{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:48:14Z","timestamp":1743140894942,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319638584"},{"type":"electronic","value":"9783319638591"}],"license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-63859-1_2","type":"book-chapter","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T03:54:54Z","timestamp":1500263694000},"page":"11-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Algorithm for Asymmetric Clipping Detection Based on Parameter Optimization"],"prefix":"10.1007","author":[{"given":"Jiwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shaozhang","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yueying","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuhan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"issue":"9","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/TIFS.2016.2561898","volume":"11","author":"A Bharati","year":"2016","unstructured":"Bharati, A., Singh, R.: Detecting facial retouching using supervised deep learning. IEEE Trans. Inf. Forensics Secur. 11(9), 1903\u20131913 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"2_CR2","doi-asserted-by":"publisher","first-page":"71","DOI":"10.14257\/ijmue.2013.8.5.08","volume":"8","author":"Y Ke","year":"2013","unstructured":"Ke, Y., Shan, Q., Qin, F., Min, W.: Image recapture detection using multiple features. Int. J. Multimedia Ubiquit. Comput. 8(5), 71\u201382 (2013)","journal-title":"Int. J. Multimedia Ubiquit. Comput."},{"issue":"10","key":"2_CR3","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection by matching triangles of key points. IEEE Trans. Inf. Forensics Secur. 10(10), 2084\u20132094 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"2_CR4","first-page":"1","volume":"18","author":"ESM El-Alfy","year":"2014","unstructured":"El-Alfy, E.S.M., Qureshi, M.A.: Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Formal Pattern Anal. Appl. 18(3), 1\u201311 (2014)","journal-title":"Formal Pattern Anal. Appl."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Meng, X., Niu, S.: Technology of digital image tampering based on double JPEG compression. In: National Conference on Information Hiding and Multimedia Information Security (2010)","DOI":"10.1109\/IIHMSP.2010.111"},{"issue":"12","key":"2_CR6","first-page":"176","volume":"52","author":"C Guo","year":"2016","unstructured":"Guo, C., Hong, Y.: Automatic camera calibration method using checkerboard target. J. Comput. Eng. Appl. 52(12), 176\u2013179 (2016)","journal-title":"J. Comput. Eng. Appl."},{"key":"2_CR7","unstructured":"Zhang, Y., Win, L.L., Goh, J., Thing, V.L.L.: image region forgery detection: a deep learning approach. In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) (2016)"},{"issue":"11","key":"2_CR8","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/34.888718","volume":"22","author":"Z Zhang","year":"2000","unstructured":"Zhang, Z.: A flexible new technique for camera calibration. IEEE Trans. Pattern Anal. Mach. Intell. 22(11), 1330\u20131334 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Meng, X., Niu, S.: Asymmetric crop detection algorithm based on camera calibration. J. Electron. Inf. Technol. 34(10) (2012)","DOI":"10.3724\/SP.J.1146.2012.00357"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Johnson, M., Farid, H.: Detecting photographic composites of people. In: 6th International Workshop on Digital Watermarking, Guangzhou, China, vol. 5041, pp. 19\u201333 (2007)","DOI":"10.1007\/978-3-540-92238-4_3"}],"container-title":["Smart Innovation, Systems and Technologies","Advances in Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63859-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T07:59:08Z","timestamp":1557993548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63859-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"ISBN":["9783319638584","9783319638591"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63859-1_2","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2017,7,18]]},"assertion":[{"value":"18 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IIH-MSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Information Hiding and Multimedia Signal Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iih2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bit.kuas.edu.tw\/~iihmsp17\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}