{"id":"https://openalex.org/W2608998244","doi":"https://doi.org/10.1109/icpr.2016.7899773","title":"Exposing seam carving forgery under recompression attacks by hybrid large feature mining","display_name":"Exposing seam carving forgery under recompression attacks by hybrid large feature mining","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2608998244","doi":"https://doi.org/10.1109/icpr.2016.7899773","mag":"2608998244"},"language":"en","primary_location":{"id":"doi:10.1109/icpr.2016.7899773","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr.2016.7899773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 23rd International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100746642","display_name":"Qingzhong Liu","orcid":"https://orcid.org/0000-0002-2006-5413"},"institutions":[{"id":"https://openalex.org/I191429286","display_name":"Sam Houston State University","ror":"https://ror.org/00yh3cz06","country_code":"US","type":"education","lineage":["https://openalex.org/I191429286"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Qingzhong Liu","raw_affiliation_strings":["Department of Computer Science, Sam Houston State University, Huntsville, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Sam Houston State University, Huntsville, TX, USA","institution_ids":["https://openalex.org/I191429286"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100746642"],"corresponding_institution_ids":["https://openalex.org/I191429286"],"apc_list":null,"apc_paid":null,"fwci":0.668,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78812493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7541","issue":null,"first_page":"1041","last_page":"1046"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9488000273704529,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/seam-carving","display_name":"Seam carving","score":0.8518352508544922},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7868017554283142},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.7291750907897949},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6712616086006165},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6612051725387573},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.645176887512207},{"id":"https://openalex.org/keywords/carving","display_name":"Carving","score":0.6340793967247009},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5631545782089233},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.46238794922828674},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.404843807220459},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2171182632446289},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12403818964958191},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.09692502021789551}],"concepts":[{"id":"https://openalex.org/C23746413","wikidata":"https://www.wikidata.org/wiki/Q1141379","display_name":"Seam carving","level":3,"score":0.8518352508544922},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7868017554283142},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.7291750907897949},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6712616086006165},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6612051725387573},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.645176887512207},{"id":"https://openalex.org/C2777370761","wikidata":"https://www.wikidata.org/wiki/Q18448934","display_name":"Carving","level":2,"score":0.6340793967247009},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5631545782089233},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.46238794922828674},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.404843807220459},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2171182632446289},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12403818964958191},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.09692502021789551},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpr.2016.7899773","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr.2016.7899773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 23rd International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320328444","display_name":"Basque Center for Applied Mathematics","ror":"https://ror.org/03b21sh32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1825251438","https://openalex.org/W1875845630","https://openalex.org/W2009130368","https://openalex.org/W2015914089","https://openalex.org/W2018377917","https://openalex.org/W2022990190","https://openalex.org/W2036190666","https://openalex.org/W2050991548","https://openalex.org/W2060058048","https://openalex.org/W2061516452","https://openalex.org/W2087722740","https://openalex.org/W2088023168","https://openalex.org/W2123889042","https://openalex.org/W2124664712","https://openalex.org/W2130225759","https://openalex.org/W2142694135","https://openalex.org/W2155319953","https://openalex.org/W2161969291","https://openalex.org/W2535191283","https://openalex.org/W3137241515"],"related_works":["https://openalex.org/W2738811747","https://openalex.org/W1597187555","https://openalex.org/W2054672580","https://openalex.org/W2713906834","https://openalex.org/W2614249221","https://openalex.org/W2997133669","https://openalex.org/W2108294500","https://openalex.org/W1975188435","https://openalex.org/W1990754123","https://openalex.org/W1830945637"],"abstract_inverted_index":{"While":[0],"seam":[1,28,38],"carving":[2,39],"has":[3,47],"been":[4,24,49],"widely":[5],"used":[6,16,99],"in":[7,44],"computer":[8],"vision":[9],"and":[10,88,106],"multimedia":[11],"processing,":[12],"it":[13],"is":[14,98],"also":[15],"for":[17,118],"tampering":[18],"illusions.":[19],"Although":[20],"several":[21],"methods":[22],"have":[23],"proposed":[25,56,127],"to":[26,31,65,100,107,129],"detect":[27],"carving-based":[29],"forgery,":[30],"this":[32,53],"date,":[33],"the":[34,37,67,72,85,90,103,119,124,131,145],"detection":[35,63],"of":[36,126],"forgery":[40,133],"under":[41,76,134],"recompression":[42,77,135],"attacks":[43],"JPEG":[45,69,74],"images":[46,70,75],"not":[48],"explored.":[50],"To":[51],"fill":[52],"gap,":[54],"we":[55],"a":[57,139],"hybrid":[58],"large":[59],"scale":[60],"feature":[61],"mining-based":[62],"method":[64],"distinguish":[66],"doctored":[68],"from":[71,84,89,138],"untouched":[73],"attacks.":[78],"Over":[79],"one":[80],"hundred":[81],"thousand":[82],"features":[83],"spatial":[86],"domain":[87,93],"DCT":[91],"transform":[92],"are":[94],"extracted.":[95],"Ensemble":[96],"learning":[97,116],"deal":[101],"with":[102,113],"high":[104],"dimensionality":[105],"avoid":[108],"overfitting":[109],"that":[110],"may":[111],"occur":[112],"some":[114],"traditional":[115],"classifier":[117],"detection.":[120],"Our":[121],"study":[122],"demonstrates":[123],"efficacy":[125],"approach":[128],"exposing":[130],"seam-carving":[132],"attacks,":[136],"especially":[137],"lower":[140],"quality":[141,147],"level":[142],"or":[143],"on":[144],"same":[146],"recompression.":[148]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
