{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T17:00:41Z","timestamp":1726419641021},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Forensic Science International: Digital Investigation"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.fsidi.2023.301515","type":"journal-article","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T19:05:58Z","timestamp":1675105558000},"page":"301515","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Benford's law applied to digital forensic analysis"],"prefix":"10.1016","volume":"45","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6026-4687","authenticated-orcid":false,"given":"Pedro","family":"Fernandes","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3448-6726","authenticated-orcid":false,"given":"M\u00e1rio","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.fsidi.2023.301515_bib1","series-title":"Benford's Law for Natural and Synthetic Images","first-page":"169","author":"del Acebo","year":"2005"},{"key":"10.1016\/j.fsidi.2023.301515_bib2","doi-asserted-by":"crossref","first-page":"209657","DOI":"10.1109\/ACCESS.2020.3036772","article-title":"IEEE access special section: digital forensics through multimedia source inference","volume":"8","author":"Amerini","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.fsidi.2023.301515_bib3","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1214\/aoms\/1177704477","article-title":"On the distribution of the two-sample cramer-von Mises criterion","volume":"33","author":"Anderson","year":"1962","journal-title":"Ann. Math. Stat."},{"year":"2015","series-title":"An Introduction to Benford's Law","author":"Arno Berger","key":"10.1016\/j.fsidi.2023.301515_bib4"},{"key":"10.1016\/j.fsidi.2023.301515_bib5","series-title":"2006 IEEE International Symposium on Information Theory","first-page":"436","article-title":"Compression-based image registration","author":"Bardera","year":"2006"},{"key":"10.1016\/j.fsidi.2023.301515_bib6","first-page":"268","volume":"vol. 160","author":"Bartlett","year":"1937"},{"key":"10.1016\/j.fsidi.2023.301515_bib7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/11-PS175","article-title":"A\u00a0basic theory of Benford's Law","volume":"8","author":"Berger","year":"2011","journal-title":"Probab. Surv."},{"key":"10.1016\/j.fsidi.2023.301515_bib8","doi-asserted-by":"crossref","first-page":"377","DOI":"10.2307\/2347111","article-title":"Algorithm AS 89: the upper tail probabilities of spearman's rho","volume":"24","author":"Best","year":"1975","journal-title":"Appl. Stat."},{"key":"10.1016\/j.fsidi.2023.301515_bib9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/BF02294183","article-title":"Sample size requirements for estimating pearson, kendall and spearman correlations","volume":"65","author":"Bonett","year":"2000","journal-title":"Psychometrika"},{"key":"10.1016\/j.fsidi.2023.301515_bib10","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/s10472-017-9564-8","article-title":"A\u00a0bayesian interpretation of the confusion matrix","volume":"81","author":"Caelen","year":"2017","journal-title":"Ann. Math. Artif. Intell."},{"year":"2013","series-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen","key":"10.1016\/j.fsidi.2023.301515_bib11"},{"key":"10.1016\/j.fsidi.2023.301515_bib12","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","article-title":"An algorithm for the machine calculation of complex fourier series","volume":"19","author":"Cooley","year":"1965","journal-title":"Math. Comput."},{"author":"Enisa","key":"10.1016\/j.fsidi.2023.301515_bib13"},{"key":"10.1016\/j.fsidi.2023.301515_bib14","series-title":"International Encyclopedia of Statistical Science","first-page":"1595","article-title":"Tests for homogeneity of variance","author":"Erjavec","year":"2011"},{"author":"Europol","key":"10.1016\/j.fsidi.2023.301515_bib15"},{"author":"Ferreira","key":"10.1016\/j.fsidi.2023.301515_bib16"},{"key":"10.1016\/j.fsidi.2023.301515_bib17","first-page":"102","article-title":"Exposing manipulated photos and videos in digital forensics analysis","volume":"7","author":"Ferreira","year":"2021","journal-title":"J.