{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:19:11Z","timestamp":1772263151126,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030387518","type":"print"},{"value":"9783030387525","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38752-5_2","type":"book-chapter","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T15:02:41Z","timestamp":1578409361000},"page":"17-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Detection of Copy-Move Forgery in Digital Image Based on SIFT Features and Automatic Matching Thresholds"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0453-0028","authenticated-orcid":false,"given":"Muthana S.","family":"Mahdi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0006-9326","authenticated-orcid":false,"given":"Saad N.","family":"Alsaad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,8]]},"reference":[{"key":"2_CR1","unstructured":"Sivakumar, M., Roy, P., Harmsen, K., Saha, S.: Satellite remote sensing and GIS applications in agricultural meteorology. In: Paper Presented at: Proceedings of the Training Workshop in Dehradun, India. AGM-8, WMO\/TD (2004)"},{"issue":"11","key":"2_CR2","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi, M., Mahmoudi-Aznaveh, A., Talebpour, A.: Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans. Inf. Forensics Secur. 11(11), 2499\u20132512 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR3","first-page":"1","volume":"51","author":"S Walia","year":"2018","unstructured":"Walia, S., Kumar, K.: Digital image forgery detection: a systematic scrutiny. Aust. J. Forensic Sci. 51, 1\u201339 (2018)","journal-title":"Aust. J. Forensic Sci."},{"issue":"3","key":"2_CR4","first-page":"9","volume":"27","author":"B Shivakumar","year":"2011","unstructured":"Shivakumar, B., Baboo, S.S.: Automated forensic method for copy-move forgery detection based on Harris interest points and SIFT descriptors. Int. J. Comput. Appl. 27(3), 9\u201317 (2011)","journal-title":"Int. J. Comput. Appl."},{"issue":"10","key":"2_CR5","first-page":"91","volume":"8","author":"N Parashar","year":"2015","unstructured":"Parashar, N., Tiwari, N., Dubey, D.: A survey of digital image tampering techniques. Int. J. Sig. Process. Image Process. Pattern Recogn. 8(10), 91\u201396 (2015)","journal-title":"Int. J. Sig. Process. Image Process. Pattern Recogn."},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10044-017-0678-8","volume":"21","author":"S Sadeghi","year":"2018","unstructured":"Sadeghi, S., Dadkhah, S., Jalab, H.A., Mazzola, G., Uliyan, D.: State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal. Appl. 21(2), 291\u2013306 (2018)","journal-title":"Pattern Anal. Appl."},{"key":"2_CR7","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-981-10-4765-7_29","volume-title":"Advances in Electronics, Communication and Computing","author":"S Panda","year":"2018","unstructured":"Panda, S., Mishra, M.: Passive techniques of digital image forgery detection: developments and challenges. In: Kalam, A., Das, S., Sharma, K. (eds.) Advances in Electronics, Communication and Computing. LNEE, vol. 443, pp. 281\u2013290. Springer, Singapore (2018). \nhttps:\/\/doi.org\/10.1007\/978-981-10-4765-7_29"},{"key":"2_CR8","volume-title":"Copy-Move Forgery Detection in Digital Images","author":"A Khayeat","year":"2017","unstructured":"Khayeat, A.: Copy-Move Forgery Detection in Digital Images. Cardiff University, Cardiff (2017)"},{"key":"2_CR9","first-page":"249","volume":"6","author":"R Kaur","year":"2016","unstructured":"Kaur, R., Zail, G., Kaur, A., Singh, G.Z.: A review of copy-move forgery detection techniques. Int. J. Comput. Sci. Inf. Technol. Secur. 6, 249\u2013253 (2016)","journal-title":"Int. J. Comput. Sci. Inf. Technol. Secur."},{"issue":"3","key":"2_CR10","first-page":"71","volume":"9","author":"A Dixit","year":"2016","unstructured":"Dixit, A., Gupta, R.: Copy-move image forgery detection using frequency-based techniques: a review. Int. J. Sig. Process. Image Process. Pattern Recogn. 9(3), 71\u201388 (2016)","journal-title":"Int. J. Sig. Process. Image Process. Pattern Recogn."},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1080\/00450618.2016.1153711","volume":"49","author":"K Asghar","year":"2017","unstructured":"Asghar, K., Habib, Z., Hussain, M.: Copy-move and splicing image forgery detection and localization techniques: a review. Aust. J. Forensic Sci. 49(3), 281\u2013307 (2017)","journal-title":"Aust. J. Forensic Sci."},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2015.08.008","volume":"39","author":"MA Qureshi","year":"2015","unstructured":"Qureshi, M.A., Deriche, M.: A bibliography of pixel-based blind image forgery detection techniques. Sig. Process. Image Commun. 39, 46\u201374 (2015)","journal-title":"Sig. Process. Image Commun."