc Mihcak, M., Kozintsev, I., and Ramchandran, K., \u201cSpatially adaptive statistical modeling of wavelet image coefficients and its application to denoising,\u201d in [Acoustics, Speech, and Signal Processing, 1999. Proceedings., 1999 IEEE International Conference on], 6, 3253 \u20133256 vol.6 (mar 1999).","DOI":"10.1109\/ICASSP.1999.757535"},{"key":"c21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"c22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"c23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051426"},{"key":"c24","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970920","article-title":"Iterative Methods for Optimization","author":"Kelley","year":"1999"}],"event":{"name":"IS&T\/SPIE Electronic Imaging","location":"San Francisco, California, USA"},"container-title":["SPIE Proceedings","Media Watermarking, Security, and Forensics 2014"],"original-title":[],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T19:14:52Z","timestamp":1565205292000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2042234"}},"subtitle":[],"editor":[{"given":"Adnan M.","family":"Alattar","sequence":"first","affiliation":[]},{"given":"Nasir D.","family":"Memon","sequence":"additional","affiliation":[]},{"given":"Chad D.","family":"Heitzenrater","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,2,19]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1117\/12.2042234","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2014,2,19]]}}}