{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:02:40Z","timestamp":1757311360977},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486734"},{"type":"electronic","value":"9783319486741"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48674-1_36","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T04:00:37Z","timestamp":1477886437000},"page":"404-416","source":"Crossref","is-referenced-by-count":3,"title":["Rotation Invariant Local Binary Pattern for Blind Detection of Copy-Move Forgery with Affine Transform"],"prefix":"10.1007","author":[{"given":"Pei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Gaobo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Dengyong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"1","key":"36_CR1","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"231","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi, O.M., Khoo, B.E.: Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci. Int. 231(1), 284\u2013295 (2013)","journal-title":"Forensic Sci. Int."},{"issue":"3","key":"36_CR2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., et al.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"36_CR3","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang, Y., Lu, W., Sun, W., et al.: Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 206(1), 178\u2013184 (2011)","journal-title":"Forensic Sci. Int."},{"key":"36_CR4","unstructured":"Farid, A.P., Popescu, A.C.: Exposing digital forgeries by detecting duplicated image regions. Technical report, TR2004-515, Department of Computer Science, Dartmouth College, Hanover, New Hampshire (2004)"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: Proceedings of International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1053\u20131056. IEEE (2009)","DOI":"10.1109\/ICASSP.2009.4959768"},{"issue":"6","key":"36_CR6","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1016\/j.compeleceng.2013.11.034","volume":"40","author":"L Li","year":"2014","unstructured":"Li, L., Li, S., Zhu, H., et al.: Detecting copy-move forgery under affine transforms for image forensics. Comput. Electr. Eng. 40(6), 1951\u20131962 (2014)","journal-title":"Comput. Electr. Eng."},{"issue":"2","key":"36_CR7","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2), 180\u2013189 (2007)","journal-title":"Forensic Sci. Int."},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Ryu, S.J., Lee, M.J., Lee, H.K.: Detection of copy-rotate-move forgery using zernike moments. In: Proceedings of Information Hiding (LH), pp. 51\u201365 (2010)","DOI":"10.1007\/978-3-642-16435-4_5"},{"issue":"1","key":"36_CR9","first-page":"46","volume":"4","author":"L Li","year":"2013","unstructured":"Li, L., Li, S., Zhu, H., et al.: An efficient scheme for detecting copy-move forged images by local binary patterns. J. Inf. Hiding Multimedia Sig. Process. 4(1), 46\u201356 (2013)","journal-title":"J. Inf. Hiding Multimedia Sig. Process."},{"issue":"1","key":"36_CR10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"R Davarzani","year":"2013","unstructured":"Davarzani, R., Yaghmaie, K., Mozaffari, S., et al.: Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci. Int. 231(1), 61\u201372 (2013)","journal-title":"Forensic Sci. Int."},{"issue":"3","key":"36_CR11","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., et al.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"36_CR12","first-page":"223","volume":"8","author":"BL Shivakumar","year":"2011","unstructured":"Shivakumar, B.L., Baboo, L.D.S.S.: Detection of region duplication forgery in digital images using SURF. IJCSI Int. J. Comput. Sci. Issues 8(4), 223\u2013229 (2011)","journal-title":"IJCSI Int. J. Comput. Sci. Issues"},{"issue":"6","key":"36_CR13","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., et al.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"36_CR14","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1109\/TSMCC.2011.2118750","volume":"41","author":"D Huang","year":"2011","unstructured":"Huang, D., Shan, C., Ardabilian, M., et al.: Local binary patterns and its application to facial image analysis: a survey. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 41(6), 765\u2013781 (2011)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"key":"36_CR15","unstructured":"Tralic, D., Zupancic, I., Grgic, S., et al.: CoMoFoD-new database for copy-move forgerydetection. In: Proceedings of 2013 55th International Symposium on ELMAR, pp. 49\u201354. IEEE (2013)"},{"issue":"2","key":"36_CR16","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TBC.2015.2419824","volume":"61","author":"Z Pan","year":"2015","unstructured":"Pan, Z., Zhang, Y., Kwong, S.: Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans. Broadcast. 61(2), 166\u2013176 (2015)","journal-title":"IEEE Trans. Broadcast."},{"issue":"7","key":"36_CR17","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., et al.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403\u20131416 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"36_CR18","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Wang, Z., et al.: Incremental learning for v-support vector regression. Neural Netw. 67, 140\u2013150 (2015)","journal-title":"Neural Netw."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48674-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:25:09Z","timestamp":1498357509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48674-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486734","9783319486741"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48674-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}