{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:17:39Z","timestamp":1742973459998,"version":"3.40.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319464176"},{"type":"electronic","value":"9783319464183"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46418-3_48","type":"book-chapter","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T14:22:02Z","timestamp":1473430922000},"page":"544-552","source":"Crossref","is-referenced-by-count":0,"title":["Remote Sensing Data Copy-Move Forgery Protection Algorithm"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Kuznetsov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,10]]},"reference":[{"issue":"6","key":"48_CR1","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"48_CR2","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"48_CR3","first-page":"1053","volume":"2009","author":"S Bayram","year":"2009","unstructured":"Bayram, S., Sencar, H., Memon, H.: An efficient and robust method for detecting copy-move forgery. IEEE Int. Conf. Acoust. Speech Signal Process. 2009, 1053\u20131056 (2009)","journal-title":"IEEE Int. Conf. Acoust. Speech Signal Process."},{"issue":"3","key":"48_CR4","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1134\/S1054661815030074","volume":"25","author":"N Glumov","year":"2015","unstructured":"Glumov, N., Kuznetsov, A., Myasnikov, V.: Algorithms for detection of plain copy-move regions in digital images. Pattern Recogn. Image Anal. 25(3), 423\u2013429 (2015)","journal-title":"Pattern Recogn. Image Anal."},{"key":"48_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-319-11758-4_50","volume-title":"Image Analysis and Recognition","author":"KA Vladimirovich","year":"2014","unstructured":"Vladimirovich, K.A., Valerievich, M.V.: A fast plain copy-move detection algorithm based on structural pattern and 2D rabin-karp rolling hash. In: Campilho, A., Kamel, M. (eds.) ICIAR 2014. LNCS, vol. 8814, pp. 461\u2013468. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-11758-4_50"},{"issue":"1\u20133","key":"48_CR6","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"R Davarzani","year":"2013","unstructured":"Davarzani, R., Yaghmaie, K., Mozaffari, S., Tapak, M.: Copy-move forgery detection using multi-resolution local binary patterns. Forensic Sci. Int. 231(1\u20133), 61\u201372 (2013)","journal-title":"Forensic Sci. Int."},{"issue":"910","key":"48_CR7","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1016\/j.optlaseng.2011.05.003","volume":"49","author":"A Fernndez","year":"2011","unstructured":"Fernndez, A., lvarez, M.X., Bianconi, F.: Image classification with binary gradient contours. Opt. Lasers Eng. 49(910), 1177\u20131184 (2011)","journal-title":"Opt. Lasers Eng."}],"container-title":["Lecture Notes in Computer Science","Computer Vision and Graphics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46418-3_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T18:25:13Z","timestamp":1498328713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46418-3_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319464176","9783319464183"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46418-3_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}