\u00a0Image."},{"author":"Gimp","key":"10.1016\/j.fsidi.2023.301515_bib18"},{"year":"2009","series-title":"Multivariate Data Analysis","author":"Hair","key":"10.1016\/j.fsidi.2023.301515_bib19"},{"key":"10.1016\/j.fsidi.2023.301515_bib20","first-page":"99","article-title":"Deepfakes: false pornography is here and the law cannot protect you","volume":"17","author":"Harris","year":"2019","journal-title":"Duke Law Technol. Rev."},{"key":"10.1016\/j.fsidi.2023.301515_bib21","article-title":"Base-invariance implies Benford's law","volume":"123","author":"Hill","year":"1995","journal-title":"Proc. Am. Math. Soc."},{"key":"10.1016\/j.fsidi.2023.301515_bib22","doi-asserted-by":"crossref","first-page":"19313","DOI":"10.1073\/pnas.1313476110","article-title":"Revised standards for statistical evidence","volume":"110","author":"Johnson","year":"2013","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"10.1016\/j.fsidi.2023.301515_bib23","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","article-title":"A\u00a0style-based generator architecture for generative adversarial networks","author":"Karras","year":"2019"},{"year":"2019","series-title":"This Person Does Not Exist","author":"Karras","key":"10.1016\/j.fsidi.2023.301515_bib24"},{"key":"10.1016\/j.fsidi.2023.301515_bib25","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1038\/nmeth.2698","article-title":"Significance, p values and t-tests","volume":"10","author":"Krzywinski","year":"2013","journal-title":"Nat. Methods"},{"key":"10.1016\/j.fsidi.2023.301515_bib26","doi-asserted-by":"crossref","first-page":"4364","DOI":"10.1109\/ACCESS.2020.3048246","article-title":"Digital image forensic approach to counter the JPEG anti-forensic attacks","volume":"9","author":"Kumar","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.fsidi.2023.301515_bib27","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0151235","article-title":"Assessing conformance with benford's law: goodness-of-fit tests and simultaneous confidence intervals","volume":"11","author":"Lesperance","year":"2016","journal-title":"PLoS One"},{"year":"2021","series-title":"Statistics for Managers","author":"Levine","key":"10.1016\/j.fsidi.2023.301515_bib28"},{"key":"10.1016\/j.fsidi.2023.301515_bib29","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S1005-8885(14)60320-4","article-title":"Exposing photo manipulation with inconsistent perspective geometry","volume":"21","author":"Li","year":"2014","journal-title":"J.\u00a0China Univ. Posts Telecommun."},{"key":"10.1016\/j.fsidi.2023.301515_bib30","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.eng.2018.02.008","article-title":"Recent advances in passive digital image security forensics: a brief review","volume":"4","author":"Lin","year":"2018","journal-title":"Engineering"},{"key":"10.1016\/j.fsidi.2023.301515_bib31","article-title":"A\u00a0machine learning-based forensic tool for image classification - a design science approach","volume":"38","author":"Mar-Raave","year":"2021","journal-title":"Forensic Sci. Int.: Digit. Invest."},{"key":"10.1016\/j.fsidi.2023.301515_bib32","first-page":"163","article-title":"Image forgery detection","author":"Meena","year":"2019","journal-title":"Survey Future Direct."},{"key":"10.1016\/j.fsidi.2023.301515_bib33","first-page":"46","article-title":"Tampering localization using divergence in generalized benford's model of first digit probability distribution in JPEG images","volume":"17","author":"Mire","year":"2022","journal-title":"J.\u00a0Informatic. Assurance Security."