{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:41:08Z","timestamp":1654116068968},"reference-count":16,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<p>With the growing awareness of the fraud case for digital images, the researchers have developed some forensic techniques that based on the intrinsic statistical history or trace left by the jpeg compression to determine an image's manipulation. Aiming at these forensic algorithms, special anti-forensic techniques was developed by removing footprints caused by jpeg compression. In this paper, the authors present an improved counter-forensic scheme that based on parameter adjustment. The simulation shows that by using the proposed strategy and combining the chaotic theory, the scheme can erase the quantization artifacts perfectly, even when the compression factor .<\/p>","DOI":"10.4018\/ijmcmc.2014040103","type":"journal-article","created":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T11:40:50Z","timestamp":1431949250000},"page":"22-32","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Counter-Forensic Algorithm to Erase the JPEG Compression Artifacts"],"prefix":"10.4018","volume":"6","author":[{"given":"Guorui","family":"Sheng","sequence":"first","affiliation":[{"name":"College of Information and Electric Engineering, LuDong University, YanTai, China"}]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[{"name":"Yantai Vocational College, Yantai, China"}]}],"member":"2432","reference":[{"key":"ijmcmc.2014040103-0","doi-asserted-by":"publisher","DOI":"10.1109\/83.730378"},{"key":"ijmcmc.2014040103-1","unstructured":"Dwivedi, V. (2010). JPEG Image Compression and Decompression with Modeling of DCT Coefficients on the Texas Instrument Video Processing Board TMS320DM6437 (Doctoral dissertation, California State University, Sacramento)."},{"key":"ijmcmc.2014040103-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.11.009"},{"key":"ijmcmc.2014040103-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2008214"},{"key":"ijmcmc.2014040103-4","doi-asserted-by":"publisher","DOI":"10.1109\/83.869177"},{"key":"ijmcmc.2014040103-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.03.025"},{"key":"ijmcmc.2014040103-6","first-page":"128","article-title":"Statistical tools for digital forensics.","year":"2005","journal-title":"International Symposium on Information Hiding"},{"key":"ijmcmc.2014040103-7","doi-asserted-by":"crossref","unstructured":"Potdar, V. M., Han, S., & Chang, E. (2005). A survey of digital image watermarking techniques. Industrial Informatics, 3rd IEEE International Conference on, Perth, WA, Australia(pp.709-716).","DOI":"10.1109\/INDIN.2005.1560462"},{"issue":"1","key":"ijmcmc.2014040103-8","first-page":"613","article-title":"A survey of watermarking algorithms for image authentication.","author":"DugelayReyc","year":"2002","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"ijmcmc.2014040103-9","unstructured":"Sallee, P. Matlab JPEG Toolbox. Retrieved from http:\/\/www.philsallee. com\/jpegtbx\/index.html"},{"key":"ijmcmc.2014040103-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2119314"},{"key":"ijmcmc.2014040103-11","article-title":"Anti-forensics of jpeg compression.","author":"M.Stamm","year":"2010","journal-title":"International Symposium on Acoustics Speech and Signal Processing"},{"key":"ijmcmc.2014040103-12","doi-asserted-by":"publisher","DOI":"10.4018\/jmcmc.2009040105"},{"key":"ijmcmc.2014040103-13","doi-asserted-by":"crossref","unstructured":"Weng, C. Y., Zhang, Y. H. & Lin, L. C. (2013). Visible watermarking images in high quality of data hiding, The Journal of Supercomputing, 66(02): 1033-1048.A. C.","DOI":"10.1007\/s11227-013-0969-9"},{"key":"ijmcmc.2014040103-14","first-page":"12","article-title":"Chang. Detecting digital image forgeries by measuring inconsistencies of blocking artifact.","author":"S.Ye","year":"2007","journal-title":"International Symposium on Multimedia and Expo"},{"key":"ijmcmc.2014040103-15","doi-asserted-by":"publisher","DOI":"10.4018\/jmcmc.2012040106"}],"container-title":["International Journal of Mobile Computing and Multimedia Communications"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=128998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:19:14Z","timestamp":1654114754000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijmcmc.2014040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijmcmc.2014040103","relation":{},"ISSN":["1937-9412","1937-9404"],"issn-type":[{"value":"1937-9412","type":"print"},{"value":"1937-9404","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}