{"id":"https://openalex.org/W2049775825","doi":"https://doi.org/10.1145/2093698.2093874","title":"Image tampering detection using methods based on JPEG compression artifacts","display_name":"Image tampering detection using methods based on JPEG compression artifacts","publication_year":2011,"publication_date":"2011-10-26","ids":{"openalex":"https://openalex.org/W2049775825","doi":"https://doi.org/10.1145/2093698.2093874","mag":"2049775825"},"language":"en","primary_location":{"id":"doi:10.1145/2093698.2093874","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2093698.2093874","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://library.utia.cas.cz/separaty/2012/ZOI/mahdian-image tampering detection using methods based on jpeg aompression artifacts a real-life experiment.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056357559","display_name":"Babak Mahdian","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119419","display_name":"Czech Academy of Sciences, Institute of Information Theory and Automation","ror":"https://ror.org/03h1hsz49","country_code":"CZ","type":"facility","lineage":["https://openalex.org/I202391551","https://openalex.org/I4210119419"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Babak Mahdian","raw_affiliation_strings":["Institute of Information Theory and Automation of the ASCR, Pod Vodarenskou vezi, Prague, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Institute of Information Theory and Automation of the ASCR, Pod Vodarenskou vezi, Prague, Czech Republic","institution_ids":["https://openalex.org/I4210119419"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061980804","display_name":"Stanislav Saic","orcid":"https://orcid.org/0000-0002-8043-1841"},"institutions":[{"id":"https://openalex.org/I4210119419","display_name":"Czech Academy of Sciences, Institute of Information Theory and Automation","ror":"https://ror.org/03h1hsz49","country_code":"CZ","type":"facility","lineage":["https://openalex.org/I202391551","https://openalex.org/I4210119419"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Stanislav Saic","raw_affiliation_strings":["Institute of Information Theory and Automation of the ASCR, Pod Vodarenskou vezi, Prague, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Institute of Information Theory and Automation of the ASCR, Pod Vodarenskou vezi, Prague, Czech Republic","institution_ids":["https://openalex.org/I4210119419"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056357559"],"corresponding_institution_ids":["https://openalex.org/I4210119419"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.11492967,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9433000087738037,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.8533806800842285},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7978121042251587},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.7251893281936646},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.719512403011322},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6252027750015259},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.5371924042701721},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.5158254504203796},{"id":"https://openalex.org/keywords/compression-artifact","display_name":"Compression artifact","score":0.47943681478500366},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.45518937706947327},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4273568093776703},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.42683714628219604},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.4198344945907593},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.4197845458984375},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.41637828946113586},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.38738250732421875},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3519405126571655},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.31449612975120544},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.3111138641834259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07567957043647766}],"concepts":[{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.8533806800842285},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7978121042251587},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.7251893281936646},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.719512403011322},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6252027750015259},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.5371924042701721},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.5158254504203796},{"id":"https://openalex.org/C57654395","wikidata":"https://www.wikidata.org/wiki/Q1097775","display_name":"Compression artifact","level":5,"score":0.47943681478500366},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.45518937706947327},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4273568093776703},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.42683714628219604},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.4198344945907593},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.4197845458984375},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.41637828946113586},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.38738250732421875},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3519405126571655},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.31449612975120544},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.3111138641834259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07567957043647766},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2093698.2093874","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2093698.2093874","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies","raw_type":"proceedings-article"},{"id":"pmh:oai:asep.lib.cas.cz:CavUnEpca/0381682","is_oa":true,"landing_page_url":"http://hdl.handle.net/11104/0212097","pdf_url":"http://library.utia.cas.cz/separaty/2012/ZOI/mahdian-image tampering detection using methods based on jpeg aompression artifacts a real-life experiment.pdf","source":{"id":"https://openalex.org/S7407055266","display_name":"ASEP","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:asep.lib.cas.cz:CavUnEpca/0381682","is_oa":true,"landing_page_url":"http://hdl.handle.net/11104/0212097","pdf_url":"http://library.utia.cas.cz/separaty/2012/ZOI/mahdian-image tampering detection using methods based on jpeg aompression artifacts a real-life experiment.pdf","source":{"id":"https://openalex.org/S7407055266","display_name":"ASEP","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G30537152","display_name":null,"funder_award_id":"GACR P202/10/P509GACR 102/08/0470","funder_id":"https://openalex.org/F4320321006","funder_display_name":"Grantov\u00e1 Agentura \u010cesk\u00e9 Republiky"}],"funders":[{"id":"https://openalex.org/F4320311333","display_name":"Ministerstvo Vnitra \u010cesk\u00e9 Republiky","ror":"https://ror.org/05w1nn565"},{"id":"https://openalex.org/F4320321006","display_name":"Grantov\u00e1 Agentura \u010cesk\u00e9 Republiky","ror":"https://ror.org/01pv73b02"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2049775825.pdf"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W200526583","https://openalex.org/W1559966585","https://openalex.org/W1562053557","https://openalex.org/W1563680641","https://openalex.org/W1600184714","https://openalex.org/W1967503138","https://openalex.org/W2070040249","https://openalex.org/W2083132023","https://openalex.org/W2093104721","https://openalex.org/W2106522075","https://openalex.org/W2115247187","https://openalex.org/W2118053687","https://openalex.org/W2118779391","https://openalex.org/W2123889042","https://openalex.org/W2130225759","https://openalex.org/W2136986582","https://openalex.org/W2144113691","https://openalex.org/W2148610715","https://openalex.org/W2537478078","https://openalex.org/W2595741664","https://openalex.org/W6641712419","https://openalex.org/W6728981438"],"related_works":["https://openalex.org/W4243959093","https://openalex.org/W1998280942","https://openalex.org/W3190486427","https://openalex.org/W1980149576","https://openalex.org/W1992410481","https://openalex.org/W2145138541","https://openalex.org/W2441603424","https://openalex.org/W3137515556","https://openalex.org/W2545896937","https://openalex.org/W2111280862"],"abstract_inverted_index":{"In":[0,91],"this":[1,92,98],"paper":[2],"we":[3],"analyze":[4],"the":[5,41,84],"synergy":[6],"between":[7],"forensic":[8,51,109],"image":[9,24,108],"head":[10,25],"data":[11],"consistency":[12,26],"analysis":[13],"and":[14],"detection":[15],"of":[16,61,86],"doubles":[17],"JPEG":[18,56,74],"compression":[19],"artifacts.":[20],"We":[21,103],"show":[22,104],"that":[23,36,105],"testing":[27],"is":[28,46,100,111],"an":[29],"effective":[30],"method":[31],"for":[32],"detecting":[33],"digital":[34],"images":[35],"have":[37],"been":[38],"modified.":[39],"On":[40],"other":[42,50,82],"hand,":[43],"when":[44],"it":[45],"not":[47],"combined":[48],"with":[49,81],"methods":[52,110],"such":[53],"as":[54],"double":[55,73],"detection,":[57],"a":[58,94,112],"high":[59],"number":[60],"altered":[62,87],"photos":[63,88],"remained":[64,89],"undetected.":[65,90],"The":[66],"same":[67],"can":[68],"also":[69],"be":[70],"claimed":[71],"about":[72],"detection.":[75],"When":[76],"employed":[77],"separately":[78],"without":[79],"conjunction":[80],"methods,":[83],"majority":[85],"paper,":[93],"quantitative":[95],"study":[96],"on":[97],"topic":[99],"carried":[101],"out.":[102],"combining":[106],"various":[107],"must.":[113]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
