{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:56:15Z","timestamp":1740117375259,"version":"3.37.3"},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772549","61872448","U1736214","61602508","61601517"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2016YFB0801303","2016QY01W0105"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing: Image Communication"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1016\/j.image.2020.115956","type":"journal-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T15:46:28Z","timestamp":1595432788000},"page":"115956","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Thresholding binary coding for image forensics of weak sharpening"],"prefix":"10.1016","volume":"88","author":[{"given":"Ping","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chunfang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2007","series-title":"Digital Image Processing","author":"Gonzalez","key":"10.1016\/j.image.2020.115956_b1"},{"issue":"2","key":"10.1016\/j.image.2020.115956_b2","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/TIFS.2017.2752728","article-title":"Image forensics based on planar contact constraints of 3D objects","volume":"13","author":"Peng","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10.1016\/j.image.2020.115956_b3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2629646","article-title":"Exposing photo manipulation from shading and shadows","volume":"33","author":"Kee","year":"2014","journal-title":"ACM Trans. Graph."},{"issue":"5","key":"10.1016\/j.image.2020.115956_b4","doi-asserted-by":"crossref","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","article-title":"Image forgery localization via fine-grained analysis of CFA artifacts","volume":"7","author":"Ferrara","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.image.2020.115956_b5","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.eng.2018.02.008","article-title":"Recent advances in passive digital image security forensics: A brief review","volume":"4","author":"Lin","year":"2018","journal-title":"Engineering"},{"key":"10.1016\/j.image.2020.115956_b6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.image.2015.08.008","article-title":"A bibliography of pixel-based blind image forgery detection techniques","volume":"39","author":"Qureshi","year":"2015","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2020.115956_b7","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.jvcir.2018.05.020","article-title":"Blind forensics of image gamma transformation and its application in splicing detection","volume":"55","author":"Wang","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.image.2020.115956_b8","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.image.2018.02.001","article-title":"A novel contrast enhancement forensics based on convolutional neural networks","volume":"63","author":"Sun","year":"2018","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2020.115956_b9","series-title":"Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, ICME\u201909","first-page":"1026","article-title":"Detection of image sharpening based on histogram aberration and ringing artifacts","author":"Cao","year":"2009"},{"issue":"10","key":"10.1016\/j.image.2020.115956_b10","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/LSP.2011.2164791","article-title":"Unsharp masking sharpening detection via overshoot artifacts analysis","volume":"18","author":"Cao","year":"2011","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.image.2020.115956_b11","series-title":"Digital-Forensics and Watermarking - 12th International Workshop, IWDW 2013, Auckland, New Zealand, October (2013) 1-4. Revised Selected Papers","first-page":"180","article-title":"A novel method for detecting image sharpening based on local binary pattern","volume":"vol. 8389","author":"Ding","year":"2013"},{"issue":"3","key":"10.1016\/j.image.2020.115956_b12","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/LSP.2014.2359033","article-title":"Edge perpendicular binary coding for USM sharpening detection","volume":"22","author":"Ding","year":"2015","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.image.2020.115956_b13","series-title":"Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Tokyo, Japan, October (2015) 7-10, Revised Selected Papers","first-page":"72","article-title":"An advanced texture analysis method for image sharpening detection","volume":"vol. 9569","author":"Ding","year":"2015"},{"key":"10.1016\/j.image.2020.115956_b14","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jvcir.2017.11.009","article-title":"An efficient weak sharpening detection method for image forensics","volume":"50","author":"Ding","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.image.2020.115956_b15","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.image.2018.04.016","article-title":"Detecting USM image sharpening by using CNN","volume":"68","author":"Ye","year":"2018","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2020.115956_b16","doi-asserted-by":"crossref","first-page":"28525","DOI":"10.1109\/ACCESS.2019.2897761","article-title":"Median filtering forensics using multiple models in residual domain","volume":"7","author":"Peng","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.image.2020.115956_b17","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.image.2017.07.004","article-title":"Blur kernel estimation via salient edges and low rank prior