{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T10:10:01Z","timestamp":1751191801229,"version":"3.41.0"},"reference-count":27,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2018]]},"DOI":"10.1587\/transinf.2017mup0005","type":"journal-article","created":{"date-parts":[[2017,12,31]],"date-time":"2017-12-31T22:30:06Z","timestamp":1514759406000},"page":"13-19","source":"Crossref","is-referenced-by-count":5,"title":["Robust Image Identification without Visible Information for JPEG Images"],"prefix":"10.1587","volume":"E101.D","author":[{"given":"Kenta","family":"IIDA","sequence":"first","affiliation":[{"name":"Tokyo Metropolitan University"}]},{"given":"Hitoshi","family":"KIYA","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] R. Caldelli, R. Becarelli, and I. Amerini, \u201cImage origin classification based on social network provenance,\u201d IEEE Trans. Information Forensics and Security, vol.12, no.6, pp.1299-1308, June 2017. 10.1109\/tifs.2017.2656842","DOI":"10.1109\/TIFS.2017.2656842"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M. Moltisanti, A. Paratore, S. Battiato, and L. Saravo, \u201cImage manipulation on facebook for forensics evidence,\u201d Int&apos;l Conf. on Image Analysis and Processing, vol.9280, pp.506-517, 2015. 10.1007\/978-3-319-23234-8_47","DOI":"10.1007\/978-3-319-23234-8_47"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] J. Hiney, T. Dakve, K. Szczypiorski, and K. Gaj, \u201cUsing facebook for image steganography,\u201d Int&apos;l Conf. on Availability, Reliability and Security, pp.442-447, 2015. 10.1109\/ares.2015.20","DOI":"10.1109\/ARES.2015.20"},{"key":"4","unstructured":"[4] O. Giudice, A. Paratore, M. Moltisanti, and S. Battiato, \u201cA classification engine for image ballistics of social data,\u201d Computing Research Repository, vol.abs\/1610.06347, 2016."},{"key":"5","unstructured":"[5] T. Chuman, K. Iida, and H. Kiya, \u201cImage manipulation analysis on social networking service for encryption-then-compression systems,\u201d in IEICE Technical Report (Enriched Multimedia), vol.117, no.201, pp.1-6, Sept. 2017."},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] C.-Y. Lin and S.-F. Chang, \u201cA robust image authentication method distinguishing jpeg compression from malicious manipulation,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.11, no.2, pp.153-168, Feb. 2001. 10.1109\/76.905982","DOI":"10.1109\/76.905982"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] Z. Fan and R.L. de Queiroz, \u201cIdentification of bitmap compression history: Jpeg detection and quantizer estimation,\u201d IEEE Trans. Image Process., vol.12, no.2, pp.230-235, Feb. 2003. 10.1109\/tip.2002.807361","DOI":"10.1109\/TIP.2002.807361"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] D. Edmundson and G. Schaefer, \u201cAn overview and evaluation of jpeg compressed domain retrieval techniques,\u201d Proceedings ELMAR-2012, pp.75-78, Sept. 2012.","DOI":"10.1109\/ICSPCC.2012.6335725"},{"key":"9","unstructured":"[9] K. Cheng, N. Law, and W. Siu, \u201cA fast approach for identifying similar features in retrieval of jpeg and jpeg2000 images,\u201d Asia-Pacific Signal and Information Processing Association, Annual Summit and Conference, pp.258-261, Oct. 2009."},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] F. Arnia, I. Iizuka, M. Fujiyoshi, and H. Kiya, \u201cFast and robust identification methods for jpeg images with various compression ratios,\u201d IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, pp.II-397-II-400, May 2006. 10.1109\/icassp.2006.1660363","DOI":"10.1109\/ICASSP.2006.1660363"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] H. Kobayashi, S. Imaizumi, and H. Kiya, \u201cA robust identification scheme for jpeg xr images with various compression ratios,\u201d Pacific-Rim Symposium on Image and Video Technology, vol.9431, pp.38-50, 2015. 10.1007\/978-3-319-29451-3_4","DOI":"10.1007\/978-3-319-29451-3_4"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] T. Dobashi, O. Watanabe, T. Fukuhara, and H. Kiya, \u201cHash-based identification of jpeg 2000 images in encrypted domain,\u201d Intelligent Signal Processing and Communications Systems (ISPACS), International Symposium on, pp.469-472, 2012. 10.1109\/ispacs.2012.6473535","DOI":"10.1109\/ISPACS.2012.6473535"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] O. Watanabe, T. Iida, T. Fukuhara, and H. Kiya, \u201cIdentification of jpeg 2000 images in encrypted domain for digital cinema,\u201d IEEE International Conference on Image Processing (ICIP), pp.2065-2068, Nov. 2009. 