{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:01:58Z","timestamp":1743080518887,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030110260"},{"type":"electronic","value":"9783030110277"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-11027-7_18","type":"book-chapter","created":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T21:33:52Z","timestamp":1546205632000},"page":"180-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Copy-Move Detection Based on Different Forms of Local Binary Patterns"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6446-8663","authenticated-orcid":false,"given":"Andrey","family":"Kuznetsov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,31]]},"reference":[{"key":"18_CR1","unstructured":"https:\/\/www.brandwatch.com\/blog\/47-facebook-statistics-2016\/"},{"key":"18_CR2","unstructured":"https:\/\/www.brandwatch.com\/blog\/37-instagram-stats-2016\/"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1053\u20131056 (2009)","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1109\/TIFS.2012.2188390","volume":"7","author":"S Bravo-Solorio","year":"2012","unstructured":"Bravo-Solorio, S., Nandi, A.K.: Exposing postprocessed copy\u2013paste forgeries through transform-invariant features. IEEE Trans. Inf. Forensics Secur. 7, 1018\u20131028 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao, Y., Gao, T., Fan, L., Yang, Q.: A robust detection algorithm for copy-move forgery in digital images. Forensic Sci. Int. 214, 33\u201343 (2012)","journal-title":"Forensic Sci. Int."},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7, 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 206, 178\u2013184 (2011)","journal-title":"Forensic Sci. Int."},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian, B., Saic, S.: Detection of copy\u2013move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171, 180\u2013189 (2007)","journal-title":"Forensic Sci. Int."},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"G Muhammad","year":"2012","unstructured":"Muhammad, G., Hussain, M., Bebis, G.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Invest. 9, 49\u201357 (2012)","journal-title":"Digit. Invest."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Kang, X., Wei, S.: Identifying tampered regions using singular value decomposition in digital image forensics. In: Proceedings of the 2008 IEEE International Conference on Computer Science and Software Engineering, pp. 926\u2013930 (2008)","DOI":"10.1109\/CSSE.2008.876"},{"issue":"9\u201310","key":"18_CR11","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/j.optlaseng.2011.05.003","volume":"49","author":"A Fern\u00e1ndez","year":"2011","unstructured":"Fern\u00e1ndez, A., \u00c1lvarez, M.X., Bianconi, F.: Image classification with binary gradient contours. Opt. Lasers Eng. 49(9\u201310), 1177\u20131184 (2011)","journal-title":"Opt. Lasers Eng."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-39289-4_4","volume-title":"Local Binary Patterns: New Variants and Applications. Studies in Computational Intelligence","author":"SA Orjuela Vargas","year":"2014","unstructured":"Orjuela Vargas, S.A., Ya\u00f1ez Puentes, J.P., Philips, W.: The geometric local textural patterns (GLTP). In: Brahnam, S., Jain, L.C., Nanni, L., Lumini, A. (eds.) Local Binary Patterns: New Variants and Applications. Studies in Computational Intelligence, vol. 506, pp. 85\u2013112. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-39289-4_4"},{"issue":"2","key":"18_CR13","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TIP.2009.2035882","volume":"19","author":"B Zhang","year":"2010","unstructured":"Zhang, B., Gao, Y., Zhao, S., Liu, J.: Local derivative pattern versus local binary pattern: face recognition with high-order local pattern descriptor. IEEE Trans. Image Process. 19(2), 533\u2013544 (2010)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Analysis of Images, Social Networks and Texts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11027-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T12:39:31Z","timestamp":1710333571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11027-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030110260","9783030110277"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11027-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"31 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Analysis of Images, Social Networks and Texts","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Moscow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aist2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/aistconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.58","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"107 papers were sent and 26 of these were rejected without reviewing. 1 other paper was accepted due to the interdisciplinary nature of the paper.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}