{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:40:07Z","timestamp":1748828407637,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_3","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"28-38","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Video Forgery by Estimating Extrinsic Camera Parameters"],"prefix":"10.1007","author":[{"given":"Xianglei","family":"Hu","sequence":"first","affiliation":[]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Runbiao","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","first-page":"e2","DOI":"10.1017\/ATSIP.2012.2","volume":"1","author":"S Milani","year":"2012","unstructured":"Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., Tagliasacchi, M., Tubaro, S.: An overview on video forensics. APSIPA Trans. Sig. Inf. Process. 1, e2 (2012). Cambridge Univ Press, Cambridge","journal-title":"APSIPA Trans. Sig. Inf. Process."},{"issue":"3","key":"3_CR2","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1109\/TIFS.2007.902661","volume":"2","author":"W Wang","year":"2007","unstructured":"Wang, W., Farid, H.: Exposing digital forgeries in interlaced and deinterlaced video. IEEE Trans. Inf. Forensics Secur. 2(3), 438\u2013449 (2007). IEEE Press, New York","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"3_CR3","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/TIFS.2012.2205568","volume":"7","author":"MC Stamm","year":"2012","unstructured":"Stamm, M.C., Lin, W.S., Liu, K.J.: Temporal forensics and anti-forensics for motion compensated video. IEEE Trans. Inf. Forensics Secur. 7(4), 1315\u20131329 (2012). IEEE Press, New York","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Hsu, C.C., Hung, T.Y., Lin, C.W., Hsu, C.T.: Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th Workshop on In Multimedia Signal Processing, pp. 170\u2013174. IEEE Press, New York(2008)","DOI":"10.1109\/MMSP.2008.4665069"},{"issue":"1","key":"3_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"M Chen","year":"2008","unstructured":"Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and intergrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74\u201390 (2008). IEEE Press, New York","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., Farid, H.: Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 1\u201310. ACM (2005)","DOI":"10.1145\/1073170.1073171"},{"issue":"4","key":"3_CR7","first-page":"28","volume":"32","author":"E Kee","year":"2013","unstructured":"Kee, E., O\u2019Brien, J.F., Farid, H.: Exposing photo manipulation with inconsistent shadows. ACM Trans. Graph. 32(4), 28 (2013). 1C-12. ACM","journal-title":"ACM Trans. Graph."},{"issue":"1","key":"3_CR8","first-page":"4","volume":"31","author":"JF O\u2019Brien","year":"2012","unstructured":"O\u2019Brien, J.F., Farid, H.: Exposing photo manipulation with inconsistent reflections. ACM Trans. Graph. 31(1), 4 (2012). 1C-11. ACM","journal-title":"ACM Trans. Graph."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th Workshop on Multimedia and Security, pp. 35\u201342. ACM (2007)","DOI":"10.1145\/1288869.1288876"},{"issue":"3","key":"3_CR10","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/LSP.2011.2182191","volume":"19","author":"H Yao","year":"2012","unstructured":"Yao, H., Wang, S.: Detecting image forgery using perspective constraints. Signal Process. Lett. 19(3), 123\u2013126 (2012). IEEE Press, New York","journal-title":"Signal Process. Lett."},{"key":"3_CR11","series-title":"Proceedings of International Workshop on Information Hiding","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_6","volume-title":"Detecting Re-projected Video","author":"W Wang","year":"2008","unstructured":"Wang, W., Farid, H.: Detecting Re-projected Video. Proceedings of International Workshop on Information Hiding. Springer, Heidelberg (2008)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Conotter, V., Boato, G., Farid, H.: Detecting photo manipulation on signs and billboards. In: 2010 17th IEEE International Conference on Image Processing, pp. 1741\u20131744. IEEE Press, New York (2010)","DOI":"10.1109\/ICIP.2010.5652906"},{"issue":"3","key":"3_CR13","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/TIFS.2010.2051666","volume":"5","author":"W Zhang","year":"2010","unstructured":"Zhang, W., Cao, X., Qu, Y., Hou, Y., Zhao, H., Zhang, C.: Detecting and extracting the photo composites using planar homography and graph cut. IEEE Trans. Inf. Forensics Secur. 5(3), 544\u2013555 (2010). IEEE Press, New York","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR14","unstructured":"Zhang, Z.: Flexible camera calibration by viewing a plane from unknown orientations. In: Proceedings of the Seventh IEEE International Conference on Computer Vision, vol. 1, pp. 666\u2013673 (2010)"},{"issue":"6","key":"3_CR15","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/TPAMI.2004.17","volume":"26","author":"D Nister","year":"2004","unstructured":"Nister, D.: An efficient solution to the five-point relative pose problem. IEEE Trans. Pattern Anal. Mach. Intell. 26(6), 756\u2013770 (2004). IEEE Press, New York","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"6","key":"3_CR16","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/34.601246","volume":"19","author":"R Hartley","year":"1997","unstructured":"Hartley, R.: In defense of the eight-point algorithm. IEEE Trans. Pattern Anal. Mach. Intell. 19(6), 580\u2013C593 (1997). IEEE Press, New York","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3_CR17","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-540-92238-4_3","volume-title":"Digital Watermarking","author":"Micah K. Johnson","year":"2008","unstructured":"Johnson, M.K., Farid, H.: Detecting photographic composites of people. In: Proceedings of International Workshop on Digital Watermarking, pp. 19\u201333. Springer, Heidelberg (2008)"},{"issue":"66","key":"3_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"2","author":"D Lowe","year":"2004","unstructured":"Lowe, D.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 2(66), 91\u2013110 (2004). Springer, Heidelberg","journal-title":"Int. J. Comput. Vis."},{"issue":"6","key":"3_CR19","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler, M.A., Bolles, R.C.: Random sample consensus: A paradigm for model fitting with applications to image analysisand automated cartography. Commun. ACM 24(6), 381\u2013395 (1981). ACM","journal-title":"Commun. ACM"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Wu, C.: Towards linear-time incremental structure from motion. In: 2013 International Conference on 3D Vision-3DV 2013, pp. 127\u2013134 (2013)","DOI":"10.1109\/3DV.2013.25"},{"key":"3_CR21","unstructured":"Wu, C.: VisualSFM: A Visual Structure from Motion System. http:\/\/ccwu.me\/vsfm\/"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Wu, C., Agarwal, S., Curless, B., Seitz, S.M.: Multicore bundle adjustment. In: IEEE Conference on Computer Vision and Pattern Recognition, pp: 3057\u20133064. IEEE Press, New York (2011)","DOI":"10.1109\/CVPR.2011.5995552"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T01:18:49Z","timestamp":1748827129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}