{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T20:30:30Z","timestamp":1721161830173},"reference-count":21,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2019,1,1]]},"DOI":"10.1587\/transinf.2018mup0007","type":"journal-article","created":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T17:35:13Z","timestamp":1546277713000},"page":"2-10","source":"Crossref","is-referenced-by-count":7,"title":["Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images"],"prefix":"10.1587","volume":"E102.D","author":[{"given":"Kenta","family":"IIDA","sequence":"first","affiliation":[{"name":"Tokyo Metropolitan University"}]},{"given":"Hitoshi","family":"KIYA","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] R. Caldelli, R. Becarelli, and I. Amerini, \u201cImage origin classification based on social network provenance,\u201d IEEE Trans. Inf. Forensics Security, vol.12, no.6, pp.1299-1308, June 2017. 10.1109\/tifs.2017.2656842","DOI":"10.1109\/TIFS.2017.2656842"},{"key":"2","unstructured":"[2] O. Giudice, A. Paratore, M. Moltisanti, and S. Battiato, \u201cA classification engine for image ballistics of social data,\u201d Computing Research Repository, vol.abs\/1610.06347, 2016. 10.1007\/978-3-319-68548-9_57"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] T. Chuman, K. Iida, and H. Kiya, \u201cImage manipulation on social media for encryption-then-compression systems,\u201d Proc. APSIPA Annual Summit and Conference, pp.858-863, 2017. 10.1109\/apsipa.2017.8282153","DOI":"10.1109\/APSIPA.2017.8282153"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] C.Y. Lin and S.F. Chang, \u201cA robust image authentication method distinguishing jpeg compression from malicious manipulation,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.11, no.2, pp.153-168, Feb. 2001. 10.1109\/76.905982","DOI":"10.1109\/76.905982"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] Z. Fan and R.L. de Queiroz, \u201cIdentification of bitmap compression history: Jpeg detection and quantizer estimation,\u201d IEEE Trans. Image Process., vol.12, no.2, pp.230-235, Feb. 2003. 10.1109\/tip.2002.807361","DOI":"10.1109\/TIP.2002.807361"},{"key":"6","unstructured":"[6] K.O. Cheng, N.F. Law, and W.C. Siu, \u201cA fast approach for identifying similar features in retrieval of jpeg and jpeg2000 images,\u201d Proc. APSIPA Annual Summit and Conference, pp.258-261, 2009."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] F. Arnia, I. Iizuka, M. Fujiyoshi, and H. Kiya, \u201cFast and robust identification methods for jpeg images with various compression ratios,\u201d Proc. IEEE Int&apos;l Conf. on Acoustics Speech Signal Process. Proceedings, pp.II-II, 2006. 10.1109\/icassp.2006.1660363","DOI":"10.1109\/ICASSP.2006.1660363"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] K. Iida and H. Kiya, \u201cFuzzy commitment scheme-based secure identification for jpeg images with various compression ratios,\u201d IEICE Trans. Fundamentals, vol.E99-A, no.11, pp.1962-1970, Nov. 2016. 10.1587\/transfun.e99.a.1962","DOI":"10.1587\/transfun.E99.A.1962"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] K. Iida and H. Kiya, \u201cRobust image identification without visible information for jpeg images,\u201d IEICE Trans. Inf. &amp; Syst., vol.E101-D, no.1, pp.13-19, Jan. 2018. 10.1587\/transinf.2017mup0005","DOI":"10.1587\/transinf.2017MUP0005"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] K. Iida and H. Kiya, \u201cRobust image identification with secure features for jpeg images,\u201d Proc. IEEE Int&apos;l Conf. on Image Process., pp.4342-4346, 2017. 10.1109\/icip.2017.8297102","DOI":"10.1109\/ICIP.2017.8297102"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] K. Iida and H. Kiya, \u201cRobust image identification without any visible information for double-compressed jpeg images,\u201d Proc. APSIPA Annual Summit and Conference, pp.852-857, 2017. 10.1109\/apsipa.2017.8282152","DOI":"10.1109\/APSIPA.2017.8282152"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] C. Lakovidou, N. Anagnostopoulos, A. Kapoutsis, Y. Boutalis, M. Lux, and S.A. Chatzichristofis, \u201cLocalizing global descriptors for content-based image retrieval,\u201d EURASIP J. Advances in Signal Processing, vol.2015, no.1, p.80, 2015. 10.1186\/s13634-015-0262-6","DOI":"10.1186\/s13634-015-0262-6"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] Y. Li and P. Wang, \u201cRobust image hashing based on low-rank and sparse decomposition,\u201d Proc. IEEE Int&apos;l Conf. on Acoustics, Speech Signal Process., pp.2154-2158, 2016. 10.1109\/icassp.2016.7472058","DOI":"10.1109\/ICASSP.2016.7472058"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] Y.N. Li, P. Wang, and Y.T. Su, \u201cRobust image hashing based on selective quaternion invariance,\u201d IEEE Signal Process. Lett. , vol.22, no.12, pp.2396-2400, Dec. 2015. 10.1109\/lsp.2015.2487824","DOI":"10.1109\/LSP.2015.2487824"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] Y. Gong, S. Lazebnik, A. Gordo, and F. Perronnin, \u201cIterative quantization: A procrustean approach to learning binary codes for large-scale image retrieval,\u201d IEEE Trans. Pattern Anal. Mach. Intell., vol.35, no.12, pp.2916-2929, Dec. 2013. 10.1109\/tpami.2012.193","DOI":"10.1109\/TPAMI.2012.193"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] A. Oliva and A. Torralba, \u201cModeling the shape of the scene: A holistic representation of the spatial envelope,\u201d Int. J. Comput. Vis., vol.42, no.3, pp.145-175, May 2001. 10.1023\/a:1011139631724","DOI":"10.1023\/A:1011139631724"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] F. Huang, J. Huang, and Y.Q. Shi, \u201cDetecting double jpeg compression with the same quantization matrix,\u201d IEEE Trans. Inf. Forensics Security, vol.5, no.4, pp.848-856, Dec. 2010. 10.1109\/tifs.2010.2072921","DOI":"10.1109\/TIFS.2010.2072921"},{"key":"18","unstructured":"[18] \u201cThe independent jpeg group software jpeg codec.\u201d http:\/\/www.ijg.org\/."},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] G. Schaefer and M. Stich, \u201cUcid: An uncompressed color image database,\u201d Electronic Imaging 2004, pp.472-480, 2003. 10.1117\/12.525375","DOI":"10.1117\/12.525375"},{"key":"20","unstructured":"[20] \u201cUkbench dataset.\u201d https:\/\/archive.org\/details\/ukbench."},{"key":"21","unstructured":"[21] N. Gourier, D. Hall, and J.L. Crowley, \u201cEstimating face orientation from robust detection of salient facial structures,\u201d Proc. Int&apos;l Workshop on Visual Observation of Deictic Gestures, 2004."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/1\/E102.D_2018MUP0007\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T23:46:57Z","timestamp":1546645617000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/1\/E102.D_2018MUP0007\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2018mup0007","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,1]]}}}