{"id":"https://openalex.org/W1596915457","doi":"https://doi.org/10.1109/chinasip.2015.7230449","title":"Countering median filtering anti-forensics and performance evaluation of forensics against intentional attacks","display_name":"Countering median filtering anti-forensics and performance evaluation of forensics against intentional attacks","publication_year":2015,"publication_date":"2015-07-01","ids":{"openalex":"https://openalex.org/W1596915457","doi":"https://doi.org/10.1109/chinasip.2015.7230449","mag":"1596915457"},"language":"en","primary_location":{"id":"doi:10.1109/chinasip.2015.7230449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/chinasip.2015.7230449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["School of Information Science &Technology, Sun Yat-Sen University","School of information Science and Technology, Sun Yat-sen University"],"affiliations":[{"raw_affiliation_string":"School of Information Science &Technology, Sun Yat-Sen University","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of information Science and Technology, Sun Yat-sen University","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006155598","display_name":"Tengfei Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tengfei Qin","raw_affiliation_strings":["School of Information Science &Technology, Sun Yat-Sen University","School of information Science and Technology, Sun Yat-sen University"],"affiliations":[{"raw_affiliation_string":"School of Information Science &Technology, Sun Yat-Sen University","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of information Science and Technology, Sun Yat-sen University","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021251327","display_name":"Hui Zeng","orcid":"https://orcid.org/0000-0002-3776-4309"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zeng","raw_affiliation_strings":["School of Information Science &Technology, Sun Yat-Sen University","School of information Science and Technology, Sun Yat-sen University"],"affiliations":[{"raw_affiliation_string":"School of Information Science &Technology, Sun Yat-Sen University","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of information Science and Technology, Sun Yat-sen University","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077333494"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.1841,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.55470504,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"483","last_page":"487"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.7138967514038086},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6856745481491089},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6507421135902405},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6424429416656494},{"id":"https://openalex.org/keywords/median-filter","display_name":"Median filter","score":0.5499743819236755},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.47606155276298523},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41744959354400635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3919588029384613},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3740352392196655},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.32739442586898804},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.311751127243042},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.2528619170188904}],"concepts":[{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.7138967514038086},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6856745481491089},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6507421135902405},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6424429416656494},{"id":"https://openalex.org/C55352655","wikidata":"https://www.wikidata.org/wiki/Q304247","display_name":"Median filter","level":4,"score":0.5499743819236755},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.47606155276298523},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41744959354400635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3919588029384613},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3740352392196655},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32739442586898804},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.311751127243042},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2528619170188904},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/chinasip.2015.7230449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/chinasip.2015.7230449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1515158941","https://openalex.org/W1546154723","https://openalex.org/W1969171557","https://openalex.org/W1972263025","https://openalex.org/W1973629749","https://openalex.org/W1979541363","https://openalex.org/W2000434686","https://openalex.org/W2016828421","https://openalex.org/W2017681265","https://openalex.org/W2019716459","https://openalex.org/W2081060147","https://openalex.org/W2096933452","https://openalex.org/W2123965969","https://openalex.org/W2133665775","https://openalex.org/W2148685281","https://openalex.org/W2155084545","https://openalex.org/W2159244236","https://openalex.org/W2160921722","https://openalex.org/W6630942332","https://openalex.org/W6632784814","https://openalex.org/W6642145819"],"related_works":["https://openalex.org/W2107628111","https://openalex.org/W2085033728","https://openalex.org/W4285411112","https://openalex.org/W2171299904","https://openalex.org/W2394004323","https://openalex.org/W1647606319","https://openalex.org/W2398764543","https://openalex.org/W2922442631","https://openalex.org/W4390494008","https://openalex.org/W2370426617"],"abstract_inverted_index":{"Median":[0],"filtering":[1,13,26,58],"forensics":[2],"and":[3,21,61],"its":[4,56,71],"anti-forensic":[5,22,27],"attack":[6,28,47],"have":[7],"received":[8],"considerable":[9],"attention":[10],"since":[11],"median":[12,25,57],"can":[14,62],"be":[15,63],"used":[16],"for":[17],"both":[18],"image":[19,39],"enhancement":[20],"purposes.":[23],"A":[24],"method":[29,48,120],"by":[30],"adding":[31,90],"uniformly":[32],"distributed":[33],"noise":[34,91],"was":[35],"proposed":[36],"in":[37,52,73,84,93],"an":[38],"pixel":[40,94],"domain.":[41],"However,":[42],"we":[43,87],"observe":[44],"that":[45,115],"this":[46,81],"leaves":[49],"visible":[50],"traces":[51],"the":[53,74,85,116,122,130],"histogram":[54,67],"of":[55,70,104],"residual":[59],"(MFR)":[60],"detected":[64],"using":[65],"a":[66,98],"bin":[68],"ratio":[69],"MFR":[72],"textured":[75],"area.":[76],"In":[77],"order":[78],"to":[79,89,96],"eliminate":[80],"trace":[82],"left":[83],"MFR,":[86],"propose":[88],"adaptively":[92],"domain":[95],"keep":[97],"constant":[99],"minimal":[100],"SNR.":[101],"The":[102],"performance":[103],"several":[105,111],"forensic":[106,119,132],"methods":[107],"are":[108],"evaluated":[109],"under":[110],"attacks,":[112],"it":[113],"shows":[114],"AR":[117],"(autoregressive)":[118],"has":[121],"most":[123],"robustness":[124],"against":[125],"intentional":[126],"attacks":[127],"compared":[128],"with":[129],"other":[131],"methods.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
