{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T04:46:39Z","timestamp":1766551599150,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,29]],"date-time":"2007-09-29T00:00:00Z","timestamp":1191024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,29]]},"DOI":"10.1145\/1291233.1291252","type":"proceedings-article","created":{"date-parts":[[2007,10,14]],"date-time":"2007-10-14T12:51:38Z","timestamp":1192366298000},"page":"78-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":125,"title":["Can we trust digital image forensics?"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Gloe","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Germany"}]},{"given":"Matthias","family":"Kirchner","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Germany"}]},{"given":"Antje","family":"Winkler","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Germany"}]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Germany"}]}],"member":"320","published-online":{"date-parts":[[2007,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"65050R","DOI":"10.1117\/12.704321","volume-title":"Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IX","volume":"6072","author":"Chen W.","year":"2007","unstructured":"W. Chen , Y. Q. Shi , and W. Su . Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. In E. J. Delp and P. W. Wong, editors , Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IX , volume 6072 , pages 65050R - 650501 --65050R-8, 2007 . W. Chen, Y. Q. Shi, and W. Su. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. In E. J. Delp and P. W. Wong, editors, Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6072, pages 65050R-1--65050R-8, 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1364\/OE.14.011551"},{"issue":"1","key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"39","author":"Dempster A.","year":"1977","unstructured":"A. Dempster , N. Laird , and D. Rubin . Maximum likelihood from incomplete data via the EM algorithm . Journal of the Royal Statistical Society, Series B , 39 ( 1 ): 1 -- 38 , 1977 . A. Dempster, N. Laird, and D. Rubin. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B, 39(1):1--38, 1977.","journal-title":"Journal of the Royal Statistical Society, Series B"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.417569"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.704165"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161376"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1418853"},{"key":"e_1_3_2_1_8_1","volume-title":"Ninth International Workshop, St","author":"Kirchner M.","year":"2007","unstructured":"M. Kirchner and R. B\u00f6hme . Tamper hiding: Defeating image forensics. In Information Hiding , Ninth International Workshop, St . Malo, France , June 11-13 2007 , to appear in LNCS. M. Kirchner and R. B\u00f6hme. Tamper hiding: Defeating image forensics. In Information Hiding, Ninth International Workshop, St. Malo, France, June 11-13 2007, to appear in LNCS."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.125"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the Digital Forensic Research Workshop","author":"Luk\u00e0\u0161 J.","year":"2003","unstructured":"J. Luk\u00e0\u0161 and J. Fridrich . Estimation of primary quantization matrix in double compressed JPEG images . In Proc. of the Digital Forensic Research Workshop , 2003 . J. Luk\u00e0\u0161 and J. Fridrich. Estimation of primary quantization matrix in double compressed JPEG images. In Proc. of the Digital Forensic Research Workshop, 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.587105"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/97.803428"},{"key":"e_1_3_2_1_14_1","volume-title":"W. Zeng, H. Yu, and C.-Y","author":"Ng T.-T.","year":"2006","unstructured":"T.-T. Ng , S.-F. Chang , C.-Y. Lin , and Q. Sun . Passive-blind image forensics . In W. Zeng, H. Yu, and C.-Y . Lin, editors, Multimedia Security Technologies for Digital Rights. Academic Press , 2006 . T.-T. Ng, S.-F. Chang, C.-Y. Lin, and Q. Sun. Passive-blind image forensics. In W. Zeng, H. Yu, and C.-Y. Lin, editors, Multimedia Security Technologies for Digital Rights. Academic Press, 2006."},{"key":"e_1_3_2_1_15_1","first-page":"219","volume-title":"Information Hiding, Second International Workshop","author":"Petitcolas F.","year":"1998","unstructured":"F. Petitcolas , R. Anderson , and M. Kuhn . Attacks on copyright marking systems . In D. Aucsmith, editor, Information Hiding, Second International Workshop , volume LNCS 1525 , pages 219 -- 239 , Berlin, Heidelberg , 1998 . Springer Verlag . F. Petitcolas, R. Anderson, and M. Kuhn. Attacks on copyright marking systems. In D. Aucsmith, editor, Information Hiding, Second International Workshop, volume LNCS 1525, pages 219--239, Berlin, Heidelberg, 1998. Springer Verlag."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932(410) 53"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855406"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021889010444"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1407712"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE Computer Society Press","author":"Wolberg G.","year":"1994","unstructured":"G. Wolberg . Digital Image Warping . IEEE Computer Society Press , Los Alamitos, CA, USA , 3. edition, 1994 . G. Wolberg. Digital Image Warping. IEEE Computer Society Press, Los Alamitos, CA, USA, 3. edition, 1994."}],"event":{"name":"MM07: The 15th ACM International Conference on Multimedia 2007","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"],"location":"Augsburg Germany","acronym":"MM07"},"container-title":["Proceedings of the 15th ACM international conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1291233.1291252","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1291233.1291252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:13:53Z","timestamp":1750259633000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1291233.1291252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,29]]},"references-count":20,"alternative-id":["10.1145\/1291233.1291252","10.1145\/1291233"],"URL":"https:\/\/doi.org\/10.1145\/1291233.1291252","relation":{},"subject":[],"published":{"date-parts":[[2007,9,29]]},"assertion":[{"value":"2007-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}