{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:38:03Z","timestamp":1743089883639,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031157769"},{"type":"electronic","value":"9783031157776"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_34","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"622-637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Video Forensics for\u00a0Object Removal Based on\u00a0Darknet3D"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7444-4286","authenticated-orcid":false,"given":"Kejun","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9331-1347","authenticated-orcid":false,"given":"Yuhao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8891-6723","authenticated-orcid":false,"given":"Xinying","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"issue":"4","key":"34_CR1","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1109\/TIFS.2012.2194285","volume":"7","author":"S Battiato","year":"2012","unstructured":"Battiato, S., Farinella, G.M., Messina, E., Puglisi, G.: Robust image alignment for tampering detection. IEEE Trans. Inf. Forensics Secur. 7(4), 1105\u20131117 (2012). https:\/\/doi.org\/10.1109\/TIFS.2012.2194285","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR2","unstructured":"Chen, L., Yang, Q., Yuan, L.: Passive forensic based on spatio-temporal location of video object removal tampering. J. Commun. (7) (2020)"},{"issue":"11","key":"34_CR3","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1109\/TCSVT.2015.2473436","volume":"26","author":"S Chen","year":"2016","unstructured":"Chen, S., Tan, S., Li, B., Huang, J.: Automatic detection of object-based forgery in advanced video. IEEE Trans. Circ. Syst. Video Technol. 26(11), 2138\u20132151 (2016)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"6","key":"34_CR4","first-page":"177","volume":"32","author":"WB Chen","year":"2011","unstructured":"Chen, W.B., Yang, G.B., Chen, R.C., Zhu, N.B.: Digital video passive forensics for its authenticity and source. J. Commun. 32(6), 177\u2013183 (2011)","journal-title":"J. Commun."},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"116066","DOI":"10.1016\/j.image.2020.116066","volume":"90","author":"SM Fadl","year":"2020","unstructured":"Fadl, S.M., Han, Q., Li, Q.: CNN spatiotemporal features and fusion for surveillance video forgery detection. Sign. Process. Image Commun. 90, 116066 (2020)","journal-title":"Sign. Process. Image Commun."},{"key":"34_CR6","doi-asserted-by":"publisher","unstructured":"Hsu, C.C., Hung, T.Y., Lin, C.W., Hsu, C.T.: Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 170\u2013174 (2008). https:\/\/doi.org\/10.1109\/MMSP.2008.4665069","DOI":"10.1109\/MMSP.2008.4665069"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Jiang, B., Luo, R., Mao, J., Xiao, T., Jiang, Y.: Acquisition of localization confidence for accurate object detection (2018)","DOI":"10.1007\/978-3-030-01264-9_48"},{"key":"34_CR8","doi-asserted-by":"publisher","unstructured":"Jin, X., He, Z., Xu, J., Wang, Y., Su, Y.: Object-based video forgery detection via dual-stream networks. In: 2021 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/ICME51207.2021.9428319","DOI":"10.1109\/ICME51207.2021.9428319"},{"key":"34_CR9","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-030-17065-3_38","volume-title":"Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)","author":"K Kono","year":"2020","unstructured":"Kono, K., Yoshida, T., Ohshiro, S., Babaguchi, N.: Passive video forgery detection considering spatio-temporal consistency. In: Madureira, A.M., Abraham, A., Gandhi, N., Silva, C., Antunes, M. (eds.) SoCPaR 2018. AISC, vol. 942, pp. 381\u2013391. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-17065-3_38"},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-40099-5_20","volume-title":"The International Workshop on Digital Forensics and Watermarking 2012","author":"L Li","year":"2013","unstructured":"Li, L., Wang, X., Zhang, W., Yang, G., Hu, G.: Detecting removed object from video with stationary background. In: Shi, Y.Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) The International Workshop on Digital Forensics and Watermarking 2012, pp. 242\u2013252. