{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:41:21Z","timestamp":1768311681022,"version":"3.49.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030006914","type":"print"},{"value":"9783030006921","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00692-1_41","type":"book-chapter","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T08:59:31Z","timestamp":1536829171000},"page":"472-483","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Digital Image Forensics Technique for Copy-Move Forgery Detection Using DoG and ORB"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Niyishaka","sequence":"first","affiliation":[]},{"given":"Chakravarthy","family":"Bhagvati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,14]]},"reference":[{"key":"41_CR1","unstructured":"Dhiman, N., Kumar, R.: Classification of copy move forgery and normal images by ORB features and SVM classifier. In: ICITSEM 2017, pp. 146\u2013155 (2017)"},{"key":"41_CR2","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.procs.2016.03.050","volume":"79","author":"AV Malviya","year":"2016","unstructured":"Malviya, A.V., Ladhake, S.A.: Pixel based image forensic technique for copy-move forgery detection using auto color correlogram. Procedia Comput. Sci. 79, 383\u2013390 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"41_CR3","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.jvcir.2015.07.007","volume":"31","author":"J-C Lee","year":"2015","unstructured":"Lee, J.-C.: Copy-move image forgery detection based on Gabor magnitude. J. Vis. Commun. Image Representation 31, 320\u2013334 (2015)","journal-title":"J. Vis. Commun. Image Representation"},{"issue":"3","key":"41_CR4","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"41_CR5","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Rublee, E., Rabaud, V., Konolige, K., Bradski, G.: ORB: an efficient alternative to SIFT or SURF. In: ICCV, pp. 2564\u20132571 (2011)","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"AlSawadi, M., Ghulam, M., Hussain, M., Bebis, G.: Copy-move image forgery detection using local binary pattern and neighborhood clustering. In: EMS (2013)","DOI":"10.1109\/EMS.2013.43"},{"key":"41_CR8","unstructured":"Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Dartmouth College, Computer Science, Technical report, TR 2004\u2013515 (2004)"},{"key":"41_CR9","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Digital Forensic Research Workshop, Cleveland, OH, pp. 19\u201323 (2003)"},{"issue":"1","key":"41_CR10","doi-asserted-by":"crossref","first-page":"90","DOI":"10.4304\/jmm.7.1.90-97","volume":"7","author":"L Jing","year":"2012","unstructured":"Jing, L., Shao, C.: Image copy-move forgery detecting based on local invariant feature. J. Multimed. 7(1), 90\u201397 (2012)","journal-title":"J. Multimed."},{"key":"41_CR11","unstructured":"Shivakumar, B.L., SanthoshBaboo, S.: Detection of region duplication forgery in digital images using SURF. IJCSI Int. J. Comput. Sci. Issues 8(4), 199\u2013205 (2011)"},{"issue":"2","key":"41_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"41_CR13","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/B978-012369476-8\/50017-8","volume-title":"Multimedia Security Technologies for Digital Rights Management","author":"Tian-Tsong Ng","year":"2006","unstructured":"Ng, T.-T., Chang, S.-F., Lin, C.-Y., Sun, Q.: Passive blind image forensics. In: Multimedia Security Technologies for Digital Rights Management, pp. 383\u2013412 (2006)"},{"key":"41_CR14","unstructured":"Gupta, C.S.: A review on splicing image forgery detection techniques. IJCSITS, 6(2), 262\u2013269, (2016)"},{"key":"41_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.14257\/ijast.2014.73.02","volume":"73","author":"S Mushtaq","year":"2014","unstructured":"Mushtaq, S., Hussain, A.: Digital image forgeries and passive image authentication techniques: a survey. Int. J. Adv. Sci. Technol. 73, 15\u201332 (2014)","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"41_CR16","unstructured":"Rathod, G., Chodankar, S., Deshmukh, R., Shinde, P., Pattanaik, S.P.: Image forgery detection on cut-paste and copy-move forgeries. Int. J. Adv. Electron. Comput. Sci. 3(6) (2016). ISSN: 2393\u20132835"},{"issue":"1","key":"41_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"Judith A. Redi","year":"2010","unstructured":"Redi, J., Taktak, W., Dugelay, J.: Digital image forensics: a booklet for beginners. Multimed. Tools Appl. 51(1), 133\u2013162 (2011)","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"41_CR18","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/BF01469346","volume":"11","author":"Tony Lindeberg","year":"1993","unstructured":"Lindeberg, T.: Detecting salient blob-like image structures and their scales with a scale-space primal sketch: a method for focus-of-attention. Int. J. Comput. Vis. 11(3), 283\u2013318 (1993)","journal-title":"International Journal of Computer Vision"},{"issue":"7","key":"41_CR19","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1109\/TPAMI.2011.222","volume":"34","author":"M Calonder","year":"2012","unstructured":"Calonder, M., Lepetit, V., \u00f6zuysal, M., Trzcinski, T., Strecha, C., Fua, P.: BRIEF: computing a local binary descriptor very fast. IEEE Trans. Pattern Anal. Mach. Intell. 34(7), 1281\u20131298 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"41_CR20","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-319-28854-3_2","volume-title":"Image Feature Detectors and Descriptors","author":"M Hassaballah","year":"2016","unstructured":"Hassaballah, M., Abdelmgeid, A.A., Alshazly, H.A.: Image features detection, description and matching. In: Awad, A.I., Hassaballah, M. (eds.) Image Feature Detectors and Descriptors. SCI, vol. 630, pp. 11\u201345. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-28854-3_2"},{"issue":"7","key":"41_CR21","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.3390\/s17071646","volume":"17","author":"Ahmad Audi","year":"2017","unstructured":"Audi, A., Pierrot-Deseilligny, M., Meynardand, C., Thom, C.: Implementation of an IMU aided image stacking algorithm in a digital camera for unmanned aerial vehicles. Sensors 17(7), 1646 (2017)","journal-title":"Sensors"},{"key":"41_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1007\/978-3-642-15561-1_56","volume-title":"Computer Vision \u2013 ECCV 2010","author":"M Calonder","year":"2010","unstructured":"Calonder, M., Lepetit, V., Strecha, C., Fua, P.: BRIEF: binary robust independent elementary features. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6314, pp. 778\u2013792. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15561-1_56"},{"issue":"6","key":"41_CR23","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TSMCB.2012.2228639","volume":"43","author":"Hui Kong","year":"2013","unstructured":"Kong, H., Akakin, H.C., Sarma, S.E.: A generalized Laplacian of Gaussian filter for blob detection and its applications. IEEE Trans. Cybern. 43(6), 1719\u20131733 (2013)","journal-title":"IEEE Transactions on Cybernetics"},{"key":"41_CR24","unstructured":"Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD - new database for copy-move forgery detection. In: Proceedings of 55th International Symposium ELMAR-2013, pp. 49\u201354 (2013)"},{"key":"41_CR25","unstructured":"Irwin, S., Gary, F.: A 3 x 3 Isotropic Gradient Operator for Image Processing. The Stanford Artificial Intelligence Project, pp. 271\u2013272 (1968)"},{"key":"41_CR26","doi-asserted-by":"crossref","unstructured":"Vincent, O.R., Folorunso, O.: A descriptive algorithm for Sobel image edge detection. In: Proceedings of Informing Science & IT Education Conference (InSITE) (2009)","DOI":"10.28945\/3351"}],"container-title":["Lecture Notes in Computer Science","Computer Vision and Graphics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00692-1_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T01:12:35Z","timestamp":1571879555000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00692-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030006914","9783030006921"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00692-1_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCVG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Vision and Graphics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccvg2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccvg.wzim.sggw.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}