{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:28:18Z","timestamp":1742920098416,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031379390"},{"type":"electronic","value":"9783031379406"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37940-6_12","type":"book-chapter","created":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T20:23:00Z","timestamp":1690057380000},"page":"136-149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Method for Near-Duplicate Image Detection Using Global Features"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8159-9024","authenticated-orcid":false,"given":"Kunj Bihari","family":"Meena","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4994-3686","authenticated-orcid":false,"given":"Vipin","family":"Tyagi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,23]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"An, S., Huang, Z., Weng, D., Chen, Y.: Near duplicate product image detection based on binary hashing. In: ACM International Conference Proceeding Series, pp. 75\u201380 (2017)","key":"12_CR1","DOI":"10.1145\/3094243.3094260"},{"doi-asserted-by":"crossref","unstructured":"Cao, Y., Zhang, H., Gao, Y., Guo, J.: An efficient duplicate image detection method based on Affine-SIFT feature. In: Proceedings \u2013 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT2010, pp. 794\u2013797 (2010)","key":"12_CR2","DOI":"10.1109\/ICBNMT.2010.5705199"},{"doi-asserted-by":"crossref","unstructured":"Chen, L., Stentiford, F.W.M.: Comparison of near-duplicate image matching. In: IET Conference Publications, pp. 38\u201342 (2006)","key":"12_CR3","DOI":"10.1049\/cp:20061969"},{"issue":"3","key":"12_CR4","doi-asserted-by":"publisher","first-page":"4385","DOI":"10.3233\/JIFS-201192","volume":"40","author":"MA Elaskily","year":"2021","unstructured":"Elaskily, M.A., Alkinani, M.H., Sedik, A., Dessouky, M.M.: Deep learning based algorithm (ConvLSTM) for Copy Move Forgery Detection. J. Intell. Fuzzy Syst. 40(3), 4385\u20134405 (2021)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"8","key":"12_CR5","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1109\/TIP.2007.900099","volume":"16","author":"J Hsiao","year":"2007","unstructured":"Hsiao, J., Chen, C., Chien, L., Chen, M.: A new approach to image copy detection based on extended feature sets. IEEE Trans. Image Process. 16(8), 2069\u20132079 (2007)","journal-title":"IEEE Trans. Image Process."},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"4452","DOI":"10.1109\/TIP.2018.2839886","volume":"27","author":"W Hu","year":"2018","unstructured":"Hu, W., Fan, Y., Xing, J., Maybank, S.: Deep constrained Siamese hash coding network and load-balanced locality-sensitive hashing for near duplicate image detection. IEEE Trans. Image Process. 27, 4452\u20134464 (2018)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.1109\/TMM.2009.2032676","volume":"11","author":"Y Hu","year":"2009","unstructured":"Hu, Y., Cheng, X., Chia, L.T., Xie, X., Rajan, D., Tan, A.H.: Coherent phrase model for efficient image near-duplicate retrieval. IEEE Trans. Multimedia 11(8), 1434\u20131445 (2009)","journal-title":"IEEE Trans. Multimedia"},{"key":"12_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMM.2020.2966878","volume":"9210","author":"Z Huang","year":"2020","unstructured":"Huang, Z., Liu, S.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimed. 9210, 1\u201314 (2020)","journal-title":"IEEE Trans. Multimed."},{"doi-asserted-by":"crossref","unstructured":"Jinda-Apiraksa, A., Vonikakis, V., Winkler, S.: California-ND: an annotated dataset for near-duplicate detection in personal photo collections. In: 2013 Fifth International Workshop on Quality of Multimedia Experience (QoMEX), pp. 142\u2013147 (2013)","key":"12_CR9","DOI":"10.1109\/QoMEX.2013.6603227"},{"issue":"6","key":"12_CR10","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s11265-018-1360-0","volume":"91","author":"H Kim","year":"2018","unstructured":"Kim, H., Sohn, S., Kim, J.: Revisiting Gist-PCA hashing for near duplicate image detection. J. Signal Process. Syst. 91(6), 575\u2013586 (2018). https:\/\/doi.org\/10.1007\/s11265-018-1360-0","journal-title":"J. Signal Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Kozat, S.S., Venkatesan, R., Mih\u00e7ak, M.K.: Robust perceptual image hashing via matrix invariants. In: Proceedings \u2013 International Conference on Image Processing, ICIP, vol. 2, pp. 3443\u20133446 (2004)","key":"12_CR11","DOI":"10.1109\/ICIP.2004.1421855"},{"issue":"4","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1109\/TIP.2015.2400229","volume":"24","author":"L Liu","year":"2015","unstructured":"Liu, L., Lu, Y., Suen, C.Y.: Variable-length signature for near-duplicate image matching. IEEE Trans. Image Process. 24(4), 1282\u20131296 (2015)","journal-title":"IEEE Trans. Image Process."},{"unstructured":"Ahmed, S.M.H.M.A., Hasan, A.S.M.Z., Hossain, M.A.: Image copy detection using scale invariant feature transform (SURF). Int. J. Comp. Appl. 112(16) (2015)","key":"12_CR13"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-021-11483-x","volume":"82","author":"KB Meena","year":"2021","unstructured":"Meena, K.B., Tyagi, V.: Image splicing forgery detection using noise level estimation. Multimed. Tools Appl. 82, 1\u201318 (2021). https:\/\/doi.org\/10.1007\/s11042-021-11483-x","journal-title":"Multimed. Tools Appl."