{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:35:39Z","timestamp":1775324139592,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030225131","type":"print"},{"value":"9783030225148","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22514-8_9","type":"book-chapter","created":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T02:02:43Z","timestamp":1560218563000},"page":"107-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Video Tamper Detection Based on Convolutional Neural Network and Perceptual Hashing Learning"],"prefix":"10.1007","author":[{"given":"Huisi","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yawen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhenkun","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"issue":"7","key":"9_CR1","first-page":"1405","volume":"36","author":"X Niu","year":"2008","unstructured":"Niu, X., Jiao, Y.: An overview of perceptual hashing. Acta Electronica Sinica 36(7), 1405\u20131411 (2008)","journal-title":"Acta Electronica Sinica"},{"key":"9_CR2","unstructured":"Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: 1996 Proceedings of International Conference on Image Processing, vol. 3, pp. 227\u2013230. IEEE (1996)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Lu, J.: Video fingerprinting for copy identification: from research to industry applications. In: Media Forensics and Security, vol. 7254, p. 725402. International Society for Optics and Photonics (2009)","DOI":"10.1117\/12.805709"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/99.641604","volume":"4","author":"H.J. Wolfson","year":"1997","unstructured":"Wolfson, H.J., Rigoutsos, I.: Geometric hashing: an overview. IEEE Comput. Sci. Eng. 4(4), 10\u201321 (1997)","journal-title":"IEEE Computational Science and Engineering"},{"key":"9_CR5","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.eswa.2017.11.028","volume":"95","author":"D Han","year":"2018","unstructured":"Han, D., Liu, Q., Fan, W.: A new image classification method using CNN transfer learning and web data augmentation. Expert Syst. Appl. 95, 43\u201356 (2018)","journal-title":"Expert Syst. Appl."},{"key":"9_CR7","unstructured":"Lee, S., Yoo, C.D.: Video fingerprinting based on centroids of gradient orientations. In: Proceedings of 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2006, vol. 2, p. II. IEEE (2006)"},{"issue":"10","key":"9_CR8","doi-asserted-by":"publisher","first-page":"4020","DOI":"10.1109\/TSP.2005.855414","volume":"53","author":"C Roover De","year":"2005","unstructured":"De Roover, C., De Vleeschouwer, C., Lefebvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Trans. Sig. Process. 53(10), 4020\u20134037 (2005)","journal-title":"IEEE Trans. Sig. Process."},{"issue":"6","key":"9_CR9","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1109\/TMM.2006.884614","volume":"8","author":"Baris Coskun","year":"2006","unstructured":"Coskun, B., Sankur, B., Memon, N.: Spatio-temporal transform based video hashing. IEEE Trans. Multimedia 8(6), 1190\u20131208 (2006)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"11","key":"9_CR10","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"Jiansheng Chen","year":"2015","unstructured":"Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Sig. Process. Lett. 22(11), 1849\u20131853 (2015)","journal-title":"IEEE Signal Processing Letters"},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/sym10010003","volume":"10","author":"Y Yao","year":"2017","unstructured":"Yao, Y., Shi, Y., Weng, S., Guan, B.: Deep learning for detection of object-based forgery in advanced video. Symmetry 10(1), 3 (2017)","journal-title":"Symmetry"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Liu, X., Sun, J., Liu, J.: Shot-based temporally respective frame generation algorithm for video hashing. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 109\u2013114. IEEE (2013)","DOI":"10.1109\/WIFS.2013.6707803"},{"issue":"4","key":"9_CR13","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/LSP.2016.2611485","volume":"24","author":"X Wang","year":"2017","unstructured":"Wang, X., Gao, L., Song, J., Shen, H.: Beyond frame-level CNN: saliency-aware 3-D CNN with LSTM for video action recognition. IEEE Sig. Process. Lett. 24(4), 510\u2013514 (2017)","journal-title":"IEEE Sig. Process. Lett."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Peng, T., Li, F.: Image retrieval based on deep convolutional neural networks and binary hashing learning. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1742\u20131746. IEEE (2017)","DOI":"10.1109\/ICASSP.2017.7952455"},{"key":"9_CR15","unstructured":"Soomro, K., Zamir, A.R., Shah, M.: Ucf101: a dataset of 101 human actions classes from videos in the wild. arXiv preprint \n                      arXiv:1212.0402\n                      \n                     (2012)"},{"issue":"11","key":"9_CR16","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1109\/TCSVT.2015.2473436","volume":"26","author":"S Chen","year":"2016","unstructured":"Chen, S., Tan, S., Li, B., Huang, J.: Automatic detection of object-based forgery in advanced video. IEEE Trans. Circ. Syst. Video Technol. 26(11), 2138\u20132151 (2016)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"7","key":"9_CR17","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1109\/TCSVT.2008.920739","volume":"18","author":"S Lee","year":"2008","unstructured":"Lee, S., Yoo, C.D.: Robust video fingerprinting for content-based video identification. IEEE Trans. Circ. Syst. Video Technol. 18(7), 983\u2013988 (2008)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Saikia, N.: Perceptual hashing in the 3D-DWT domain. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 694\u2013698. IEEE (2015)","DOI":"10.1109\/ICGCIoT.2015.7380552"},{"key":"9_CR19","unstructured":"Nie, X., Liu, J., Sun, J., Zhao, H.: Key-frame based robust video hashing using isometric feature mapping. J. Comput. Inf. Syst. 7(6), 2112\u20132119 (2011)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/978-3-319-46675-0_56","volume-title":"Neural Information Processing","author":"C Ma","year":"2016","unstructured":"Ma, C., Gu, Y., Liu, W., Yang, J., He, X.: Unsupervised video hashing by exploiting spatio-temporal feature. In: Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M., Liu, D. (eds.) ICONIP 2016. LNCS, vol. 9949, pp. 511\u2013518. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-46675-0_56"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Graphics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22514-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T02:07:04Z","timestamp":1560218824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22514-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030225131","9783030225148"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22514-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CGI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Graphics International Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Calgary, AB","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cgi2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cgs-network.org\/cgi19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}