{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T14:51:39Z","timestamp":1745851899486,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T00:00:00Z","timestamp":1533254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13640-018-0307-5","type":"journal-article","created":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T10:28:00Z","timestamp":1533292080000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure and efficient DRM watermark algorithm of forensics in mobile internet"],"prefix":"10.1186","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7875-4169","authenticated-orcid":false,"given":"Ma","family":"Zhaofeng","sequence":"first","affiliation":[]},{"given":"Jiang","family":"Ming","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,3]]},"reference":[{"key":"307_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/496701","volume":"2013","author":"A Piva","year":"2013","unstructured":"A Piva, An overview on image forensics. ISRN Signal Processing 2013, 1\u201322 (2013)","journal-title":"ISRN Signal Processing"},{"key":"307_CR2","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"MC Stamm","year":"2013","unstructured":"MC Stamm, M Wu, KJR Liu, Information forensics: an overview of the first decade. IEEE Access 1, 167\u2013200 (2013)","journal-title":"IEEE Access"},{"issue":"4","key":"307_CR3","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/TIFS.2011.2162830","volume":"6","author":"L Ozparlak","year":"2011","unstructured":"L Ozparlak, I Avcibas, Differentiating between images using wavelet-based transforms: a comparative study. IEEE Trans on Information Forensics and Security 6(4), 1418\u20131431 (2011)","journal-title":"IEEE Trans on Information Forensics and Security"},{"issue":"3\/4","key":"307_CR4","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.diin.2011.06.003","volume":"8","author":"H Farid","year":"2012","unstructured":"H Farid, MJ Bravo, Perceptual discrimination of computer generated and photographic faces. Digit. Investig. 8(3\/4), 226\u2013235 (2012)","journal-title":"Digit. Investig."},{"issue":"6","key":"307_CR5","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.jvcir.2014.04.010","volume":"25","author":"TY Chang","year":"2014","unstructured":"TY Chang, SC Tai, GS Lin, A passive multi-purpose scheme based on periodicity analysis of CFA artifacts for image forensics. J. Vis. Commun. Image Represent. 25(6), 1289\u20131298 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"1","key":"307_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdcf.2012010101","volume":"4","author":"P Fei","year":"2012","unstructured":"P Fei, L Juan, L Min, Identification of natural images and computer generated graphics based on hybrid features. International Journal of Digital Crime and Forensics 4(1), 1\u201316 (2012)","journal-title":"International Journal of Digital Crime and Forensics"},{"issue":"11","key":"307_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.cviu.2014.07.007","volume":"128","author":"X Wang","year":"2014","unstructured":"X Wang, L Yong, B Xu, et al., A statistical feature based approach to distinguish PRCG from photographs. Comput. Vis. Image Underst. 128(11), 84\u201393 (2014)","journal-title":"Comput. Vis. Image Underst."},{"issue":"2","key":"307_CR8","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1111\/1556-4029.12680","volume":"60","author":"P Fei","year":"2015","unstructured":"P Fei, L Jiaoting, L Min, Identification of natural images and computer-generated graphics based on statistical and textural features. J. Forensic Sci. 60(2), 435\u2013443 (2015)","journal-title":"J. Forensic Sci."},{"key":"307_CR9","first-page":"303","volume-title":"A hybrid feature based method for distinguishing computer graphics and photo-graphic image[G] \/\/LNCS 8398:Proc of the Int Workshop on Digital-Forensics and Watermarking 2013","author":"S Gao","year":"2013","unstructured":"S Gao, Z Cong, C Wu, et al., A hybrid feature based method for distinguishing computer graphics and photo-graphic image[G] \/\/LNCS 8398:Proc of the Int Workshop on Digital-Forensics and Watermarking 2013 (Springer, Berlin, 2013), pp. 303\u2013313"},{"issue":"11","key":"307_CR10","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1002\/sec.929","volume":"7","author":"L Zhaohong","year":"2014","unstructured":"L Zhaohong, Z Zhenzhen, YQ Shi, Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns. Security and Communication Networks 7(11), 2153\u20132159 (2014)","journal-title":"Security and Communication Networks"},{"key":"307_CR11","doi-asserted-by":"crossref","unstructured":"ALS Orozco, JR Corripio, LJG Villalba, et al., Image source acquisition identification of mobile devices based on the use of features. Multimedia Tools and Application 75(12), 7087\u20137111 (2016)","DOI":"10.1007\/s11042-015-2633-2"},{"key":"307_CR12","first-page":"1","volume-title":"Camera model identification