{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T02:04:06Z","timestamp":1772503446793,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T00:00:00Z","timestamp":1566259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2019,8,31]]},"abstract":"<jats:p>Sophisticated image forgeries introduce digital image forensics as an active area of research. In this area, many researchers have addressed the problem of median filtering forensics. Existing median filtering detectors are adequate to classify median filtered images in uncompressed mode and in compressed mode at high-quality factors. Despite that, the field is lacking a robust method to detect median filtering in low-resolution images compressed with low-quality factors. In this article, a novel feature set (four feature dimensions), based on first-order statistics of frequency contents of median filtered residuals (MFRs) of original and median filtered images, has been proposed. The proposed feature set outperforms handcrafted features-based state-of-the-art detectors in terms of feature set dimensions and detection results obtained for low-resolution images at all quality factors. Also, results reveal the efficacy of proposed method over deep-learning-based median filtering detector. Comprehensive results expose the efficacy of the proposed detector to detect median filtering against other similar manipulations. Additionally, generalization ability test on cross-database images support the cross-validation results on four different databases. Thus, our proposed detector meets the current challenges in the field, to a great extent.<\/jats:p>","DOI":"10.1145\/3321508","type":"journal-article","created":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T19:51:56Z","timestamp":1566330716000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A Simplistic Global Median Filtering Forensics Based on Frequency Domain Analysis of Image Residuals"],"prefix":"10.1145","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1939-5407","authenticated-orcid":false,"given":"Abhinav","family":"Gupta","sequence":"first","affiliation":[{"name":"Jaypee Institute of Information Technology, Noida (Uttar Pradesh), India"}]},{"given":"Divya","family":"Singhal","sequence":"additional","affiliation":[{"name":"Jaypee Institute of Information Technology, Noida (Uttar Pradesh), India"}]}],"member":"320","published-online":{"date-parts":[[2019,8,20]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/321119.321122"},{"key":"e_1_2_1_2_1","volume-title":"Break Our Steganographic System: The Ins and Outs of Organizing BOSS","author":"Bas Patrick"},{"key":"e_1_2_1_3_1","unstructured":"Patrick Bas and Teddy Furon. 2007. BOWS-2. http:\/\/bows2.ec-lille.fr\/.  Patrick Bas and Teddy Furon. 2007. BOWS-2. http:\/\/bows2.ec-lille.fr\/."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825953"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1987.1165153"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00682"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2300937"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2277814"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2438008"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2713168.2713194"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.844909"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Burhan Ergen. 2016. Scale invariant and fixed-length feature extraction by integrating discrete cosine transform and autoregressive signal modeling for palmprint identification. Turkish Journal of Electrical Engineering and Computer Sciences 24 (Jan. 2016) 1768--1781.  Burhan Ergen. 2016. Scale invariant and fixed-length feature extraction by integrating discrete cosine transform and autoregressive signal modeling for palmprint identification. Turkish Journal of Electrical Engineering and Computer Sciences 24 (Jan. 2016) 1768--1781.","DOI":"10.3906\/elk-1309-65"},{"key":"e_1_2_1_14_1","first-page":"5","article-title":"Median filtered image quality enhancement and anti-forensics via variational deconvolution","volume":"10","author":"Fan W.","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 17th International Conference on Pattern Recognition (ICPR\u201904)","volume":"2","author":"Farmer M. E."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176650"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 17th International Conference on Pattern Recognition (ICPR\u201904)","volume":"3","author":"Harding P. R. G."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2273394"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2008214"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of SPIE Media Forensics and Security II","volume":"7541","author":"Kirchner Matthias","year":"2010"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2599849"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.485554"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4845-0"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.03.003"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.01.008"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"G. A. Papakostas D. E. Koulouriotis and E. G. Karakasis. 2009. Efficient 2-D DCT computation from an image representation point of view. In Image Processing Yung-Sheng Chen (Ed.). InTech Rijeka Chapter 02.  G. A. Papakostas D. E. Koulouriotis and E. G. Karakasis. 2009. Efficient 2-D DCT computation from an image representation point of view. In Image Processing Yung-Sheng Chen (Ed.). InTech Rijeka Chapter 02.","DOI":"10.5772\/7043"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of SPIE","volume":"5307","author":"Schaefer Gerald","year":"2003"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2119314"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053202"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2017.8168168"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.011"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2604208"},{"key":"e_1_2_1_33_1","volume-title":"United States Department of Agriculture. Retrieved","author":"USDA","year":"2014"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5651-z"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638217"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4691-0"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2161761"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:38Z","timestamp":1750204478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,20]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,8,31]]}},"alternative-id":["10.1145\/3321508"],"URL":"https:\/\/doi.org\/10.1145\/3321508","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,20]]},"assertion":[{"value":"2018-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}