},{"key":"10.1016\/j.fsidi.2023.301515_bib34","series-title":"2019 Scientific Meeting on Electrical-Electronics & Biomedical Engineering and Computer Science (EBBT)","article-title":"A\u00a0new deep learning-based method to detection of copy-move forgery in digital images","author":"Muzaffer","year":"2019"},{"author":"Ng","key":"10.1016\/j.fsidi.2023.301515_bib35"},{"key":"10.1016\/j.fsidi.2023.301515_bib36","series-title":"2019 14th Iberian Conference on Information Systems and Technologies (CISTI)","article-title":"Benford's law and fraud detection in Portuguese enterprises","author":"Nunes","year":"2019"},{"key":"10.1016\/j.fsidi.2023.301515_bib37","series-title":"2021 29th European Signal Processing Conference (Eusipco)","article-title":"Lifting-based alternatives to the FFT for computing the 4-, 8-, and 16-point discrete fourier transforms","author":"Parfieniuk","year":"2021"},{"year":"2020","series-title":"A\u00a0Novel Forgery Detection Algorithm Based on Mantissa Distribution in Digital Images","author":"Parnak","key":"10.1016\/j.fsidi.2023.301515_bib38"},{"key":"10.1016\/j.fsidi.2023.301515_bib39","doi-asserted-by":"crossref","first-page":"626","DOI":"10.5829\/IJE.2022.35.04A.02","article-title":"A\u00a0novel image splicing detection algorithm based on generalized and traditional benford's law","volume":"35","author":"Parnak","year":"2022","journal-title":"Int. J. Eng."},{"key":"10.1016\/j.fsidi.2023.301515_bib40","doi-asserted-by":"crossref","first-page":"2890","DOI":"10.1109\/TIFS.2017.2725201","article-title":"Statistical detection of JPEG traces in digital images in uncompressed formats","volume":"12","author":"Pasquini","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"author":"Pedrini","key":"10.1016\/j.fsidi.2023.301515_bib41"},{"key":"10.1016\/j.fsidi.2023.301515_bib43","series-title":"2011 IEEE International Symposium of Circuits and Systems (ISCAS)","article-title":"Image forensic of glare feature for improving image retrieval using benford's law","author":"Qadir","year":"2011"},{"key":"10.1016\/j.fsidi.2023.301515_bib44","series-title":"2017 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","article-title":"UAE cybercrime law and cybercrimes \u2014 an analysis","author":"Rajan","year":"2017"},{"key":"10.1016\/j.fsidi.2023.301515_bib45","series-title":"2019 IEEE Conference on Information and Communication Technology","article-title":"DCT-CompCNN: a novel image classification network using JPEG compressed DCT coefficients","author":"Rajesh","year":"2019"},{"key":"10.1016\/j.fsidi.2023.301515_bib46","series-title":"Fast Fourier Transform - Algorithms and Applications","first-page":"5","article-title":"Discrete fourier transform","author":"Rao","year":"2010"},{"key":"10.1016\/j.fsidi.2023.301515_bib47","article-title":"Detection of anomaly in socio-economic databases, by benford probability law, in: 2020 IEEE 6th International Conference on Optimization and Applications (ICOA)","author":"Said","year":"2020","journal-title":"IEEE ASME Trans. Mechatron."},{"key":"10.1016\/j.fsidi.2023.301515_bib48","article-title":"Biometrics in forensic identification: applications and challenges","volume":"1","author":"Saini","year":"2016","journal-title":"J.\u00a0Forensic Med."},{"key":"10.1016\/j.fsidi.2023.301515_bib49","series-title":"2020 IEEE Applied Signal Processing Conference (ASPCON)","article-title":"Generalized benford's law for fake fingerprint detection","author":"Satapathy","year":"2020"},{"year":"2015","series-title":"Analysis of Benford's Law in Digital Image Forensics","author":"Singh","key":"10.1016\/j.fsidi.2023.301515_bib50"},{"author":"Sreenivasu","key":"10.1016\/j.fsidi.2023.301515_bib51"},{"year":"2012","series-title":"A\u00a0Proper Transform for Satisfying Benford's Law and its Application to Double JPEG Image Forensics","author":"Taimori","key":"10.1016\/j.fsidi.2023.301515_bib52"},{"key":"10.1016\/j.fsidi.2023.301515_bib53","doi-asserted-by":"crossref","DOI":"10.1016\/j.forsciint.2020.110311","article-title":"Recent advances in digital image manipulation detection techniques: a brief review","volume":"312","author":"Thakur","year":"2020","journal-title":"Forensic Sci. Int."