framework using an ensemble of demosaicing features \/\/ Proc of the Int Workshop on Information Forensics and Security","author":"C Chen","year":"2015","unstructured":"C Chen, MC Stamm, Camera model identification framework using an ensemble of demosaicing features \/\/ Proc of the Int Workshop on Information Forensics and Security (IEEE, Piscataway, 2015), pp. 1\u20136"},{"key":"307_CR13","first-page":"57","volume-title":"Source camera idenfication using auto-white balance approximation \/\/ Proc of the Int Conf ono Computer Vision","author":"Z Deng","year":"2011","unstructured":"Z Deng, A Gijsenij, Z Jingyuan, Source camera idenfication using auto-white balance approximation \/\/ Proc of the Int Conf ono Computer Vision (IEEE, Piscataway, 2011), pp. 57\u201364"},{"key":"307_CR14","first-page":"1","volume-title":"Evaluation of IQM\u2019s Effectiveness for Cell Phone Identification Using Captured Videos and Images \/\/Proc of the Int Conf on Power, Control and Embedded System","author":"K Goyal","year":"2014","unstructured":"K Goyal, R Panwar, N Khanna, Evaluation of IQM\u2019s Effectiveness for Cell Phone Identification Using Captured Videos and Images \/\/Proc of the Int Conf on Power, Control and Embedded System (IEEE, Piscataway, 2014), pp. 1\u20136"},{"key":"307_CR15","first-page":"462","volume-title":"A robust feature for single image camera identification using local binary patterns \/\/ Proc of the IEEE Int Symp on Signal Processing and Information Technology","author":"F Razzazi","year":"2014","unstructured":"F Razzazi, Seyedadabi, A robust feature for single image camera identification using local binary patterns \/\/ Proc of the IEEE Int Symp on Signal Processing and Information Technology (IEEE, Piscataway, 2014), pp. 462\u2013467"},{"issue":"1","key":"307_CR16","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TIP.2013.2290596","volume":"23","author":"TH Thai","year":"2014","unstructured":"TH Thai, R Cogranne, F Retraint, Camera model identification based on the heteroscedastic noise model. IEEE Trans. Image Process. 23(1), 250\u2013263 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"307_CR17","first-page":"6744","volume-title":"Silhouette coefficient based approach on cell-phone classification for unknown source images \/\/Proc of the 2012 IEEE Int Conf on Communications","author":"L Shuhan","year":"2012","unstructured":"L Shuhan, X Kong, B Wang, et al., Silhouette coefficient based approach on cell-phone classification for unknown source images \/\/Proc of the 2012 IEEE Int Conf on Communications (IEEE, Piscataway, 2012), pp. 6744\u20136747"},{"key":"307_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-1-4614-0757-7_6","volume-title":"Sensor Defects in Digital Image Forensic","author":"J Fridrich","year":"2013","unstructured":"J Fridrich, Sensor Defects in Digital Image Forensic (Springer, Berlin, 2013), pp. 179\u2013218"},{"key":"307_CR19","first-page":"123","volume-title":"Mobile camera source identification with SVD \/\/ LNEE 313: Proc of the Int Joint Conf on Computer Information and Systems Sciences and Engineering","author":"AR Soobhany","year":"2015","unstructured":"AR Soobhany, KP Lam, P Fletcher, et al., Mobile camera source identification with SVD \/\/ LNEE 313: Proc of the Int Joint Conf on Computer Information and Systems Sciences and Engineering (Springer, Berlin, 2015), pp. 123\u2013131"},{"key":"307_CR20","volume-title":"Source digital camcorder identification using sensor photo response non-uniformity \/\/Proc of the 9th Conf on Security, Steganography, and Watermarking of Multimedia Contents IX","author":"C Mo","year":"2007","unstructured":"C Mo, J Fridrich, M Goljan, et al., Source digital camcorder identification using sensor photo response non-uniformity \/\/Proc of the 9th Conf on Security, Steganography, and Watermarking of Multimedia Contents IX (SPIE, San Francisco, 2007) 65051G\u201365051G-12"},{"issue":"3","key":"307_CR21","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/TIFS.2009.2026458","volume":"4","author":"G Hongmei","year":"2009","unstructured":"G Hongmei, A Swaminathan, M Wu, Intrinsic sensor noise features for forensic analysis on scanners and scanned images. IEEE Trans on Information Forensics and Security 4(3), 476\u2013491 (2009)","journal-title":"IEEE Trans on Information Forensics and Security"},{"issue":"3","key":"307_CR22","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","volume":"3","author":"B Mahdian","year":"2008","unstructured":"B Mahdian, S Saic, Blind authentication using periodic properties of interpolation. IEEE Transactions of Information Forensics and Security 3(3), 529\u2013538 (2008)","journal-title":"IEEE Transactions of Information Forensics and Security"},{"issue":"2","key":"307_CR23","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"AC Popescu, H Farid, Exposing digital forgeries by detecting traces of resampling. IEEE Transactioni on Signal Processing 53(2), 758\u2013767 (2005)","journal-title":"IEEE Transactioni on Signal Processing"},{"issue":"12","key":"307_CR24","first-page":"3108","volume":"28","author":"Z Zhen","year":"2008","unstructured":"Z Zhen, K Jiquan, P Xijian, Blind detection of image splicing based on image quality metrics and moment features. Journal of Computer Applications. 