{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:07:39Z","timestamp":1743034059434,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030687335"},{"type":"electronic","value":"9783030687342"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68734-2_4","type":"book-chapter","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T01:14:09Z","timestamp":1612833249000},"page":"62-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor"],"prefix":"10.1007","author":[{"given":"Jiaqi","family":"Shi","sequence":"first","affiliation":[]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Su","sequence":"additional","affiliation":[]},{"given":"Xiaoguang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"issue":"3","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1053\u20131056 (2009)","DOI":"10.1109\/ICASSP.2009.4959768"},{"issue":"3","key":"4_CR3","doi-asserted-by":"publisher","first-page":"e00809","DOI":"10.1128\/mBio.00809-16","volume":"7","author":"EM Bik","year":"2016","unstructured":"Bik, E.M., Casadevall, A., Fang, F.C.: The prevalence of inappropriate image duplication in biomedical research publications. MBio 7(3), e00809\u201316 (2016)","journal-title":"MBio"},{"issue":"13","key":"4_CR4","doi-asserted-by":"publisher","first-page":"18293","DOI":"10.1007\/s11042-019-7165-8","volume":"78","author":"C-C Chen","year":"2019","unstructured":"Chen, C.-C., Lu, W.-Y., Chou, C.-H.: Rotational copy-move forgery detection using SIFT and region growing strategies. Multimedia Tools Appl. 78(13), 18293\u201318308 (2019). https:\/\/doi.org\/10.1007\/s11042-019-7165-8","journal-title":"Multimedia Tools Appl."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Copy-move forgery detection based on patchmatch. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 5312\u20135316 (2014)","DOI":"10.1109\/ICIP.2014.7026075"},{"issue":"11","key":"4_CR6","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284\u20132297 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"4_CR7","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1049\/iet-ipr.2014.0986","volume":"9","author":"R Eswaraiah","year":"2015","unstructured":"Eswaraiah, R., Reddy, E.S.: Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process. 9(8), 615\u2013625 (2015)","journal-title":"IET Image Process."},{"key":"4_CR8","unstructured":"Fridrich, A.J., Soukal, B.D., Luk\u00e1\u0161, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MCOM.2018.1700817","volume":"56","author":"A Ghoneim","year":"2018","unstructured":"Ghoneim, A., Muhammad, G., Amin, S.U., Gupta, B.: Medical image forgery detection for smart healthcare. IEEE Commun. Mag. 56(4), 33\u201337 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"4_CR10","unstructured":"Heath, M., Bowyer, K., Kopans, D., Moore, R., Kegelmeyer, P.: The digital database for screening mammography. In: Proceedings of the Fourth International Workshop on Digital Mammography (2000)"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.image.2017.05.010","volume":"57","author":"G Jin","year":"2017","unstructured":"Jin, G., Wan, X.: An improved method for sift-based copy-move forgery detection using non-maximum value suppression and optimized j-linkage. Signal Process. Image Commun. 57, 113\u2013125 (2017)","journal-title":"Signal Process. Image Commun."},{"issue":"3","key":"4_CR12","first-page":"507","volume":"10","author":"J Li","year":"2014","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"4_CR13","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Y Li","year":"2018","unstructured":"Li, Y., Zhou, J.: Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans. Inf. Forensics Secur. 14(5), 1307\u20131322 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1\u20133","key":"4_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Y Li","year":"2013","unstructured":"Li, Y.: Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci. Int. 224(1\u20133), 59\u201367 (2013)","journal-title":"Forensic Sci. Int."},{"issue":"3","key":"4_CR15","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11760-017-1191-7","volume":"12","author":"V Manu","year":"2018","unstructured":"Manu, V., Mehtre, B.M.: Copy-move tampering detection using affine transformation property preservation on clustered keypoints. Signal Image Video Process. 12(3), 549\u2013556 (2018)","journal-title":"Signal Image Video Process."},{"issue":"10","key":"4_CR16","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1080\/00207160.2010.543677","volume":"88","author":"NA Memon","year":"2011","unstructured":"Memon, N.A., Chaudhry, A., Ahmad, M., Keerio, Z.A.: Hybrid watermarking of medical images for ROI authentication and recovery. Int. J. Comput. Math. 88(10), 2057\u20132071 (2011)","journal-title":"Int. J. Comput. Math."},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"G Muhammad","year":"2012","unstructured":"Muhammad, G., Hussain, M., Bebis, G.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Invest. 