},{"doi-asserted-by":"crossref","unstructured":"Meena, K.B., Tyagi, V.: Distinguishing computer-generated images from photographic images using two-stream convolutional neural network. Appl. Soft Comput. 100, 107025 (2021)","key":"12_CR15","DOI":"10.1016\/j.asoc.2020.107025"},{"doi-asserted-by":"crossref","unstructured":"Meena, K.B., Tyagi, V.: A copy-move image forgery detection technique based on tetrolet transform. J. Inf. Security Appl. 52, 102481 (2020)","key":"12_CR16","DOI":"10.1016\/j.jisa.2020.102481"},{"issue":"23","key":"12_CR17","doi-asserted-by":"publisher","first-page":"33505","DOI":"10.1007\/s11042-019-08082-2","volume":"78","author":"KB Meena","year":"2019","unstructured":"Meena, K.B., Tyagi, V.: A copy-move image forgery detection technique based on Gaussian-Hermite moments. Multimed. Tools Appl. 78(23), 33505\u201333526 (2019). https:\/\/doi.org\/10.1007\/s11042-019-08082-2","journal-title":"Multimed. Tools Appl."},{"doi-asserted-by":"crossref","unstructured":"Meena, K.B., Tyagi, V.: Image forgery detection: survey and future directions. In: Data, Engineering and Applications. Springer Singapore, pp. 163\u2013194 (2019)","key":"12_CR18","DOI":"10.1007\/978-981-13-6351-1_14"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"30977","DOI":"10.1007\/s11042-022-12637-1","volume":"81","author":"P Mehta","year":"2022","unstructured":"Mehta, P., Tripathi, R.K.: Near-duplicate detection for LCD screen acquired images using edge histogram descriptor. Multimed. Tools Appl. 81, 30977\u201330995 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12637-1","journal-title":"Multimed. Tools Appl."},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.eswa.2019.05.002","volume":"135","author":"L Morra","year":"2019","unstructured":"Morra, L., Lamberti, F.: Benchmarking unsupervised near-duplicate image detection. Expert Syst. Appl. 135, 313\u2013326 (2019)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Shen, J.: Orthogonal Gaussian\u2013Hermite moments for image characterization. In: SPIE Intelligent Robots Computer Vision XVI, Pittsburgh, pp. 224\u2013233 (1997)","key":"12_CR21","DOI":"10.1117\/12.290295"},{"issue":"2","key":"12_CR22","first-page":"3","volume":"19","author":"M Srivastava","year":"2019","unstructured":"Srivastava, M., Siddiqui, J., Ali, M.A.: A review of hashing based image copy detection techniques. Cybernet. Inf. Technol. 19(2), 3\u201327 (2019)","journal-title":"Cybernet. Inf. Technol."},{"issue":"3","key":"12_CR23","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1007\/s11831-020-09400-w","volume":"28","author":"KK Thyagharajan","year":"2020","unstructured":"Thyagharajan, K.K., Kalaiarasi, G.: A review on near-duplicate detection of images using computer vision techniques. Arch. Comput. Meth. Eng. 28(3), 897\u2013916 (2020). https:\/\/doi.org\/10.1007\/s11831-020-09400-w","journal-title":"Arch. Comput. Meth. Eng."},{"doi-asserted-by":"crossref","unstructured":"Tyagi, V.: Understanding Digital Image Processing. CRC Press (2018)","key":"12_CR24","DOI":"10.1201\/9781315123905"},{"doi-asserted-by":"crossref","unstructured":"Tyagi, V.: Content-Based Image Retrieval: Ideas, Influences, and Current Trends. Springer (2018)","key":"12_CR25","DOI":"10.1007\/978-981-10-6759-4"},{"unstructured":"Venkatesan, R., Koon, S., Jakubowski, M.H., Moulin, P., Inst, B., Ave, N.M.: Robust image hashing. In: Proceedings 2000 International Conference on Image Processing, pp. 1\u20133 (2000)","key":"12_CR26"},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Pang, K., Zhou, X., Zhou, Y., Li, L., Xue, J.: A visual model-based perceptual image hash for content authentication. IEEE Trans. Inf. Forensic Security 10(7), 1336\u20131349 (2015)","key":"12_CR27","DOI":"10.1109\/TIFS.2015.2407698"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Lei, Y., Huang, J.: An image copy detection scheme based on radon transform. In: 2010 IEEE 17th International Conference on Image Processing, pp. 1009\u20131012 (2010)","key":"12_CR28","DOI":"10.1109\/ICIP.2010.5653456"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Hou, Z.J., Leman, K.: Keypoint-based near-duplicate images detection using affine invariant feature and color matching. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing \u2013 Proceedings, no. 1, pp. 1209\u20131212 (2011)","key":"12_CR29","DOI":"10.1109\/ICASSP.2011.5946627"},{"key":"12_CR30","first-page":"841","volume":"5308","author":"Y Wu","year":"2004","unstructured":"Wu, Y., Shen, J.: Moving object detection using orthogonal Gaussian-Hermite moments. Vis. Commun. Image Process. 5308, 841\u2013849 (2004)","journal-title":"Vis. Commun. Image Process."},{"issue":"1","key":"12_CR31","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Y Zhao","year":"2013","unstructured":"Zhao, Y., Wang, S., Zhang, X., Yao, H.: Robust hashing for image authentication using Zernike moments and local features. IEEE Trans. Inf. Forensics Secur. 8(1), 55\u201363 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12, 48\u201363 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37940-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T21:01:48Z","timestamp":1729803708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37940-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031379390","9783031379406"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37940-6_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair & Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"464","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}