{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:15:22Z","timestamp":1749701722600,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486734"},{"type":"electronic","value":"9783319486741"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48674-1_29","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T04:00:37Z","timestamp":1477886437000},"page":"324-336","source":"Crossref","is-referenced-by-count":2,"title":["Original Image Tracing with Image Relational Graph for Near-Duplicate Image Elimination"],"prefix":"10.1007","author":[{"given":"Fang","family":"Huang","sequence":"first","affiliation":[]},{"given":"Zhili","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Tianliang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiya","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"9","key":"29_CR1","doi-asserted-by":"crossref","first-page":"1404","DOI":"10.1109\/LSP.2014.2377795","volume":"22","author":"J Yao","year":"2015","unstructured":"Yao, J., Yang, B., Zhu, Q.: Near-duplicate image retrieval based on contextual descriptor. IEEE Sig. Proc. Lett. 22(9), 1404\u20131408 (2015)","journal-title":"IEEE Sig. Proc. Lett."},{"issue":"1","key":"29_CR2","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/s10851-014-0511-6","volume":"51","author":"B Chen","year":"2014","unstructured":"Chen, B., Shu, H., Coatrieux, G., et al.: Color image analysis by quaternion-type moments. J. Math. Imag. Vis. 51(1), 124\u2013144 (2014)","journal-title":"J. Math. Imag. Vis."},{"issue":"3","key":"29_CR3","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., et al.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Liu, J., Huang, Z., Cheng, H., et al.: Presenting diverse location views with real-time near-duplicate photo elimination. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 505\u2013516. IEEE (2013)","DOI":"10.1109\/ICDE.2013.6544851"},{"issue":"1","key":"29_CR5","first-page":"101","volume":"50","author":"C Ming","year":"2013","unstructured":"Ming, C., Wang, S., Yun, X., et al.: FAIDA: a fast and accurate image deduplication approach. J. Comput. Res. Dev. 50(1), 101\u2013110 (2013)","journal-title":"J. Comput. Res. Dev."},{"issue":"10","key":"29_CR6","doi-asserted-by":"crossref","first-page":"1533","DOI":"10.1109\/TIFS.2014.2340017","volume":"9","author":"FDO Costa","year":"2014","unstructured":"Costa, F.D.O., Oikawa, M.A., Dias, Z., et al.: Image phylogeny forests reconstruction. IEEE Trans. Inf. Forensics Secur. 9(10), 1533\u20131546 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"29_CR7","first-page":"181","volume":"10","author":"Y Lei","year":"2014","unstructured":"Lei, Y., Qiu, G., Zheng, L., et al.: Fast near-duplicate image detection using uniform randomized trees. ACM Trans. Multimedia Comput. Commun. Appl. 10(4), 181\u2013184 (2014)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Wang, X.J., Zhang, L., Liu, C.: Duplicate discovery on 2 billion internet images. In: Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 882\u2013889. IEEE Computer Society (2013)","DOI":"10.1109\/CVPRW.2013.71"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Vonikakis, V., Jinda-Apiraksa, A., Winkler, S.: PhotoCluster: a multi-clustering technique for near-duplicate detection in personal photo collections. In: 2014 International Conference on Computer Vision Theory and Applications (VISAPP), pp. 153\u2013161. IEEE (2014)","DOI":"10.5220\/0004737701530161"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/978-3-319-16865-4_29","volume-title":"Computer Vision \u2013 ACCV 2014","author":"Q Luo","year":"2015","unstructured":"Luo, Q., Zhang, S., Huang, T., Gao, W., Tian, Q.: Hybrid-indexing multi-type features for large-scale image search. In: Cremers, D., Reid, I., Saito, H., Yang, M.-H. (eds.) ACCV 2014. LNCS, vol. 9003, pp. 446\u2013460. Springer, Heidelberg (2015)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Liu, C., Lu, X., Ji, S., et al.: A fog level detection method based on image HSV color histogram. In: 2014 International Conference on Progress in Informatics and Computing (PIC), pp. 373\u2013377. IEEE (2014)","DOI":"10.1109\/PIC.2014.6972360"},{"issue":"5","key":"29_CR12","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIP.2014.2310123","volume":"23","author":"S Amit","year":"2014","unstructured":"Amit, S., Xudong, J., How-Lung, E.: LBP-based edge-texture features for object recognition. IEEE Trans. Image Process. Publ. IEEE Sig. Process. Soc. 23(5), 1953\u20131964 (2014)","journal-title":"IEEE Trans. Image Process. Publ. IEEE Sig. Process. Soc."},{"issue":"3","key":"29_CR13","first-page":"404","volume":"100","author":"H Bay","year":"2006","unstructured":"Bay, H., Tuytelaars, T., Gool, L.V.: SURF: speeded up robust features. Comput. Vis. Image Underst. 100(3), 404\u2013417 (2006)","journal-title":"Comput. Vis. Image Underst."},{"issue":"2","key":"29_CR14","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D Lowe","year":"2004","unstructured":"Lowe, D.: Distinctive image features from scale\u2013invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"issue":"11","key":"29_CR15","doi-asserted-by":"crossref","first-page":"1877","DOI":"10.1109\/TPAMI.2008.121","volume":"30","author":"J Yushi","year":"2008","unstructured":"Yushi, J., Shumeet, B.: VisualRank: applying pagerank to large-scale image search. IEEE Trans. Pattern Anal. Mach. Intell. 30(11), 1877\u20131890 (2008)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48674-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T22:37:19Z","timestamp":1749681439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48674-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486734","9783319486741"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48674-1_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}