{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:15:55Z","timestamp":1761581755049},"reference-count":23,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>Digital image smoothing filtering operations, including the average filtering, Gaussian filtering and median filtering are always used to beautify the forged images. The detection of these smoothing operations is important in the image forensics field. In this article, the authors propose a universal detection algorithm which can simultaneously detect the average filtering, Gaussian low-pass filtering and median filtering. Firstly, the high-frequency residuals are used as being the feature extraction domain, and then the feature extraction is established on the local binary pattern (LBP) and the autoregressive model (AR). For the LBP model, the authors exploit that both of the relationships between the central pixel and its neighboring pixels and the relationships among the neighboring pixels are differentiated for the original images and smoothing filtered images. A method is further developed to reduce the high dimensionality of LBP-based features. Experimental results show that the proposed detector is effective in the smoothing forensics, and achieves better performance than the previous works, especially on the JPEG images.<\/jats:p>","DOI":"10.4018\/ijdcf.2019010102","type":"journal-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T20:19:21Z","timestamp":1539289161000},"page":"18-28","source":"Crossref","is-referenced-by-count":3,"title":["A Universal Image Forensics of Smoothing Filtering"],"prefix":"10.4018","volume":"11","author":[{"given":"Anjie","family":"Peng","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China & Guangdong Key Laboratories of Information Security Technology, Sun Yat-Sen University, Guangzhou China"}]},{"given":"Gao","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China"}]},{"given":"Yadong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China"}]},{"given":"Qiong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Data and Computer Science, Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[{"name":"School of Data and Computer Science, Sun Yat-Sen University, Guangzhou, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019010102-0","first-page":"1690","article-title":"Forensics aided steganalysis of heterogeneous images.","author":"M.Barni","year":"2010","journal-title":"Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing"},{"key":"IJDCF.2019010102-1","author":"P.Bas","year":"2006","journal-title":"Break Our Watermarking System"},{"key":"IJDCF.2019010102-2","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"IJDCF.2019010102-3","doi-asserted-by":"publisher","DOI":"10.1117\/1.2401138"},{"key":"IJDCF.2019010102-4","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583869"},{"issue":"3","key":"IJDCF.2019010102-5","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1961189.1961199","article-title":"LIBSVM: A library for support vector machines.","volume":"2","author":"C. C.Chang","year":"2011","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"IJDCF.2019010102-6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2277814"},{"key":"IJDCF.2019010102-7","unstructured":"Chen, C., Liaw, A., & Breiman, L. (2004). Using random forest to learn imbalanced data. Retrieved from http:\/\/www.stat.berkeley.edu\/~breiman\/RandomForests\/cc_software.htm"},{"key":"IJDCF.2019010102-8","article-title":"A novel method for detecting image sharpening based on local binary pattern.","author":"F.Ding","year":"2013","journal-title":"Proc. 12th Int. Workshop on Digital Forensics and Watermarking"},{"key":"IJDCF.2019010102-9","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2359033"},{"key":"IJDCF.2019010102-10","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2005.8"},{"key":"IJDCF.2019010102-11","first-page":"53","article-title":"Robust median filtering forensics based on the autoregressive model of median filter residual.","author":"X. G.Kang","year":"2012","journal-title":"Proc. of APSIPA annual submit conference"},{"key":"IJDCF.2019010102-12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2309054"},{"key":"IJDCF.2019010102-13","article-title":"Identification of various image operations using residual-based features.","author":"H. D.Li","year":"2016","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"IJDCF.2019010102-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.01.008"},{"key":"IJDCF.2019010102-15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"IJDCF.2019010102-16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"IJDCF.2019010102-17","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600941"},{"key":"IJDCF.2019010102-18","unstructured":"Rasmus Berg Palm. (2013). Neural network codes. Retrieved from https:\/\/github.com\/rasmusbergpalm\/DeepLearnToolbox\/tree\/master\/NN"},{"key":"IJDCF.2019010102-19","first-page":"472","article-title":"UCID-An uncompressed color image database.","author":"G.Schaefer","year":"2004","journal-title":"Proc. of SPIE, Storage and Retrieval Methods and Applications for Multimedia"},{"key":"IJDCF.2019010102-20","article-title":"Detecting median filtering via two-dimensional AR models of multiple filtered residuals.","author":"J.Yang","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"IJDCF.2019010102-21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2161761"},{"key":"IJDCF.2019010102-22","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2295858"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=215319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T08:14:08Z","timestamp":1651824848000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":23,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019010102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}