{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:12:27Z","timestamp":1726060347286},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030364045"},{"type":"electronic","value":"9783030364052"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36405-2_46","type":"book-chapter","created":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T05:04:07Z","timestamp":1574917447000},"page":"451-460","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Digital Video Tampered Inter-frame Multi-scale Content Similarity Detection Method"],"prefix":"10.1007","author":[{"given":"Lan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiao-qiang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chunyou","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong-yan","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,29]]},"reference":[{"key":"46_CR1","first-page":"1","volume":"99","author":"V Amanipour","year":"2017","unstructured":"Amanipour, V., Ghaemmaghami, S.: Video-tampering detection and content reconstruction via self-embedding. IEEE Trans. Instrum. Meas. 99, 1\u201311 (2017)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"6","key":"46_CR2","doi-asserted-by":"publisher","first-page":"3495","DOI":"10.1007\/s11042-015-2449-0","volume":"75","author":"WC Hu","year":"2016","unstructured":"Hu, W.C., Chen, W.H., Huang, D.Y., et al.: Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimed. Tools Appl. 75(6), 3495\u20133516 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"46_CR3","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10489-017-0893-4","volume":"47","author":"ML Wu","year":"2017","unstructured":"Wu, M.L., Fahn, C.S., Chen, Y.F.: Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks. Appl. Intell. 47(2), 347\u2013361 (2017)","journal-title":"Appl. Intell."},{"key":"46_CR4","unstructured":"Lin, J., Huang, T., Lai, Y., et al.: Detection of continuously and repeated copy-move forgery to single frame in videos by quantized DCT coefficients. J. Comput. Appl. (2016)"},{"issue":"5","key":"46_CR5","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/TIM.2014.2299371","volume":"63","author":"M Fallahpour","year":"2014","unstructured":"Fallahpour, M., Shirmohammadi, S., Semsarzadeh, M., et al.: Tampering detection in compressed digital video using watermarking. IEEE Trans. Instrum. Meas. 63(5), 1057\u20131072 (2014)","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"1","key":"46_CR6","doi-asserted-by":"crossref","first-page":"75","DOI":"10.3233\/FI-2011-377","volume":"106","author":"Z Tang","year":"2011","unstructured":"Tang, Z., Wang, S., Zhang, X., et al.: Structural feature-based image hashing and similarity metric for tampering detection. Fundamenta Informaticae 106(1), 75\u201391 (2011)","journal-title":"Fundamenta Informaticae"},{"issue":"8","key":"46_CR7","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1016\/j.jvcir.2014.09.007","volume":"25","author":"DY Huang","year":"2014","unstructured":"Huang, D.Y., Chen, C.H., Chen, T.Y., et al.: Rapid detection of camera tampering and abnormal disturbance for video surveillance system. J. Vis. Commun. Image Represent. 25(8), 1865\u20131877 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"8","key":"46_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.diin.2016.06.003","volume":"18","author":"K Sitara","year":"2016","unstructured":"Sitara, K., Mehtre, B.M.: Digital video tampering detection: An overview of passive techniques. Digit. Invest. 18(8), 8\u201322 (2016)","journal-title":"Digit. Invest."},{"issue":"20","key":"46_CR9","first-page":"1","volume":"76","author":"JA Aghamaleki","year":"2016","unstructured":"Aghamaleki, J.A., Behrad, A.: Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects. Multimed. Tools Appl. 76(20), 1\u201327 (2016)","journal-title":"Multimed. Tools Appl."},{"key":"46_CR10","unstructured":"http:\/\/trace.eas.ast.edu\/yuv\/index.html\/.2013,7"},{"issue":"6","key":"46_CR11","first-page":"1","volume":"3","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Huang, T., Lin, J., et al.: Video tamper detection method based on nonnegative tensor factorization. Chin. J. Netw. Inf. Secur. 3(6), 1\u20138 (2017)","journal-title":"Chin. J. Netw. Inf. Secur."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Advanced Hybrid Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36405-2_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T11:29:48Z","timestamp":1576236588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36405-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030364045","9783030364052"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36405-2_46","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADHIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Hybrid Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adhip2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adhip.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI compass","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"237","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"101","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}