{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:21:36Z","timestamp":1761675696182},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_7","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T07:17:59Z","timestamp":1254208679000},"page":"76-87","source":"Crossref","is-referenced-by-count":51,"title":["Run-Length and Edge Statistics Based Approach for Image Splicing Detection"],"prefix":"10.1007","author":[{"given":"Jing","family":"Dong","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tieniu","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yun Q.","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Gloe, T., Kirchner, M., Winkler, A., Behme, R.: Can we trust digital image foren- sics? In: Proceedings of the 15th international conference on Multimedia, pp. 78\u201386 (2007)","DOI":"10.1145\/1291233.1291252"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1155\/S1110865702204047","volume":"2002","author":"C. Rey","year":"2002","unstructured":"Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process.\u00a02002(1), 613\u2013621 (2002)","journal-title":"EURASIP J. Appl. Signal Process."},{"issue":"7","key":"7_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/278476.278484","volume":"41","author":"N.M. Yeung","year":"1998","unstructured":"Yeung, N.M.: Digital watermarking introduction. CACM\u00a041(7), 31\u201333 (1998)","journal-title":"CACM"},{"key":"7_CR4","unstructured":"Fridrich, J.: Methods for tamper detection in digital images. In: Proceedings of the ACM Workshop on Multimedia and Security, pp. 19\u201323 (1999)"},{"key":"7_CR5","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic research Workshop (August 2003)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Luo, W., Qu, Z., Pan, F., Huang, J.: A survey of passive technology for digital image forensics. In: Front. Comput. Sciences of China, vol.\u00a01(2)","DOI":"10.1007\/s11704-007-0017-0"},{"key":"7_CR7","unstructured":"Ng, T.T., Chang, S.F.: A model for image splicing. In: 2004 International Conference on Image Processing (ICIP 2004), pp. 1169\u20131172 (2004)"},{"key":"7_CR8","unstructured":"Ng, T.T., Chang, S.F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE International Symposium on Circuits and Systems (2004)"},{"key":"7_CR9","unstructured":"Ng, T.T., Chang, S.F.: Blind detection of photomontage using higher order statistics. In: ADVENT Technical Report 201-2004-1. Columbia University (June 8, 2004)"},{"key":"7_CR10","unstructured":"Ng, T.T., Chang, S., Sun, Q.: A data set of authentic and spliced image blocks. In: ADVENT Technical Report 203-2004-3. Columbia University (June 2004), http:\/\/www.ee.columbia.edu\/trustfoto"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., Farid, H.: Exposing digital forgeries by detecting inconsistencies in lighting. In: ACM Multimedia and Security Workshop (2005)","DOI":"10.1145\/1073170.1073171"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Hsu, Y., Chang, S.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE ICME (July 2006)","DOI":"10.1109\/ICME.2006.262447"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/11922841_15","volume-title":"Digital Watermarking","author":"D. Fu","year":"2006","unstructured":"Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 177\u2013187. Springer, Heidelberg (2006)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Chen, W., Shi, Y.Q.: Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. In: Imaging: Security, Steganography, and Watermarking of Multimedia Contents (January 2007)","DOI":"10.1117\/12.704321"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-92238-4_13","volume-title":"Digital Watermarking","author":"Y.Q. Shi","year":"2008","unstructured":"Shi, Y.Q., Chen, C., Xuan, G.: Steganalysis versus splicing detection. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol.\u00a05041, pp. 158\u2013172. Springer, Heidelberg (2008)"},{"key":"7_CR16","first-page":"26","volume-title":"Computer","author":"N.F. Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Exploring steganography: Seeing the unseen. In: Computer, vol.\u00a031, pp. 26\u201334. IEEE Computer Society, Los Alamitos (1998)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Dong, J., Tan, T.: Blind image steganalysis based on run-length histogram analysis. In: 2008 IEEE International Conference on Image Processing(ICIP 2008) (2008)","DOI":"10.1109\/ICIP.2008.4712192"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Galloway, M.M.: Texture analysis using gray level run lengths. In: Cornput. Graph. Image Proc., vol.\u00a04, pp. 171\u2013179 (1975)","DOI":"10.1016\/S0146-664X(75)80008-6"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: ACM Workshop on Multimedia and Security, ACM MMSEC 2007 (2007)","DOI":"10.1145\/1288869.1288878"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/s004260000024","volume":"64","author":"P. Kovesi","year":"2000","unstructured":"Kovesi, P.: Phase congruency: A low-level image invariant. Psych. Research\u00a064, 136\u2013148 (2000)","journal-title":"Psych. Research"},{"key":"7_CR21","first-page":"271","volume-title":"Pattern Classification and Scene Analysis","author":"I. Sobel","year":"1973","unstructured":"Sobel, I., Feldman, G.: A 3x3 isotropic gradient operator for image processing. In: Duda, R., Hart, P. (eds.) Pattern Classification and Scene Analysis, pp. 271\u2013272. John Wiley and Sons, Chichester (1973)"},{"key":"7_CR22","volume-title":"Mathematical methods for physicists","author":"G. Arfken","year":"1985","unstructured":"Arfken, G.: Mathematical methods for physicists, 3rd edn. Academic Press, Orlando (1985)","edition":"3"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T18:37:03Z","timestamp":1558550223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}