{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:59:03Z","timestamp":1760709543768},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T00:00:00Z","timestamp":1520208000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13640-018-0257-y","type":"journal-article","created":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T06:23:40Z","timestamp":1520231020000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Automated approach for splicing detection using first digit probability distribution features"],"prefix":"10.1186","volume":"2018","author":[{"given":"Archana V.","family":"Mire","sequence":"first","affiliation":[]},{"given":"Sanjay B.","family":"Dhok","sequence":"additional","affiliation":[]},{"given":"N. J.","family":"Mistry","sequence":"additional","affiliation":[]},{"given":"Prakash D.","family":"Porey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,5]]},"reference":[{"key":"257_CR1","doi-asserted-by":"publisher","unstructured":"A Piva, An overview on image forensics. ISRN Signal Proc 2013, 22 (2013). https:\/\/doi.org\/10.1155\/2013\/496701 . Article ID 496701","DOI":"10.1155\/2013\/496701"},{"key":"257_CR2","doi-asserted-by":"crossref","unstructured":"H Farid, Image forgery detection, a survey. IEEE Signal Process. Mag. (2009)","DOI":"10.1109\/MSP.2008.931079"},{"key":"257_CR3","doi-asserted-by":"publisher","unstructured":"Muhammad Ali Qureshi, Mohamed Deriche, A bibliography of pixel-based blind image forgery detection techniques, In Signal Processing: Image Communication, Volume 39, Part A, 2015, Pages 46\u201374, , https:\/\/doi.org\/10.1016\/j.image.2015.08.008 .","DOI":"10.1016\/j.image.2015.08.008"},{"key":"257_CR4","doi-asserted-by":"publisher","unstructured":"C-T Li, X Lin, A fast source-oriented image clustering method for digital forensics. EURASIP J Image Video Proc 69 (2017) https:\/\/doi.org\/10.1186\/s13640-017-0217-y","DOI":"10.1186\/s13640-017-0217-y"},{"key":"257_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5206-8","volume-title":"Expose Noise Level Inconsistency Incorporating the Inhomogeneity Scoring Strategy, Article in Multimedia Tools and Applications","author":"H Yao","year":"2017","unstructured":"H Yao, F Cao, Z Tang, J Wang, T Qiao, Expose Noise Level Inconsistency Incorporating the Inhomogeneity Scoring Strategy, Article in Multimedia Tools and Applications (2017). https:\/\/doi.org\/10.1007\/s11042-017-5206-8"},{"key":"257_CR6","doi-asserted-by":"publisher","unstructured":"MM Isaac, M Wilscy, Multiscale local gabor phase quantization for image forgery detection. Multimedia Tools and Applications , 1\u201322 (2017) https:\/\/doi.org\/10.1007\/s11042-017-5189-5","DOI":"10.1007\/s11042-017-5189-5"},{"key":"257_CR7","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1016\/j.procs.2015.06.081","volume":"54","author":"AV Mire","year":"2015","unstructured":"AV Mire, SB Dhok, NJ Mistry, PD Porey, Factor histogram based forgery localization in double compressed JPEG images. Procedia Comput Sci 54, 690\u2013696 (2015)","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"257_CR8","first-page":"154","volume":"4","author":"H Farid","year":"2009","unstructured":"H Farid, Exposing digital forgeries from JPEG ghosts, IEEE transactions on information forensics and security. Vol. 4(1), 154\u2013160 (2009)","journal-title":"Vol."},{"key":"257_CR9","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Z Lin, J He, X Tang, C-K Tang, Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition, Vol 42, 2492\u20132501 (2009)","journal-title":"Pattern Recognition, Vol"},{"issue":"3","key":"257_CR10","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"T Bianchi, A Piva, Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Transactions on Information Forensics Security 7(3), 1003\u20131017 (2012)","journal-title":"IEEE Transactions on Information Forensics Security"},{"key":"257_CR11","first-page":"2012","volume":"190","author":"XH Li","year":"2012","unstructured":"XH Li, YQ Zhao, M Liao, FY Shih, YQ Shi, Detection of the tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing 190, 2012 (2012)","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"257_CR12","doi-asserted-by":"publisher","unstructured":"I Amerini, R Becarelli, R Caldelli, A Del Mastio, Splicing forgeries localization through the use of first digit features. proceedings of IEEE International Workshop on Information Forensics and Security(WIFS),143-148 (2014). https:\/\/doi.org\/10.1109\/WIFS.2014.7084318","DOI":"10.1109\/WIFS.2014.7084318"},{"key":"257_CR13","doi-asserted-by":"publisher","unstructured":"Z Fan, RL de Queiroz, Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transaction