{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:23:46Z","timestamp":1730316226878,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","funder":[{"name":"Ministry of the Interior of the Czech Republic","award":["MVCR VG20102013064"]},{"DOI":"10.13039\/501100001824","name":"Czech Science Foundation","doi-asserted-by":"publisher","award":["GACR P202\/10\/P509GACR 102\/08\/0470"],"id":[{"id":"10.13039\/501100001824","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,26]]},"DOI":"10.1145\/2093698.2093874","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Image tampering detection using methods based on JPEG compression artifacts"],"prefix":"10.1145","author":[{"given":"Babak","family":"Mahdian","sequence":"first","affiliation":[{"name":"Institute of Information Theory and Automation of the ASCR, Pod Vodarenskou vezi, Prague, Czech Republic"}]},{"given":"Stanislav","family":"Saic","sequence":"additional","affiliation":[{"name":"Institute of Information Theory and Automation of the ASCR, Pod Vodarenskou vezi, Prague, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2011,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2010.05.003"},{"key":"e_1_3_2_1_2_1","volume-title":"Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia","author":"Sencar H. T.","year":"2004","unstructured":"H. T. Sencar , M. Ramkumar , and A. N. Akansu , Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia . Orlando, FL, USA : Academic Press , Inc., 2004 . H. T. Sencar, M. Ramkumar, and A. N. Akansu, Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia. Orlando, FL, USA: Academic Press, Inc., 2004."},{"key":"e_1_3_2_1_3_1","volume-title":"Multimedia Data Hiding","author":"Wu M.","year":"2002","unstructured":"M. Wu and B. Liu , Multimedia Data Hiding . Secaucus, NJ, USA : Springer-Verlag New York , Inc., 2002 . M. Wu and B. Liu, Multimedia Data Hiding. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"A robust content based digital signature for image authentication,\" in IEEE International Conference on Image Processing (ICIP'96)","author":"Schneider M.","year":"1996","unstructured":"M. Schneider and S. F. Chang , \" A robust content based digital signature for image authentication,\" in IEEE International Conference on Image Processing (ICIP'96) , 1996 . {Online}. Available: citeseer.ist.psu.edu\/schneider96robust.html M. Schneider and S. F. Chang, \"A robust content based digital signature for image authentication,\" in IEEE International Conference on Image Processing (ICIP'96), 1996. {Online}. Available: citeseer.ist.psu.edu\/schneider96robust.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232464"},{"key":"e_1_3_2_1_6_1","volume-title":"Techniques and Applications of Digital Watermarking and Content Protection","author":"Arnold M.","year":"2003","unstructured":"M. Arnold , M. Schmucker , and S. D. Wolthusen , Techniques and Applications of Digital Watermarking and Content Protection . Norwood, MA, USA : Artech House , Inc., 2003 . M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. Norwood, MA, USA: Artech House, Inc., 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00017-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.922456"},{"key":"e_1_3_2_1_9_1","volume-title":"UK","author":"Mahdian B.","year":"2009","unstructured":"B. Mahdian and S. Saic , \" Detecting double compressed jpeg images,\" in The 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP-09), London , UK , December 2009 . B. Mahdian and S. Saic, \"Detecting double compressed jpeg images,\" in The 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP-09), London, UK, December 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Y.-L. Chen and C.-T. Hsu \"Detecting doubly compressed images based on quantization noise model and image restoration \" in IEEE Workshop on Multimedia Signal Processing 2009. Y.-L. Chen and C.-T. Hsu \"Detecting doubly compressed images based on quantization noise model and image restoration \" in IEEE Workshop on Multimedia Signal Processing 2009.","DOI":"10.1109\/MMSP.2009.5293280"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.807361"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"e_1_3_2_1_13_1","volume-title":"Jpeg recompression detection,\" in SPIE Conference on Media Forensics and Security","author":"Feng X.","year":"2010","unstructured":"X. Feng and G. Doerr , \" Jpeg recompression detection,\" in SPIE Conference on Media Forensics and Security , 2010 . X. Feng and G. Doerr, \"Jpeg recompression detection,\" in SPIE Conference on Media Forensics and Security, 2010."},{"key":"e_1_3_2_1_14_1","volume-title":"USA","author":"Fridrich J.","year":"2003","unstructured":"J. Fridrich and J. Lukas , \" Estimation of primary quantization matrix in double compressed jpeg images,\" in Proceedings of DFRWS, vol. 2, Cleveland, OH , USA , August 2003 . J. Fridrich and J. Lukas, \"Estimation of primary quantization matrix in double compressed jpeg images,\" in Proceedings of DFRWS, vol. 2, Cleveland, OH, USA, August 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"USA","author":"Fu D.","year":"2007","unstructured":"D. Fu , Y. Q. Shi , and W. Su , \" A generalized benford's law for jpeg coefficients and its applications in image forensics,\" in SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA , USA , January 2007 . D. Fu, Y. Q. Shi, and W. Su, \"A generalized benford's law for jpeg coefficients and its applications in image forensics,\" in SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, January 2007."},{"key":"e_1_3_2_1_16_1","first-page":"217","volume-title":"Speech and Signal Processing","volume":"2","author":"Luo W.","year":"2007","unstructured":"W. Luo , Z. Qu , J. Huang , and G. Qiu , \" A novel method for detecting cropped and recompressed image block,\" in IEEE International Conference on Acoustics , Speech and Signal Processing , vol. 2 , Honolulu, HI, USA , April 2007 , pp. 217 -- 220 . W. Luo, Z. Qu, J. Huang, and G. Qiu, \"A novel method for detecting cropped and recompressed image block,\" in IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, Honolulu, HI, USA, April 2007, pp. 217--220."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.864171"},{"key":"e_1_3_2_1_19_1","first-page":"4244","volume-title":"Speech and Signal Processing","author":"Qu Z.","year":"2008","unstructured":"Z. Qu , W. Luo , and J. Huang , \" A convolutive mixing model for shifted double jpeg compression with application to passive image authentication,\" in IEEE International Conference on Acoustics , Speech and Signal Processing , Las Vegas, USA , April 2008 , pp. 4244 -- 1483 . Z. Qu, W. Luo, and J. Huang, \"A convolutive mixing model for shifted double jpeg compression with application to passive image authentication,\" in IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, USA, April 2008, pp. 4244--1483."}],"event":{"name":"ISABEL '11: International Symposium on Applied Sciences in Biomedical and Communication Technologies","sponsor":["Universitat Pompeu Fabra","IEEE","Technical University of Catalonia Spain Technical University of Catalonia (UPC), Spain","River Publishers River Publishers","CTTC Technological Center for Telecommunications of Catalonia","CTIF Kyranova Ltd, Center for TeleInFrastruktur"],"location":"Barcelona Spain","acronym":"ISABEL '11"},"container-title":["Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2093698.2093874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T23:30:32Z","timestamp":1673566232000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2093698.2093874"}},"subtitle":["a real-life experiment"],"short-title":[],"issued":{"date-parts":[[2011,10,26]]},"references-count":18,"alternative-id":["10.1145\/2093698.2093874","10.1145\/2093698"],"URL":"https:\/\/doi.org\/10.1145\/2093698.2093874","relation":{},"subject":[],"published":{"date-parts":[[2011,10,26]]},"assertion":[{"value":"2011-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}