{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:24:20Z","timestamp":1725621860395},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905134","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T08:17:16Z","timestamp":1472458636000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Improving JPEG Image Anti-forensics"],"prefix":"10.1145","author":[{"given":"Priya M.","family":"Shelke","sequence":"first","affiliation":[{"name":"Vishwakarma Institute of Information Technology, Pune, India"}]},{"given":"Rajesh S.","family":"Prasad","sequence":"additional","affiliation":[{"name":"N.B.N. Sinhgad school of Engineering, Pune, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/MSP.2008.931079"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1291233.1291252"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"e_1_3_2_1_4_1","volume-title":"Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on (pp. 1694--1697)","author":"Stamm M. C.","year":"2010","unstructured":"Stamm , M. C. , Tjoa , S. K. , Lin , W. S. , & Liu , K. R. ( 2010 , March). Anti-forensics of JPEG compression . In Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on (pp. 1694--1697) . IEEE. Stamm, M. C., Tjoa, S. K., Lin, W. S., & Liu, K. R. (2010, March). Anti-forensics of JPEG compression. In Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on (pp. 1694--1697). IEEE."},{"key":"e_1_3_2_1_5_1","volume-title":"Image Processing (ICIP), 2010 17th IEEE International Conference on (pp. 2109--2112)","author":"Stamm M. C.","year":"2010","unstructured":"Stamm , M. C. , Tjoa , S. K. , Lin , W. S. , & Liu , K. J. ( 2010 , September). Undetectable image tampering through JPEG compression anti-forensics . In Image Processing (ICIP), 2010 17th IEEE International Conference on (pp. 2109--2112) . IEEE. Stamm, M. C., Tjoa, S. K., Lin, W. S., & Liu, K. J. (2010, September). Undetectable image tampering through JPEG compression anti-forensics. In Image Processing (ICIP), 2010 17th IEEE International Conference on (pp. 2109--2112). IEEE."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/TIFS.2011.2119314"},{"key":"e_1_3_2_1_7_1","volume-title":"Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on (pp. 3058--3062)","author":"Fan W.","year":"2013","unstructured":"Fan , W. , Wang , K. , Cayre , F. , & Xiong , Z. ( 2013 , May). A variational approach to JPEG anti-forensics. In Acoustics , Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on (pp. 3058--3062) . IEEE. Fan, W., Wang, K., Cayre, F., & Xiong, Z. (2013, May). A variational approach to JPEG anti-forensics. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on (pp. 3058--3062). IEEE."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.jss.2013.12.043"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/TIP.2002.807361"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/TIFS.2014.2317949"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/TIFS.2008.2008214"},{"volume-title":"Information hiding (pp. 285--298)","author":"Lai S.","unstructured":"Lai , S. , & Bö \u00f6hme , R. (2011, May ). Countering counter-forensics: the case of JPEG compression . In Information hiding (pp. 285--298) . Springer Berlin Heidelberg . Lai, S., & Bö\u00f6hme, R. (2011, May). Countering counter-forensics: the case of JPEG compression. In Information hiding (pp. 285--298). Springer Berlin Heidelberg.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","volume-title":"Combating Anti-forensics of Jpeg Compression","author":"Qian Z.","year":"2012","unstructured":"Qian , Z. , & Zhang , X. ( 2012 ). Combating Anti-forensics of Jpeg Compression . Qian, Z., & Zhang, X. (2012). Combating Anti-forensics of Jpeg Compression."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/ICASSP.2011.5946874"},{"key":"e_1_3_2_1_15_1","volume-title":"Image Processing (ICIP), 2011 18th IEEE International Conference on (pp. 1949--1952)","author":"Valenzise G.","year":"2011","unstructured":"Valenzise , G. , Nobile , V. , Tagliasacchi , M. , & Tubaro , S. ( 2011 , September). Countering JPEG anti-forensics . In Image Processing (ICIP), 2011 18th IEEE International Conference on (pp. 1949--1952) . IEEE. Valenzise, G., Nobile, V., Tagliasacchi, M., & Tubaro, S. (2011, September). Countering JPEG anti-forensics. In Image Processing (ICIP), 2011 18th IEEE International Conference on (pp. 1949--1952). IEEE."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/TIFS.2012.2234117"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1016\/0167-2789(92)90242-F"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/83.869177"},{"volume-title":"Electronic Imaging 2004 (pp. 472--480)","author":"Schaefer G.","unstructured":"Schaefer , G. , & Stich , M. (2003 , December). UCID: an uncompressed color image database . In Electronic Imaging 2004 (pp. 472--480) . International Society for Optics and Photonics . Schaefer, G., & Stich, M. (2003, December). UCID: an uncompressed color image database. In Electronic Imaging 2004 (pp. 472--480). International Society for Optics and Photonics.","key":"e_1_3_2_1_19_1"}],"event":{"acronym":"ICTCS '16","name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T23:43:08Z","timestamp":1673566988000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":19,"alternative-id":["10.1145\/2905055.2905134","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905134","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}