9(1), 49\u201357 (2012)","journal-title":"Digital Invest."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Muzaffer, G., Ulutas, G.: A fast and effective digital image copy move forgery detection with binarized sift. In: 2017 40th International Conference on Telecommunications and Signal Processing (TSP), pp. 595\u2013598 (2017)","DOI":"10.1109\/TSP.2017.8076056"},{"key":"4_CR19","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004-515, Department of Computer Science, Dartmouth College, pp. 1\u201311 (2004)"},{"issue":"8","key":"4_CR20","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun, C.M., Yuan, X.C., Bi, X.L.: Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans. Inf. Forensics Secur. 10(8), 1705\u20131716 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"4_CR21","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu, S.J., Kirchner, M., Lee, M.J., Lee, H.K.: Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Inf. Forensics Secur. 8(8), 1355\u20131370 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Shahroudnejad, A., Rahmati, M.: Copy-move forgery detection in digital images using affine-sift. In: 2016 2nd International Conference of Signal Processing and Intelligent Systems (ICSPIS), pp. 1\u20135 (2016)","DOI":"10.1109\/ICSPIS.2016.7869896"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Sharma, S., Ghanekar, U.: A rotationally invariant texture descriptor to detect copy move forgery in medical images. In: 2015 IEEE International Conference on Computational Intelligence & Communication Technology, pp. 795\u2013798 (2015)","DOI":"10.1109\/CICT.2015.88"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Tejas, K., Swathi, C., Rajesh, K.M.: Copy move forgery using Hus invariant moments and log polar transformations (2018)","DOI":"10.1109\/RTEICT42901.2018.9012293"},{"issue":"6","key":"4_CR25","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/s10278-017-9961-x","volume":"30","author":"G Ulutas","year":"2017","unstructured":"Ulutas, G., Ustubioglu, A., Ustubioglu, B., Nabiyev, V.V., Ulutas, M.: Medical image tamper detection based on passive image authentication. J. Digital Imaging 30(6), 695\u2013709 (2017)","journal-title":"J. Digital Imaging"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, H.: Perceptual hashing-based image copy-move forgery detection. Secur. Commun. Netw. (2018)","DOI":"10.1155\/2018\/6853696"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"JH Wu","year":"2008","unstructured":"Wu, J.H., et al.: Tamper detection and recovery for medical images using near-lossless information hiding technique. J. Digital Imaging 21(1), 59\u201376 (2008)","journal-title":"J. Digital Imaging"},{"issue":"1","key":"4_CR28","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1007\/s11042-016-4289-y","volume":"77","author":"B Yang","year":"2017","unstructured":"Yang, B., Sun, X., Guo, H., Xia, Z., Chen, X.: A copy-move forgery detection method based on CMFD-SIFT. Multimedia Tools Appl. 77(1), 837\u2013855 (2017). https:\/\/doi.org\/10.1007\/s11042-016-4289-y","journal-title":"Multimedia Tools Appl."},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Zain, J.M., Fauzi, A.R.: Medical image watermarking with tamper detection and recovery. In: 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 3270\u20133273 (2006)","DOI":"10.1109\/IEMBS.2006.4398145"},{"issue":"11","key":"4_CR30","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi, M., Mahmoudi-Aznaveh, A., Talebpour, A.: Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans. Inf. Forensics Secur. 11(11), 2499\u20132512 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"4_CR31","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s11859-017-1227-4","volume":"22","author":"F Zhao","year":"2017","unstructured":"Zhao, F., Shi, W., Qin, B., Liang, B.: Image forgery detection using segmentation and swarm intelligent algorithm. Wuhan Univ. J. Nat. Sci. 22(2), 141\u2013148 (2017)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"issue":"1\u20133","key":"4_CR32","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao, J., Guo, J.: Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci. Int. 233(1\u20133), 158\u2013166 (2013)","journal-title":"Forensic Sci. Int."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68734-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T13:59:31Z","timestamp":1619272771000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-68734-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030687335","9783030687342"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68734-2_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boston, MA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/d-forensics.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confyplus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID 19 pandemic teh conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}