{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:37:41Z","timestamp":1772725061875,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T00:00:00Z","timestamp":1686873600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"This research was supported by project Dioni: Computing Infrastructure for Big-Data Processing and Analysis (MIS No. 5047222) co-funded by European Union (ERDF) and Greece through Operational Program Competitiveness, Entrepreneurship and Innovation, NSRF 2014-2020.","award":["MIS No. 5047222"],"award-info":[{"award-number":["MIS No. 5047222"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,16]]},"DOI":"10.1145\/3606305.3606317","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T16:18:41Z","timestamp":1694535521000},"page":"117-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Tamper Detection and Localization in Forensic Images"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2862-6390","authenticated-orcid":false,"given":"Maria","family":"Chroni","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5852-444X","authenticated-orcid":false,"given":"Athanasia","family":"Katsi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6684-8459","authenticated-orcid":false,"given":"Stavros","family":"Nikolopoulos","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6427-5519","authenticated-orcid":false,"given":"Iosif","family":"Polenakis","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1280-9483","authenticated-orcid":false,"given":"Vasileios","family":"Vouronikos","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISA56318.2022.9904398"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISA56318.2022.9904378"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2002.1203314"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5414611"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.07.002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560097"},{"key":"e_1_3_2_1_7_1","volume-title":"Blockchain Technology in Forensic Science. A Bibliometric Review. In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 1570\u20131573","author":"Goyal Reema","year":"2021","unstructured":"Reema Goyal . 2021 . Blockchain Technology in Forensic Science. A Bibliometric Review. In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 1570\u20131573 . Reema Goyal. 2021. Blockchain Technology in Forensic Science. A Bibliometric Review. In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 1570\u20131573."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20060355"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.876"},{"key":"e_1_3_2_1_10_1","unstructured":"pexels. 2023. Forensic Images. https:\/\/www.pexels.com\/search\/crime%20scene\/  pexels. 2023. Forensic Images. https:\/\/www.pexels.com\/search\/crime%20scene\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07971-w"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301334"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSA46371.2019.9404235"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSO.2011.85"},{"key":"e_1_3_2_1_15_1","volume-title":"2012 International Conference on Machine Learning and Cybernetics, Vol.\u00a03. IEEE, 1080\u20131084","author":"Zhou Yan","year":"2012","unstructured":"Yan Zhou , Fan-Zhi Zeng , and Guang-Fa Yang . 2012 . The research for tamper forensics on MPEG-2 video based on compressed sensing . In 2012 International Conference on Machine Learning and Cybernetics, Vol.\u00a03. IEEE, 1080\u20131084 . Yan Zhou, Fan-Zhi Zeng, and Guang-Fa Yang. 2012. The research for tamper forensics on MPEG-2 video based on compressed sensing. In 2012 International Conference on Machine Learning and Cybernetics, Vol.\u00a03. IEEE, 1080\u20131084."}],"event":{"name":"CompSysTech '23: International Conference on Computer Systems and Technologies 2023","location":"Ruse Bulgaria","acronym":"CompSysTech '23"},"container-title":["Proceedings of the 24th International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606305.3606317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3606305.3606317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:08Z","timestamp":1750178828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606305.3606317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,16]]},"references-count":15,"alternative-id":["10.1145\/3606305.3606317","10.1145\/3606305"],"URL":"https:\/\/doi.org\/10.1145\/3606305.3606317","relation":{},"subject":[],"published":{"date-parts":[[2023,6,16]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}