},{"issue":"1\u20133","key":"2_CR13","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Y Li","year":"2013","unstructured":"Li, Y.: Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci. Int. 224(1\u20133), 59\u201367 (2013)","journal-title":"Forensic Sci. Int."},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"75","author":"NBA Warif","year":"2016","unstructured":"Warif, N.B.A., Wahab, A.W.A., Idris, M.Y.I., et al.: Copy-move forgery detection: survey, challenges and future directions. J. Netw. Comput. Appl. 75, 259\u2013278 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"2_CR15","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: A survey of copy-move forgery detection techniques. In: Paper Presented at: IEEE Western New York Image Processing Workshop (2008)"},{"issue":"1\u20133","key":"2_CR16","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao, J., Guo, J.: Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci. Int. 233(1\u20133), 158\u2013166 (2013)","journal-title":"Forensic Sci. Int."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"AlSawadi, M., Muhammad, G., Hussain, M., Bebis, G.: Copy-move image forgery detection using local binary pattern and neighborhood clustering. In: Paper Presented at: 2013 European Modelling Symposium (2013)","DOI":"10.1109\/EMS.2013.43"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Fadl, S.M., Semary, N.A.: A proposed accelerated image copy-move forgery detection. In: Paper Presented at: 2014 IEEE Visual Communications and Image Processing Conference (2014)","DOI":"10.1109\/VCIP.2014.7051552"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2015.03.009","volume":"321","author":"J-C Lee","year":"2015","unstructured":"Lee, J.-C., Chang, C.-P., Chen, W.-K.: Detection of copy\u2013move image forgery using histogram of orientated gradients. Inf. Sci. 321, 250\u2013262 (2015)","journal-title":"Inf. Sci."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Khan, S., Kulkarni, A.: Robust method for detection of copy-move forgery in digital images. In: Paper Presented at: 2010 International Conference on Signal and Image Processing (2010)","DOI":"10.1109\/ICSIP.2010.5697444"},{"key":"2_CR21","unstructured":"Haimour, F.O., Khraiwesh, M.A., Mahmoud, K.W.: An improved method for detecting copy-move forgery in digital images, Zarqa University (2015)"},{"key":"2_CR22","unstructured":"Parihar, V., Mehtre, B.M.: Copy move forgery detection using key-points structure, Sardar Patel University of Police, Security and Criminal (2016)"},{"issue":"3","key":"2_CR23","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen, L., Lu, W., Ni, J., Sun, W., Huang, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24(3), 244\u2013254 (2013)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"9","key":"2_CR24","first-page":"17","volume":"98","author":"R Singh","year":"2014","unstructured":"Singh, R., Oberoi, A., Goel, N.: Copy move forgery detection on digital images. Int. J. Comput. Appl. 98(9), 17\u201322 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Sreelakshmy, I, Anver, J.: An improved method for copy-move forgery detection in digital forensic. In: Paper Presented at: 2016 Online International Conference on Green Engineering and Technologies (IC-GET) (2016)","DOI":"10.1109\/GET.2016.7916684"},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1007\/s11042-016-4289-y","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang, B., Sun, X., Guo, H., Xia, Z., Chen, X.: A copy-move forgery detection method based on CMFD-SIFT. Multimed. Tools Appl. 77(1), 837\u2013855 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"2_CR27","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"issue":"3","key":"2_CR28","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy\u2013move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD\u2014New database for copy-move forgery detection. In: Paper Presented at: Proceedings ELMAR-2013 (2013)","DOI":"10.1007\/978-3-319-06431-4_6"}],"container-title":["Communications in Computer and Information Science","Applied Computing to Support Industry: Innovation and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38752-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T11:09:16Z","timestamp":1578654556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38752-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030387518","9783030387525"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38752-5_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACRIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Computing to Support Industry: Innovation and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ramadi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iraq","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acrit2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acritt.org.uk\/wp\/acrit-conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}