{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:56:54Z","timestamp":1742803014052},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_6","type":"book-chapter","created":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:08:03Z","timestamp":1509311283000},"page":"61-73","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points"],"prefix":"10.1007","author":[{"given":"Yong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hong-Xia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Han-Zhou","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"issue":"6","key":"6_CR1","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR2","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceeding on Digital Forensic Research Workshop, August 2003"},{"key":"6_CR3","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions in computer science. Dartmouth College, Technical Report TR2004-515 (2004)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Li, G., Wu, Q., Tu, D., Sun, S.J.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceeding of IEEE International Conference on Multimedia Expo (ICME), Beijing, 1750\u20131753, July 2007","DOI":"10.1109\/ICME.2007.4285009"},{"key":"6_CR5","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 1053\u20131056. IEEE (2015)"},{"issue":"2\u20133","key":"6_CR6","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2\u20133), 180\u2013189 (2007)","journal-title":"Forensic Sci. Int."},{"issue":"11","key":"6_CR7","first-page":"746","volume":"4","author":"W Luo","year":"2007","unstructured":"Luo, W., Huang, J., Qiu, G.: Robust detection of region-duplication forgery in digital image. Chin. J. Comput. 4(11), 746\u2013749 (2007)","journal-title":"Chin. J. Comput."},{"issue":"5","key":"6_CR8","first-page":"1801","volume":"2","author":"ES Khan","year":"2010","unstructured":"Khan, E.S., Kulkarni, E.A.: An efficient method for detection of copy-move forgery using discrete wavelet transform. Int. J. Comput. Sci. Eng. 2(5), 1801\u20131806 (2010)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"1","key":"6_CR9","doi-asserted-by":"crossref","first-page":"49","DOI":"10.2174\/1874061801004010049","volume":"4","author":"FY Shih","year":"2010","unstructured":"Shih, F.Y., Yuan, Y.: A comparison study on copy-cover image forgery detection. Open Artif. Intell. J. 4(1), 49\u201354 (2010)","journal-title":"Open Artif. Intell. J."},{"issue":"4","key":"6_CR10","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.ins.2013.03.028","volume":"239","author":"G Lynch","year":"2013","unstructured":"Lynch, G., Shih, F.Y., Liao, H.Y.M.: An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. 239(4), 253\u2013265 (2013)","journal-title":"Inf. Sci."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using sift algorithm. In: The Workshop on Computational Intelligence & Industrial Application, pp. 272\u2013276. IEEE (2008)","DOI":"10.1109\/PACIIA.2008.240"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou, Z., Wang, Y., Wu, J.Q.M., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48\u201363 (2017). doi:\n10.1109\/TIFS.2016.2601065","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"6_CR13","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Atnerini","year":"2011","unstructured":"Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"6_CR14","doi-asserted-by":"crossref","first-page":"91","DOI":"10.12785\/ijcds\/040203","volume":"4","author":"S Kumar","year":"2015","unstructured":"Kumar, S., Desai, J., Mukherjee, S.: A fast keypoint based hybrid method for copy move forgery detection. Int. J. Comput. Digital Syst. 4(2), 91\u201399 (2015)","journal-title":"Int. J. Comput. Digital Syst."},{"issue":"3","key":"6_CR15","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen, L., Lu, W., Ni, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Present. 24(3), 244\u2013254 (2013)","journal-title":"J. Vis. Commun. Image Present."},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015). doi:\n10.1109\/TIFS.2014.2381872","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"6_CR17","first-page":"304","volume":"30","author":"X Wang","year":"2016","unstructured":"Wang, X., He, G., Tang, C.: Keypoints-based image passive forensics method for copy-move attacks. Int. J. Pattern Recognit. Artif. Intell. 30(3), 304\u2013308 (2016)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"issue":"11","key":"6_CR18","doi-asserted-by":"crossref","first-page":"2274","DOI":"10.1109\/TPAMI.2012.120","volume":"31","author":"R Achanta","year":"2012","unstructured":"Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., Susstrunk, S.: SLIC super pixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 31(11), 2274\u20132282 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"6_CR19","doi-asserted-by":"publisher","unstructured":"Zheng, Y., Jeon, B., Xu, D., Wu, J.Q.M., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), pp. 961\u2013973 (2015). DOI:\n10.3233\/IFS-141378,2015","DOI":"10.3233\/IFS-141378,2015"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Harris, C.; Stephens, M.: A combined corner and edge detector. In: Proceedings of the Alvey Vision Conference, Manchester, UK, 2 September 1988","DOI":"10.5244\/C.2.23"},{"issue":"5","key":"6_CR21","first-page":"130","volume":"19","author":"M Yan-Ming","year":"2009","unstructured":"Yan-Ming, M., Mei-Hui, L., Yun-Qiong, W., Qiao-Sheng, F.: An improved corner detection method based on Harris. Comput. Technol. Develop. 19(5), 130\u2013133 (2009)","journal-title":"Comput. Technol. Develop."},{"issue":"3","key":"6_CR22","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Atnerini","year":"2011","unstructured":"Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move at tack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"6_CR23","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381\u2013395 (1981)","journal-title":"Commun. ACM"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security (WIFS), 119\u2013124 (2014)","DOI":"10.1109\/WIFS.2014.7084314"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:12:00Z","timestamp":1509311520000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}