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40099-5_20"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Long, C., Smith, E., Basharat, A., Hoogs, A.: A C3D-based convolutional neural network for frame dropping detection in a single video shot. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2017)","DOI":"10.1109\/CVPRW.2017.237"},{"key":"34_CR12","doi-asserted-by":"publisher","unstructured":"Mane, S., Mangale, S.: Moving object detection and tracking using convolutional neural networks. In: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 1809\u20131813 (2018). https:\/\/doi.org\/10.1109\/ICCONS.2018.8662921","DOI":"10.1109\/ICCONS.2018.8662921"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Redmon, J., Farhadi, A.: YOLO9000: better, faster, stronger. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 6517\u20136525 (2017)","DOI":"10.1109\/CVPR.2017.690"},{"key":"34_CR14","unstructured":"Redmon, J., Farhadi, A.: YOLOv3: an incremental improvement. arXiv e-prints (2018)"},{"key":"34_CR15","doi-asserted-by":"publisher","unstructured":"Saxena, S., Subramanyam, A., Ravi, H.: Video inpainting detection and localization using inconsistencies in optical flow. In: 2016 IEEE Region 10 Conference (TENCON), pp. 1361\u20131365 (2016). https:\/\/doi.org\/10.1109\/TENCON.2016.7848236","DOI":"10.1109\/TENCON.2016.7848236"},{"key":"34_CR16","doi-asserted-by":"publisher","unstructured":"Su, C., Wei, J.: Hybrid model of vehicle recognition based on convolutional neural network. In: 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 1246\u20131251 (2020). https:\/\/doi.org\/10.1109\/HPCC-SmartCity-DSS50907.2020.00161","DOI":"10.1109\/HPCC-SmartCity-DSS50907.2020.00161"},{"key":"34_CR17","doi-asserted-by":"publisher","first-page":"109719","DOI":"10.1109\/ACCESS.2019.2933871","volume":"7","author":"L Su","year":"2019","unstructured":"Su, L., Luo, H., Wang, S.: A novel forgery detection algorithm for video foreground removal. IEEE Access 7, 109719\u2013109728 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2933871","journal-title":"IEEE Access"},{"key":"34_CR18","doi-asserted-by":"publisher","unstructured":"Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3D convolutional networks. In: 2015 IEEE International Conference on Computer Vision (ICCV), pp. 4489\u20134497 (2015). https:\/\/doi.org\/10.1109\/ICCV.2015.510","DOI":"10.1109\/ICCV.2015.510"},{"issue":"009","key":"34_CR19","first-page":"2068","volume":"36","author":"Q Wang","year":"2014","unstructured":"Wang, Q., Zhang, R.: A blind image forensic algorithm based on double quantization mapping relationship of DCT coefficients. J. Electron. Inf. Technol. 36(009), 2068\u20132074 (2014)","journal-title":"J. Electron. Inf. Technol."},{"issue":"002","key":"34_CR20","first-page":"269","volume":"37","author":"X Wang","year":"2010","unstructured":"Wang, X., Lu, Z.: Automatic localization of image tampering area based on JPEG block effect difference. Comput. Sci. 37(002), 269\u2013273 (2010)","journal-title":"Comput. Sci."},{"key":"34_CR21","unstructured":"Wu, W., Zhan, L.: Detection of tampering using color filter array characteristics and fuzzy estimation. Comput. Eng. Des. 28(21), 5179\u20135180, 5256 (2007)"},{"key":"34_CR22","unstructured":"Yang, H., Zhou, Z., Zhou, C.: Mobile image tampering detection based on pattern noise. J. Comput. Syst. Appl. (2013)"},{"issue":"1","key":"34_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/sym10010003","volume":"10","author":"Y Yao","year":"2018","unstructured":"Yao, Y., Shi, Y., Weng, S., Guan, B.: Deep learning for detection of object-based forgery in advanced video. Symmetry 10(1), 3 (2018). https:\/\/doi.org\/10.3390\/sym10010003","journal-title":"Symmetry"},{"issue":"011","key":"34_CR24","first-page":"66","volume":"34","author":"J Zhang","year":"2011","unstructured":"Zhang, J., Chen, J., Su, Y.: Detection of region-duplication forgery in the video streams. Electron. Meas. Technol. 34(011), 66\u201369 (2011)","journal-title":"Electron. Meas. Technol."},{"key":"34_CR25","doi-asserted-by":"publisher","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1053\u20131061 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00116","DOI":"10.1109\/CVPR.2018.00116"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:39:01Z","timestamp":1709829541000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}