{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:12:02Z","timestamp":1743117122412,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642240300"},{"type":"electronic","value":"9783642240317"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24031-7_52","type":"book-chapter","created":{"date-parts":[[2011,9,23]],"date-time":"2011-09-23T01:29:11Z","timestamp":1316741351000},"page":"516-525","source":"Crossref","is-referenced-by-count":10,"title":["A Non-intrusive Method for Copy-Move Forgery Detection"],"prefix":"10.1007","author":[{"given":"Najah","family":"Muhammad","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad","family":"Hussain","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ghulam","family":"Muhamad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"George","family":"Bebis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., Memon, N.: An Efficient and Robust Method for Detecting Copy-Move Forgery. In: Proc. IEEE ICASSP, pp. 1053\u20131056 (2009)","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Chen, M., et al.: Determining Image Origin and Integrity Using Sensor Noise. IEEE Transactions on Information Forensics and Security, 74\u201390 (2008)","DOI":"10.1109\/TIFS.2007.916285"},{"key":"52_CR3","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of Copy Move Forgery in Digital Images. In: Digital Forensic Research Workshop, Cleveland, OH (2003)"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Huang, H., et al.: Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm. In: Pacific-Asia Workshop on Computational Intell. Industrial App., pp. 272\u2013276 (2008)","DOI":"10.1109\/PACIIA.2008.240"},{"key":"52_CR5","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn., Section 8.2: Counting sort, pp. 168\u2013170. MIT Press and McGraw-Hill (2001)"},{"key":"52_CR6","first-page":"926","volume-title":"Identifying Tampered regions using singular value decomposition in Digital image forensics","author":"X. Kang","year":"2008","unstructured":"Kang, X., Wei, S.: Identifying Tampered regions using singular value decomposition in Digital image forensics, pp. 926\u2013930. IEEE Computer Society, USA (2008)"},{"key":"52_CR7","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-642-02312-5_19","volume-title":"Forensics in Telecommunications, Information and Multimedia","author":"Y. Li","year":"2009","unstructured":"Li, Y., Li, C.-T.: Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. In: Sorell, M. (ed.) e-Forensics 2009. LNICST, vol.\u00a08, pp. 166\u2013172. Springer, Heidelberg (2009)"},{"key":"52_CR8","unstructured":"Lin, H.-J., Wang, C.-W., Kao, Y.-T.: Fast Copy-Move Forgery Detection. WSEAS Trans. Signal Process, 188\u2013197 (2009)"},{"key":"52_CR9","unstructured":"Lin, H.J., Wang, C.W.,, Y.: Fast Copy-Move Forgery Detection. In: World Scientific and Engineering Academy and Society (WSEAS), pp. 188\u2013197 (2009)"},{"key":"52_CR10","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161, J., et al.: Detecting Digital Image Forgeries Using Sensor Pattern Noise. In: Proc. of SPIE (2006)","DOI":"10.1117\/12.640109"},{"key":"52_CR11","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B. Mahdian","year":"2007","unstructured":"Mahdian, B., Saic, S.: Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants. Forensic Science International\u00a0171, 180\u2013189 (2007)","journal-title":"Forensic Science International"},{"key":"52_CR12","doi-asserted-by":"crossref","unstructured":"Mahdian, B., Saic, S.: Using Noise Inconsistencies for Blind Image Forensics. Image and Vision Computing, 1497\u20131503 (2009)","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"52_CR13","unstructured":"Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Duplicated Image Regions. Dept. Comput. Sci., Dartmouth College,Tech.Rep. TR2004-515 (2004)"},{"key":"52_CR14","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., et al.: Tamper Detection Based on Regularity of Wavelet Transform Coefficients. In: Proc. IEEE ICIP, pp. 397\u2013400 (2007)","DOI":"10.1109\/ICIP.2007.4378975"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Detection of Image Region Duplication Forgery Using Model with Circle Block. In: International Conf. Multimedia Inform. Network. and Security, pp. 25\u201329 (2009)","DOI":"10.1109\/MINES.2009.142"},{"key":"52_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, J., Feng, Z., Su, Y.: A New Approach for Detecting Copy-Move Forgery in Digital Images. In: IEEE Singapore Int. Conf. Comm. Sys., China, pp. 362\u2013366 (2008)","DOI":"10.1109\/ICCS.2008.4737205"},{"key":"52_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, P., Kong, X.: Detecting Image Tampering Using Feature Fusion. In: International Conference on Availability, Reliability and Security, pp. 335\u2013340 (2009)","DOI":"10.1109\/ARES.2009.150"},{"key":"52_CR18","unstructured":"Cour, T., et al.: Spectral Segmentation with Multiscale Graph Decomposition. In: IEEE International Conference on Computer Vision and Pattern Recognition, CVPR (2005)"},{"key":"52_CR19","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. (2002)"}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24031-7_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T20:50:48Z","timestamp":1741726248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24031-7_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642240300","9783642240317"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24031-7_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}