{"id":"https://openalex.org/W2221477732","doi":"https://doi.org/10.1109/lsp.2015.2507598","title":"Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk","display_name":"Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk","publication_year":2015,"publication_date":"2015-12-11","ids":{"openalex":"https://openalex.org/W2221477732","doi":"https://doi.org/10.1109/lsp.2015.2507598","mag":"2221477732"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2015.2507598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2015.2507598","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083368875","display_name":"Pawe\u0142 Korus","orcid":"https://orcid.org/0000-0002-4230-9853"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN","PL"],"is_corresponding":true,"raw_author_name":"Pawel Korus","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Department of Telecommunications, AGH University of Science and Technology, Krak\u00f3w, Poland","Shenzhen Key Laboratory of Media Security, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Department of Telecommunications, AGH University of Science and Technology, Krak\u00f3w, Poland","institution_ids":["https://openalex.org/I686019"]},{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Shenzhen, China","institution_ids":["https://openalex.org/I1302611135"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Shenzhen Key Laboratory of Media Security, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Shenzhen, China","institution_ids":["https://openalex.org/I1302611135"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083368875"],"corresponding_institution_ids":["https://openalex.org/I1302611135","https://openalex.org/I180726961","https://openalex.org/I686019"],"apc_list":null,"apc_paid":null,"fwci":1.4728,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.88342099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"23","issue":"1","first_page":"169","last_page":"173"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-walk","display_name":"Random walk","score":0.8313506841659546},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6659882068634033},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6017377972602844},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5186783075332642},{"id":"https://openalex.org/keywords/sliding-window-protocol","display_name":"Sliding window protocol","score":0.5169872045516968},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4693494737148285},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.46335768699645996},{"id":"https://openalex.org/keywords/principle-of-maximum-entropy","display_name":"Principle of maximum entropy","score":0.44902125000953674},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.42838799953460693},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.42368948459625244},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.41264641284942627},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3883513808250427},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36137181520462036},{"id":"https://openalex.org/keywords/window","display_name":"Window (computing)","score":0.2948322296142578},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.26990610361099243},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.20772042870521545},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09698808193206787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08555880188941956}],"concepts":[{"id":"https://openalex.org/C121194460","wikidata":"https://www.wikidata.org/wiki/Q856741","display_name":"Random walk","level":2,"score":0.8313506841659546},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6659882068634033},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6017377972602844},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5186783075332642},{"id":"https://openalex.org/C102392041","wikidata":"https://www.wikidata.org/wiki/Q592860","display_name":"Sliding window protocol","level":3,"score":0.5169872045516968},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4693494737148285},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.46335768699645996},{"id":"https://openalex.org/C9679016","wikidata":"https://www.wikidata.org/wiki/Q1417473","display_name":"Principle of maximum entropy","level":2,"score":0.44902125000953674},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.42838799953460693},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.42368948459625244},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.41264641284942627},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3883513808250427},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36137181520462036},{"id":"https://openalex.org/C2778751112","wikidata":"https://www.wikidata.org/wiki/Q835016","display_name":"Window (computing)","level":2,"score":0.2948322296142578},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26990610361099243},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.20772042870521545},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09698808193206787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08555880188941956},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2015.2507598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2015.2507598","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2589659186","display_name":null,"funder_award_id":"U1135001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3326952325","display_name":null,"funder_award_id":"61332012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1484985793","https://openalex.org/W1499007077","https://openalex.org/W1910102824","https://openalex.org/W1982445504","https://openalex.org/W2003398838","https://openalex.org/W2012629649","https://openalex.org/W2019064215","https://openalex.org/W2034556443","https://openalex.org/W2051353472","https://openalex.org/W2082008435","https://openalex.org/W2096754397","https://openalex.org/W2096933452","https://openalex.org/W2111280862","https://openalex.org/W2113137767","https://openalex.org/W2128446554","https://openalex.org/W2136116685","https://openalex.org/W2143516773","https://openalex.org/W2170343586","https://openalex.org/W2548302937","https://openalex.org/W6629898790","https://openalex.org/W6651062682","https://openalex.org/W6658926946","https://openalex.org/W6676669043"],"related_works":["https://openalex.org/W2181728705","https://openalex.org/W4238452393","https://openalex.org/W4247205791","https://openalex.org/W2167366752","https://openalex.org/W2489557937","https://openalex.org/W4283205458","https://openalex.org/W3002268218","https://openalex.org/W2385667210","https://openalex.org/W3001565613","https://openalex.org/W2558079263"],"abstract_inverted_index":{"In":[0],"this":[1,41],"paper":[2],"we":[3],"propose":[4],"to":[5],"use":[6],"maximal":[7],"entropy":[8],"random":[9,42],"walk":[10,43],"on":[11],"a":[12,34,81],"graph":[13],"for":[14,54],"tampering":[15],"localization":[16,38],"in":[17],"digital":[18],"image":[19],"forensics.":[20],"Our":[21,58],"approach":[22,79],"serves":[23],"as":[24],"an":[25],"additional":[26],"post-processing":[27],"step":[28],"after":[29],"conventional":[30],"sliding-window":[31],"analysis":[32],"with":[33,80],"forensic":[35],"detector.":[36],"Strong":[37],"property":[39],"of":[40],"will":[44],"highlight":[45],"important":[46],"regions":[47],"and":[48,74],"attenuate":[49],"the":[50,62,69,75],"background":[51],"-":[52],"even":[53],"noisy":[55],"response":[56],"maps.":[57],"evaluation":[59],"shows":[60],"that":[61],"proposed":[63,77],"method":[64],"can":[65],"significantly":[66],"outperform":[67],"both":[68],"commonly":[70],"used":[71],"threshold-based":[72],"decision,":[73],"recently":[76],"optimization-based":[78],"Markovian":[82],"prior.":[83]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