},{"key":"10.1016\/j.fsidi.2023.301515_bib54","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.aci.2018.08.003","article-title":"Classification assessment methods","volume":"17","author":"Tharwat","year":"2020","journal-title":"Apll. Compute. Informatic."},{"key":"10.1016\/j.fsidi.2023.301515_bib55","series-title":"2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA)","article-title":"Analysing the concrete compressive strength using pearson and spearman","author":"Thirumalai","year":"2017"},{"author":"Unodc","key":"10.1016\/j.fsidi.2023.301515_bib56"},{"key":"10.1016\/j.fsidi.2023.301515_bib57","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s40574-020-00245-6","article-title":"Uniform distribution, benford's law and scale-invariance","volume":"13","author":"Vol\u010di\u010d","year":"2020","journal-title":"Boll. Unione Mat. Ital."},{"year":"2009","series-title":"Understanding Benford's Law and its Vulnerability in Image Forensics","author":"Wang","key":"10.1016\/j.fsidi.2023.301515_bib58"},{"year":"2015","series-title":"Passive Detection of Tampered JPEG Image Based on First Digit Statistics","author":"Wang","key":"10.1016\/j.fsidi.2023.301515_bib59"},{"key":"10.1016\/j.fsidi.2023.301515_bib60","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.ins.2020.10.028","article-title":"Black-box adversarial attacks by manipulating image attributes","volume":"550","author":"Wei","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.fsidi.2023.301515_bib61","series-title":"2016 IEEE International Conference on Image Processing","first-page":"161","article-title":"Coverage \u2014 a novel database for copy-move forgery detection","author":"Wen","year":"2016"},{"key":"10.1016\/j.fsidi.2023.301515_bib62","series-title":"Proceedings 15th International Conference on Pattern Recognition","first-page":"234","article-title":"Content based image retrieval using interest points and texture features","volume":"vol. 4","author":"Wolf","year":"2000"},{"key":"10.1016\/j.fsidi.2023.301515_bib63","doi-asserted-by":"crossref","DOI":"10.1007\/s11042-022-13151-0","article-title":"Joint manipulation trace attention network and adaptive fusion mechanism for image splicing forgery localization","author":"Wu","year":"2022","journal-title":"Multimed. Tool. Appl."},{"key":"10.1016\/j.fsidi.2023.301515_bib64","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.dsp.2015.03.014","article-title":"Estimating JPEG compression history of bitmaps based on factor histogram","volume":"41","author":"Yang","year":"2015","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.fsidi.2023.301515_bib65","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2020.102795","article-title":"Jpeg quantization step estimation with coefficient histogram and spectrum analyses","volume":"69","author":"Yao","year":"2020","journal-title":"J.\u00a0Vis. Commun. Image Represent."},{"key":"10.1016\/j.fsidi.2023.301515_bib66","series-title":"2009 16th International Conference on Digital Signal Processing","first-page":"1","article-title":"Image forensics using generalised benford's law for accurate detection of unknown jpeg compression in watermarked images","author":"Zhao","year":"2009"}],"container-title":["Forensic Science International: Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281723000161?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281723000161?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T13:56:46Z","timestamp":1719669406000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2666281723000161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":65,"alternative-id":["S2666281723000161"],"URL":"https:\/\/doi.org\/10.1016\/j.fsidi.2023.301515","relation":{},"ISSN":["2666-2817"],"issn-type":[{"type":"print","value":"2666-2817"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Benford's law applied to digital forensic analysis","name":"articletitle","label":"Article Title"},{"value":"Forensic Science International: Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.fsidi.2023.301515","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"301515"}}