{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T03:10:07Z","timestamp":1746414607781,"version":"3.40.4"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319117577"},{"type":"electronic","value":"9783319117584"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11758-4_50","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T10:56:18Z","timestamp":1412852178000},"page":"461-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Fast Plain Copy-Move Detection Algorithm Based on Structural Pattern and 2D Rabin-Karp Rolling Hash"],"prefix":"10.1007","author":[{"given":"Kuznetsov Andrey","family":"Vladimirovich","sequence":"first","affiliation":[]},{"given":"Myasnikov Vladislav","family":"Valerievich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,10]]},"reference":[{"key":"50_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-540-30114-1_10","volume-title":"Information Hiding","author":"AC Popescu","year":"2004","unstructured":"Popescu, A.C., Farid, H.: Statistical tools for digital forensics. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 128\u2013147. Springer, Heidelberg (2004)"},{"key":"50_CR2","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of copy\u2013move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, pp. 55\u201361 (2003)"},{"issue":"2","key":"50_CR3","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Science International 171(2), 180\u2013189 (2007)","journal-title":"Forensic Science International"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, J., Feng, Z., Su, Y.: A new approach for detecting copy-move forgery in digital images. In: Proceedings of the International Conference on Communication Systems, pp. 362\u2013366 (2008)","DOI":"10.1109\/ICCS.2008.4737205"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Dybala, B., Jennings, B., Letscher, D.: Detecting filtered cloning in digital images. In: Proceedings of the Workshop on Multimedia and Security, pp. 43\u201350 (2007)","DOI":"10.1145\/1288869.1288877"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm. In: Proceedings of the Pacific-Asia Workshop on Computational Intelligence and Industrial Application, pp. 272\u2013276 (2008)","DOI":"10.1109\/PACIIA.2008.240"},{"issue":"4","key":"50_CR7","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan, X., Lyu, S.: Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security 5(4), 857\u2013867 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"50_CR8","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"50_CR9","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms (1990)"}],"container-title":["Lecture Notes in Computer Science","Image Analysis and Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11758-4_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T02:44:46Z","timestamp":1746413086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11758-4_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319117577","9783319117584"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11758-4_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"10 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}