on Image Processing, Vol 12(2), 230\u2013235 (2003). https:\/\/doi.org\/10.1109\/TIP.2002.807361","DOI":"10.1109\/TIP.2002.807361"},{"key":"257_CR14","doi-asserted-by":"crossref","unstructured":"W Luo, Z Qu, J Huang, G Qiu, A novel method for detecting cropped and recompressed image block. IEEE Int Conference Acoustics Speech Signal Proc (2007)","DOI":"10.1109\/ICASSP.2007.366211"},{"key":"257_CR15","volume-title":"A Generalized Benford\u2019s Law for JPEG Coefficients and its Applications in Image Forensics, SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents","author":"F Dongdong","year":"2007","unstructured":"Dongdong Fu, Yun Q. Shi, Wei Su. A Generalized Benford\u2019s Law for JPEG Coefficients and its Applications in Image Forensics, SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, 2007"},{"key":"257_CR16","first-page":"730","volume-title":"Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features","author":"B Li","year":"2008","unstructured":"B Li, YQ Shi, J Huang, Detecting Doubly Compressed JPEG Images by Using Mode Based First Digit Features (IEEE International Workshop on Multimedia Signal Processing, Queensland, 2008), pp. 730\u2013735"},{"key":"257_CR17","doi-asserted-by":"publisher","unstructured":"F Zhao, YU Zhenhua, S Li, Detecting double compressed JPEG images by using moment features of mode based DCT histograms. proceedings of 2010 International Conference on Multimedia Technology,1-4 (2010). https:\/\/doi.org\/10.1109\/ICMULT.2010.5631476","DOI":"10.1109\/ICMULT.2010.5631476"},{"key":"257_CR18","volume-title":"Detecting Doubly Compressed JPEG Images by Factor Histogram","author":"J Yang","year":"2011","unstructured":"J Yang, G Zhu, Detecting Doubly Compressed JPEG Images by Factor Histogram (Proceeding of APSIPA, ASC, 2011)"},{"key":"257_CR19","unstructured":"H Ghaffari-Hadigheh, GB Sulong, Annual Iranian mathematics conference (Hamedan, 2017)"},{"key":"257_CR20","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"M Barni, L Bondi, N Bonettini, P Bestagini, A Costanzo, M Maggini, B Tondi, S Tubaro, Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49, 153\u2013163 (2017) https:\/\/doi.org\/10.1016\/j.jvcir.2017.09.003","journal-title":"J. Vis. Commun. Image Represent."},{"key":"257_CR21","first-page":"551","volume":"78","author":"F Benford","year":"1938","unstructured":"F Benford, The law of anomalous numbers. Proc. Amer. Phil. Soc. 78, 551\u2013572 (1938)","journal-title":"Proc. Amer. Phil. Soc."},{"key":"257_CR22","unstructured":"J Lukas, J Fridrich, Estimation of primary quantization matrix in double compressed JPEG images. Proc Digital Forensic Res Workshop, 1\u201317 (2003)"},{"key":"257_CR23","doi-asserted-by":"crossref","unstructured":"D Zoran, Y Weiss, Scale invariance and noise in natural images. IEEE 12th Int Conference Comput Vision, 2209\u20132216 (2009)","DOI":"10.1109\/ICCV.2009.5459476"},{"key":"257_CR24","unstructured":"R Zhang, X-g YUJ Zhao, JY Liu, Symmetric Alpha Stable Distribution Model Application in Detecting Double JPEG Compression. Proc International Conference on Artificial Intelligence and Software Engineering(AISE2014), 462-467(2014)"},{"key":"257_CR25","unstructured":"M Nigrini, JT Wells, Benford\u2019s Law: Applications for Forensic Accounting, Auditing, and Fraud Detection,Wiley Publication, 19-21(2012)\u00a0ISBN: 978-1-118-15285-0\u00a0"},{"key":"257_CR26","doi-asserted-by":"crossref","unstructured":"G Schaefer, M Stich, UCID\u2014An Uncompressed Colour Image Database (Technical Report, School of Computing and Mathematics, Nottingham Trent University, U.K, 2003)","DOI":"10.1117\/12.525375"},{"key":"257_CR27","unstructured":"P. Sallee, Matlab JPEG toolbox 1.4, [online], Available: http:\/\/dde.binghamton.edu\/download\/jpeg_toolbox.zip"},{"key":"257_CR28","unstructured":"CASIA Tampered image detection evaluation database http :\/\/forensics. idealtest.org :8080\/ index_v2.htm"},{"key":"257_CR29","unstructured":"PIXLR online image editing tool. https:\/\/pixlr.com\/editor\/"}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0257-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-018-0257-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0257-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T02:25:36Z","timestamp":1570847136000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-018-0257-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,5]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["257"],"URL":"https:\/\/doi.org\/10.1186\/s13640-018-0257-y","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,5]]},"assertion":[{"value":"16 February 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"18"}}