28(12), 3108\u20133111 (2008)","journal-title":"Journal of Computer Applications."},{"key":"307_CR25","first-page":"1","volume-title":"Proc.of International Conference on Pattern Recognition","author":"C Chen","year":"2008","unstructured":"C Chen, YQ Shi, S Wei, in Proc.of International Conference on Pattern Recognition. A machine learning based scheme for double JPEG compression detection (United states: Institute of Electrical and Electronics Engineers, Tampa, 2008), pp. 1\u201311"},{"key":"307_CR26","first-page":"217","volume-title":"Proc.of IEEE International Conference on Acoustics, Speech and Signal Processing","author":"W Luo","year":"2007","unstructured":"W Luo, Z Qu, J Huang, in Proc.of IEEE International Conference on Acoustics, Speech and Signal Processing. A novel method for detecting cropped and recompressed image block (Institute of Electrical and Electronics Engineers, Honolulu, 2007), pp. 217\u2013220"},{"issue":"1","key":"307_CR27","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"H Farid, Exposing digital forgeries from JPEG ghosts. IEEE Transactions on Information Forensics and Security 4(1), 154\u2013160 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"307_CR28","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1117\/1.2401138","volume":"15","author":"S Bayram","year":"2006","unstructured":"S Bayram, I Avcibas, B Sankur, Image manipulation detection. Journal of Electronic Imaging 15(4), 12\u201318 (2006)","journal-title":"Journal of Electronic Imaging"},{"key":"307_CR29","first-page":"118","volume-title":"Proc.of the International Society for Optical Engineering","author":"J Fridrich","year":"2009","unstructured":"J Fridrich, J Lukas, M Goljan, in Proc.of the International Society for Optical Engineering. Detecting digital image forgeries using sensor pattern noise (SPIE, San Jose, 2009), pp. 118\u2013126"},{"issue":"10","key":"307_CR30","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"A Popescu","year":"2005","unstructured":"A Popescu, H Farid, Exposing digital forgeries in color filter array interpolated images[J]. IEEE Transactions on Signal Processing. 53(10), 3948\u20133959 (2005)","journal-title":"IEEE Transactions on Signal Processing."},{"issue":"13","key":"307_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.ins.2012.01.014","volume":"195","author":"F Di Martino","year":"2012","unstructured":"F Di Martino, S Sessa, Fragile watermarking tamper detection with images compressed by fuzzy transform. Information Sciences 195(13), 62\u201390 (2012)","journal-title":"Information Sciences"},{"issue":"10","key":"307_CR32","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"62","author":"S Rawat","year":"2011","unstructured":"S Rawat, B Raman, A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications. 62(10), 840\u2013847 (2011)","journal-title":"AEU-International Journal of Electronics and Communications."},{"issue":"1","key":"307_CR33","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.measurement.2012.07.010","volume":"46","author":"RO Preda","year":"2013","unstructured":"RO Preda, Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1), 367\u2013373 (2013)","journal-title":"Measurement"},{"issue":"11","key":"307_CR34","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Z Lin, J He, X Tang, C-K Tang, Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42(11), 2492\u20132501 (2009)","journal-title":"Pattern Recognition"},{"issue":"2","key":"307_CR35","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0164-1212(02)00033-X","volume":"64","author":"H-C Wu","year":"2002","unstructured":"H-C Wu, C-C Chang, Detection and restoration of tampered JPEG compressed images. Journal of Systems and Software 64(2), 151\u2013161 (2002)","journal-title":"Journal of Systems and Software"}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0307-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-018-0307-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0307-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T19:03:54Z","timestamp":1564772634000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-018-0307-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,3]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["307"],"URL":"https:\/\/doi.org\/10.1186\/s13640-018-0307-5","relation":{},"ISSN":["1687-5281"],"issn-type":[{"type":"electronic","value":"1687-5281"}],"subject":[],"published":{"date-parts":[[2018,8,3]]},"assertion":[{"value":"19 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"69"}}