for blind image deblurring","volume":"58","author":"Dong","year":"2017","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2020.115956_b18","doi-asserted-by":"crossref","DOI":"10.1155\/2017\/7130491","article-title":"Revealing traces of image resampling and resampling antiforensics","volume":"2017","author":"Peng","year":"2017","journal-title":"Adv. Multimedia"},{"issue":"5","key":"10.1016\/j.image.2020.115956_b19","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1109\/TIFS.2018.2871751","article-title":"Counter JPEG anti-forensic approach based on the second-order statistical analysis","volume":"14","author":"Singh","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.image.2020.115956_b20","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.image.2018.02.011","article-title":"Parameter estimation of image gamma transformation based on zero-value histogram bin locations","volume":"64","author":"Wang","year":"2018","journal-title":"Signal Process., Image Commun."},{"issue":"9","key":"10.1016\/j.image.2020.115956_b21","doi-asserted-by":"crossref","first-page":"2115","DOI":"10.1109\/TIFS.2017.2699638","article-title":"A random matrix approach to the forensic analysis of upscaled images","volume":"12","author":"Vazquez-Padin","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.image.2020.115956_b22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCSVT.2019.2935508","article-title":"Meteor: Measurable energy map toward the estimation of resampling rate via a convolutional neural network","author":"Ding","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"10.1016\/j.image.2020.115956_b23","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","article-title":"Multiresolution gray scale and rotation invariant texture classification with local binary patterns","volume":"24","author":"Ojala","year":"2002","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.image.2020.115956_b24","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","article-title":"The use of multiple measurements in taxonomic problems","volume":"7","author":"Fisher","year":"1936","journal-title":"Ann. Eugen."},{"issue":"2","key":"10.1016\/j.image.2020.115956_b25","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","article-title":"Ensemble classifiers for steganalysis of digital media","volume":"7","author":"Kodovsk\u00fd","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.image.2020.115956_b26","first-page":"27:1","article-title":"LIBSVM: a library for support vector machines","volume":"2","author":"Chang","year":"2011","journal-title":"ACM Trans. Interlligent Syst. Technol. (TIST)"},{"issue":"5","key":"10.1016\/j.image.2020.115956_b27","doi-asserted-by":"crossref","first-page":"1242","DOI":"10.1109\/TIFS.2017.2780805","article-title":"New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.image.2020.115956_b28","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.image.2020.115956_b29","series-title":"SPIE 6812","first-page":"1","article-title":"Adaptive directional sharpening with overshoot control","volume":"vol. 6812","author":"Bruna","year":"2008"},{"issue":"1","key":"10.1016\/j.image.2020.115956_b30","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TCSVT.2016.2599849","article-title":"Identification of various image operations using residual-based features","volume":"28","author":"Li","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"10.1016\/j.image.2020.115956_b31","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1002\/sec.1094","article-title":"Digital image steganalysis based on local textural features and double dimensionality reduction","volume":"9","author":"Li","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.image.2020.115956_b32","series-title":"Information Hiding","first-page":"59","article-title":"Break our steganographic system: The ins and outs of organizing BOSS","volume":"vol. 6958\/2011","author":"Bas","year":"2011"},{"key":"10.1016\/j.image.2020.115956_b33","series-title":"Proceedings of the 6th ACM Multimedia Systems Conference, MMSys 2015","first-page":"219","article-title":"RAISE: a raw images dataset for digital image forensics","author":"Dang-Nguyen","year":"2015"},{"issue":"7","key":"10.1016\/j.image.2020.115956_b34","doi-asserted-by":"crossref","first-page":"121","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-121","article-title":"Steganalyzing images of arbitrary size with CNNs","volume":"2018","author":"Tsang","year":"2018","journal-title":"Electron. Imaging"}],"container-title":["Signal Processing: Image Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596520301363?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596520301363?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:13:21Z","timestamp":1667520801000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0923596520301363"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":34,"alternative-id":["S0923596520301363"],"URL":"https:\/\/doi.org\/10.1016\/j.image.2020.115956","relation":{},"ISSN":["0923-5965"],"issn-type":[{"type":"print","value":"0923-5965"}],"subject":[],"published":{"date-parts":[[2020,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Thresholding binary coding for image forensics of weak sharpening","name":"articletitle","label":"Article Title"},{"value":"Signal Processing: Image Communication","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.image.2020.115956","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"115956"}}