{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:12Z","timestamp":1750307172275,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393292","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"452-457","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Format based photo forgery image detection"],"prefix":"10.1145","author":[{"given":"S.","family":"Murali","sequence":"first","affiliation":[{"name":"Maharaja Research Foundation, MIT, Mysore, India"}]},{"given":"Govindraj B.","family":"Chittapur","sequence":"additional","affiliation":[{"name":"Basaveshwar Engineering College, Bagalkot, India"}]},{"given":"H. S.","family":"Prabhakara","sequence":"additional","affiliation":[{"name":"Maharaja Research Foundation, MIT, Mysore, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"volume-title":"Inc.","year":"1994","author":"Digital Image Processing G. A.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"www.fourandsix.com\/photo-tampering-history\/category\/2012  www.fourandsix.com\/photo-tampering-history\/category\/2012"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/ivms.stanford.edu\/~varodayan\/mentorship\/GargHailuSridharan.pdf  http:\/\/ivms.stanford.edu\/~varodayan\/mentorship\/GargHailuSridharan.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932(410) 53"},{"volume-title":"IEEE International Symposium on Circuits and Systems","year":"2004","author":"Ng T.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932(410) 53"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCVPRIPG.2011.53"},{"volume-title":"OH","year":"2003","author":"Lukas J.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Digital image forgery detection Using artificial Neural Network and Auto Regressive Coefficients","author":"Gopi E. S.","year":"2006","journal-title":"EEE\/CCCGET, Ottawa"},{"key":"e_1_3_2_1_10_1","unstructured":"Y. Sutch B. Coskum and H. T. Sencar N. Memon \"Temper Detection Based On Regularities Of Wavelet transform Coefficients \"Polytechnic University Electrical Computer Engineering Dept. Brooklyn Ny 11201 USA  Y. Sutch B. Coskum and H. T. Sencar N. Memon \"Temper Detection Based On Regularities Of Wavelet transform Coefficients \"Polytechnic University Electrical Computer Engineering Dept. Brooklyn Ny 11201 USA"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/331624.331630"},{"volume-title":"OH","year":"2003","author":"Lukas J.","key":"e_1_3_2_1_12_1"},{"volume-title":"CO","year":"2001","author":"Du J., R.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Johnson R. C. \"JPEG2000 Wavelet Compression Spec Approved \" August 18 2004. http:\/\/www.us.design-reuse.com\/news\/news1917.html.  Johnson R. C. \"JPEG2000 Wavelet Compression Spec Approved \" August 18 2004. http:\/\/www.us.design-reuse.com\/news\/news1917.html."},{"key":"e_1_3_2_1_15_1","unstructured":"A. Garg A. Hailu and R. Sridharan \"Image Forgery Identification using JPEG Intrinsic Fingerprints\" Authors copy  A. Garg A. Hailu and R. Sridharan \"Image Forgery Identification using JPEG Intrinsic Fingerprints\" Authors copy"},{"journal-title":"International Journal Of Machine Intelligence","article-title":"Digital Photo Image Forgery Techniques","author":"Murali","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2077341.2077345"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Hany Farid and Mary J. Bravo \"Perceptual Discrimination of Computer Generatedand Photographic Faces\" Digital Investigation 2011  Hany Farid and Mary J. Bravo \"Perceptual Discrimination of Computer Generatedand Photographic Faces\" Digital Investigation 2011","DOI":"10.1016\/j.diin.2011.06.003"},{"key":"e_1_3_2_1_19_1","unstructured":"Eric Kee and Hany Farid \"A perceptual metric for photo retouching\" PNAS Proceeding of the national academy of science of the united state of america doi=10.1073\/pnas.1110747108 PNAS November 28 2011  Eric Kee and Hany Farid \"A perceptual metric for photo retouching\" PNAS Proceeding of the national academy of science of the united state of america doi=10.1073\/pnas.1110747108 PNAS November 28 2011"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2128309"},{"volume-title":"IEEE International Workshop on Information Forensics and Security","year":"2010","author":"Kee E.","key":"e_1_3_2_1_21_1"},{"volume-title":"International Conference on Image Processing","year":"2010","author":"Conotter V.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"H. Farid and M. J. Bravo \"Photo Forensics: How Reliable is the Visual System?\" Vision Sciences (VSS) Naples FL 2010  H. Farid and M. J. Bravo \"Photo Forensics: How Reliable is the Visual System?\" Vision Sciences (VSS) Naples FL 2010","DOI":"10.1167\/10.7.1231"},{"volume-title":"TR2009-656","author":"Kee E.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2009.5186556"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597826"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/103085.103089"},{"key":"e_1_3_2_1_28_1","first-page":"203","article-title":"Fundamental Of Digital Image Processing","volume":"978","author":"Jain Anil K.","journal-title":"PHI publication Delhi ISBN-"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:47Z","timestamp":1750240487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":28,"alternative-id":["10.1145\/2393216.2393292","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393292","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}