{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:09:06Z","timestamp":1774721346360,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/eusipco.2018.8553259","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:36:41Z","timestamp":1543883801000},"page":"952-956","source":"Crossref","is-referenced-by-count":20,"title":["Anti-Forensics of JPEG Compression Using Generative Adversarial Networks"],"prefix":"10.23919","author":[{"given":"Yingmin","family":"Luo","sequence":"first","affiliation":[]},{"given":"Hanqi","family":"Zi","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"chintala","year":"2017","journal-title":"How to train a GAN? tips and tricks to make GANs work"},{"key":"ref11","first-page":"94090","article-title":"Deep learning for steganalysis via convolutional neural networks","volume":"9409","author":"qian","year":"2015","journal-title":"Proc SPIE Media Watermarking Secur Forensics Int Soc Opt Photon"},{"key":"ref12","author":"simonyan","year":"2014","journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCI.2016.2644865"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref16","first-page":"265","article-title":"TensorFlow: a system for large-scale machine learning","volume":"16","author":"abadi","year":"2016","journal-title":"OSDI"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","article-title":"Break our steganographic system: The ins and outs of organizing BOSS","author":"bas","year":"2011","journal-title":"Proc 13th Int Conf Information Hiding"},{"key":"ref18","year":"2007","journal-title":"The 2nd BOWS Contest (Break Our Watermarking System) was orgainise within the activity of the Water Marking Virtual Laboratory (Wavila) of the European Network of Excellence ECR YPT"},{"key":"ref19","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083249"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2119314"},{"key":"ref5","first-page":"1694","article-title":"Antiforensics of JPEG compression","author":"stamm","year":"2010","journal-title":"Proc of the IEEE Int Conf Acoust Speech and Signal Process"},{"key":"ref8","author":"ledig","year":"2016","journal-title":"Photo-realistic single image super-resolution using a generative adversarial network"},{"key":"ref7","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc of the Advances in Neural Information Processing System (NIPS)"},{"key":"ref2","first-page":"2006","article-title":"Digital image ballistics from JPEG quantization","author":"farid","year":"2006","journal-title":"Dept of Computer Science Dartmouth College"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TIP.2002.807361","article-title":"Identification of bitmap compression history: JPEG detection and quantizer estimation","volume":"12","author":"fan","year":"2003","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"}],"event":{"name":"2018 26th European Signal Processing Conference (EUSIPCO)","location":"Rome","start":{"date-parts":[[2018,9,3]]},"end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 26th European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537458\/8552938\/08553259.pdf?arnumber=8553259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:01:33Z","timestamp":1643252493000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8553259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/eusipco.2018.8553259","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}