10.1109\/icip.2009.5414285","DOI":"10.1109\/ICIP.2009.5414285"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] K. Iida and H. Kiya, \u201cSecure and robust identification based on fuzzy commitment scheme for jpeg images,\u201d IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp.1-5, June 2016. 10.1109\/bmsb.2016.7522001","DOI":"10.1109\/BMSB.2016.7522001"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] K. Iida and H. Kiya, \u201cFuzzy commitment scheme-based secure identification for jpeg images with various compression ratios,\u201d IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, vol.99, no.11, pp.1962-1970, 2016. 10.1587\/transfun.e99.a.1962","DOI":"10.1587\/transfun.E99.A.1962"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] K. Iida, H. Kobayashi, and H. Kiya, \u201cSecure identification based on fuzzy commitment scheme for jpeg xr images,\u201d European Signal Processing Conference (EUSIPCO), pp.968-972, Aug. 2016. 10.1109\/eusipco.2016.7760392","DOI":"10.1109\/EUSIPCO.2016.7760392"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] K. Iida and H. Kiya, \u201cCodestream level secure identification for jpeg 2000 images under various compression ratios,\u201d Asia-Pacific Signal and Information Processing Association, Annual Summit and Conference, pp.1-6, 2016. 10.1109\/apsipa.2016.7820726","DOI":"10.1109\/APSIPA.2016.7820726"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] Y. Li and P. Wang, \u201cRobust image hashing based on low-rank and sparse decomposition,\u201d International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2154-2158, March 2016. 10.1109\/icassp.2016.7472058","DOI":"10.1109\/ICASSP.2016.7472058"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] Y.N. Li, P. Wang, and Y.T. Su, \u201cRobust image hashing based on selective quaternion invariance,\u201d IEEE Signal Process. Lett., vol.22, no.12, pp.2396-2400, Dec. 2015. 10.1109\/lsp.2015.2487824","DOI":"10.1109\/LSP.2015.2487824"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] Z. Tang, X. Zhang, X. Li, and S. Zhang, \u201cRobust image hashing with ring partition and invariant vector distance,\u201d IEEE Trans. Inf. Forensics Security, vol.11, no.1, pp.200-214, Jan. 2016. 10.1109\/tifs.2015.2485163","DOI":"10.1109\/TIFS.2015.2485163"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] I. Ito and H. Kiya, \u201cOne-time key based phase scrambling for phase-only correlation between visually protected images,\u201d EURASIP Journal on Information Security, vol.2009, no.1, 2009. 10.1155\/2009\/841045","DOI":"10.1155\/2009\/841045"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] I. Ito and H. Kiya, \u201cA new class of image registration for guaranteeing secure data management,\u201d IEEE Int&apos;l Conf. on Image Processing (ICIP), pp.269-272, 2008. 10.1109\/icip.2008.4711743","DOI":"10.1109\/ICIP.2008.4711743"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] G. Schaefer and M. Stich, \u201cUcid: An uncompressed color image database,\u201d Electronic Imaging 2004, pp.472-480, 2003. 10.1117\/12.525375","DOI":"10.1117\/12.525375"},{"key":"24","unstructured":"[24] N. Gourier, D. Hall, and J.L. Crowley, \u201cEstimating face orientation from robust detection of salient facial structures,\u201d Int&apos;l Workshop on Visual Observation of Deictic Gestures, pp.1-9, 2004."},{"key":"25","unstructured":"[25] \u201cThe independent jpeg group software jpeg codec.\u201d http:\/\/www.ijg.org\/."},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] C.-Y. Wang, S.-M. Lee, and L.-W. Chang, \u201cDesigning jpeg quantization tables based on human visual system,\u201d Signal Processing: Image Communication, vol.16, no.5, pp.501-506, 2001. 10.1016\/s0923-5965(00)00012-6","DOI":"10.1016\/S0923-5965(00)00012-6"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] C. Iakovidou, N. Anagnostopoulos, A. Kapoutsis, Y. Boutalis, M. Lux, and S.A. Chatzichristofis, \u201cLocalizing global descriptors for content-based image retrieval,\u201d EURASIP Journal on Advances in Signal Processing, vol.2015, no.1, p.80, 2015. 10.1186\/s13634-015-0262-6","DOI":"10.1186\/s13634-015-0262-6"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/1\/E101.D_2017MUP0005\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T09:44:26Z","timestamp":1751190266000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/1\/E101.D_2017MUP0005\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2017mup0005","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2018]]}}}