{"id":"https://openalex.org/W91715781","doi":"https://doi.org/10.1007/978-3-642-40779-6_9","title":"Detecting Resized Double JPEG Compressed Images \u2013 Using Support Vector Machine","display_name":"Detecting Resized Double JPEG Compressed Images \u2013 Using Support Vector Machine","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W91715781","doi":"https://doi.org/10.1007/978-3-642-40779-6_9","mag":"91715781"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-40779-6_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-40779-6_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01492837","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110436523","display_name":"Hieu Cuong Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Hieu Cuong Nguyen","raw_affiliation_strings":["Computer Science Department, Darmstadt University of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Darmstadt University of Technology, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036400192","display_name":"Stefan Katzenbeisser","orcid":"https://orcid.org/0009-0005-3608-874X"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Katzenbeisser","raw_affiliation_strings":["Computer Science Department, Darmstadt University of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Darmstadt University of Technology, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110436523"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.4405,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.53632801,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"122"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13114","display_name":"Image Processing Techniques and Applications","score":0.9348000288009644,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.9156352281570435},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.8542603850364685},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7898502945899963},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7011812329292297},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6838748455047607},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.5102212429046631},{"id":"https://openalex.org/keywords/compression-artifact","display_name":"Compression artifact","score":0.4999699592590332},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.44004881381988525},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.3964471220970154},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.3092958629131317},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.27607256174087524}],"concepts":[{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.9156352281570435},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.8542603850364685},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7898502945899963},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7011812329292297},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6838748455047607},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.5102212429046631},{"id":"https://openalex.org/C57654395","wikidata":"https://www.wikidata.org/wiki/Q1097775","display_name":"Compression artifact","level":5,"score":0.4999699592590332},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.44004881381988525},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.3964471220970154},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3092958629131317},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.27607256174087524}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-40779-6_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-40779-6_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01492837v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01492837","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.113-122, &#x27E8;10.1007/978-3-642-40779-6_9&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01492837v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01492837","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.113-122, &#x27E8;10.1007/978-3-642-40779-6_9&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W168198616","https://openalex.org/W200526583","https://openalex.org/W1515615411","https://openalex.org/W1522320082","https://openalex.org/W1538635437","https://openalex.org/W1955437626","https://openalex.org/W1975528596","https://openalex.org/W1985729543","https://openalex.org/W2050991548","https://openalex.org/W2070040249","https://openalex.org/W2079238980","https://openalex.org/W2096933452","https://openalex.org/W2111280862","https://openalex.org/W2118090703","https://openalex.org/W2123889042","https://openalex.org/W2135480257","https://openalex.org/W2154708688","https://openalex.org/W2155180118","https://openalex.org/W2155319953","https://openalex.org/W2162156567","https://openalex.org/W2164990255","https://openalex.org/W2244535412","https://openalex.org/W2477455900","https://openalex.org/W2532188585","https://openalex.org/W2541429634","https://openalex.org/W4255023712"],"related_works":["https://openalex.org/W3190486427","https://openalex.org/W4243959093","https://openalex.org/W1998280942","https://openalex.org/W1992410481","https://openalex.org/W2441603424","https://openalex.org/W2026465795","https://openalex.org/W2145138541","https://openalex.org/W2132503095","https://openalex.org/W1996073382","https://openalex.org/W3137515556"],"abstract_inverted_index":{"Since":[0],"JPEG":[1,13,23,45,61,84,95,114,129],"is":[2,15,27,71],"the":[3,25,52,57,69,74,78,82],"most":[4,89],"widely":[5],"used":[6],"compression":[7,46,76,85,96],"standard,":[8],"detection":[9,58],"of":[10,59,81],"forgeries":[11],"in":[12],"images":[14,63,127,130,146],"necessary.":[16],"In":[17,103],"order":[18],"to":[19,43],"create":[20],"a":[21,31,108,139],"forged":[22],"image,":[24],"image":[26,70],"usually":[28],"loaded":[29],"into":[30],"photo":[32],"editing":[33],"software,":[34],"manipulated":[35],"and":[36,131,150],"then":[37,132],"re-saved":[38],"as":[39,138],"JPEG.":[40],"This":[41],"yields":[42],"double":[44,60,94,113],"artifacts,":[47],"which":[48],"can":[49,124],"possibly":[50],"reveal":[51],"forgery.":[53],"Many":[54],"techniques":[55,91],"for":[56,92,100,110],"compressed":[62,115],"have":[64],"been":[65],"proposed.":[66],"However,":[67],"when":[68],"resized":[72,112],"before":[73],"second":[75],"step,":[77],"blocking":[79],"artifacts":[80],"first":[83,120],"are":[86],"destroyed.":[87],"Therefore,":[88],"reported":[90],"detecting":[93,111],"do":[97],"not":[98],"work":[99],"this":[101,104],"case.":[102],"paper,":[105],"we":[106],"propose":[107],"technique":[109,156],"(called":[116],"RD-JPEG)":[117],"images.":[118],"We":[119],"identify":[121],"features":[122],"that":[123,154],"discriminate":[125],"RD-JPEG":[126,145],"from":[128],"use":[133],"Support":[134],"Vector":[135],"Machines":[136],"(SVM)":[137],"classification":[140],"tool.":[141],"Experiments":[142],"with":[143,147],"many":[144],"different":[148],"quality":[149],"scaling":[151],"factors":[152],"indicate":[153],"our":[155],"works":[157],"well.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
