{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T01:20:40Z","timestamp":1776216040587,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/cvprw.2017.235","type":"proceedings-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T16:55:19Z","timestamp":1503593719000},"page":"1881-1889","source":"Crossref","is-referenced-by-count":133,"title":["Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning"],"prefix":"10.1109","author":[{"given":"Jason","family":"Bunk","sequence":"first","affiliation":[]},{"given":"Jawadul H.","family":"Bappy","sequence":"additional","affiliation":[]},{"given":"Tajuddin Manhar","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Lakshmanan","family":"Nataraj","sequence":"additional","affiliation":[]},{"given":"Arjuna","family":"Flenner","sequence":"additional","affiliation":[]},{"given":"B.S.","family":"Manjunath","sequence":"additional","affiliation":[]},{"given":"Shivkumar","family":"Chandrasekaran","sequence":"additional","affiliation":[]},{"given":"Amit K.","family":"Roy-Chowdhury","sequence":"additional","affiliation":[]},{"given":"Lawrence","family":"Peterson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1117\/12.525375","article-title":"Ucid: An uncompressed color image database","author":"schaefer","year":"2003","journal-title":"Electronic Imaging 2004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597837"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932"},{"key":"ref32","first-page":"23","article-title":"A threshold selection method from gray-level histograms","volume":"11","author":"otsu","year":"1975","journal-title":"Automatica"},{"key":"ref31","article-title":"Improving resampling detection by adding noise","volume":"7541","author":"nataraj","year":"2010","journal-title":"SPIE Conference on Media Forensics and Security"},{"key":"ref30","article-title":"Adding gaussiannoise to &#x201C;denoise&#x201D; JPEG for detecting image resizing","author":"nataraj","year":"2009","journal-title":"ICIP"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.09.028"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"ref35","article-title":"Deep learning for ste-ganalysis via convolutional neural networks","author":"qian","year":"2015","journal-title":"SPIE Electron Imaging"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2006.262783"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084316"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4408927"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2713168.2713194"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"ref14","first-page":"1","article-title":"An energy-based method for the forensic detection of re-sampled images","author":"feng","year":"2011","journal-title":"Multimedia and Expo (ICME) 2011 IEEE International Conference on"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2191946"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CRV.2005.33"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.23.1.013018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2273004"},{"key":"ref19","first-page":"68190f","volume":"6819","author":"kirchner","year":"2008","journal-title":"On the detectability of local resampling in digital images"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2004.924603"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-328"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051426"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2644615"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-013-0547-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952537"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561898"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952537"},{"key":"ref2","author":"abadi","year":"2016","journal-title":"Tensorflow Large-scale machine learning on heterogeneous distributed systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946978"},{"key":"ref1","year":"0","journal-title":"NIST Nimble 2016 Datasets"},{"key":"ref20","first-page":"4","article-title":"Efficient inference in fully connected crfs with gaussian edge potentials","volume":"2","author":"koltun","year":"2011","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","article-title":"Segmentation-based image copy-move forgery detection scheme","volume":"10","author":"li","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2389797"},{"key":"ref42","first-page":"1","article-title":"Image region forgery detection: A deep learning approach","volume":"14","author":"zhang","year":"2016","journal-title":"Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 Cyber-Security by Design"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.03.019"},{"key":"ref41","first-page":"1222","article-title":"Detection of digital doctoring in exemplar-based inpainted images","volume":"3","author":"wu","year":"2008","journal-title":"Machine Learning and Cybernetics 2008 International Conference on"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.03.004"},{"key":"ref44","first-page":"487","article-title":"Learning deep features for scene recognition using places database","author":"zhou","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.179"},{"key":"ref25","first-page":"63","article-title":"Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in jpeg images","volume":"5","author":"liu","year":"2015","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"}],"event":{"name":"2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","location":"Honolulu, HI, USA","start":{"date-parts":[[2017,7,21]]},"end":{"date-parts":[[2017,7,26]]}},"container-title":["2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8014302\/8014734\/08014969.pdf?arnumber=8014969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T15:49:35Z","timestamp":1570031375000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8014969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/cvprw.2017.235","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}