{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:18:28Z","timestamp":1773235108452,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642400988","type":"print"},{"value":"9783642400995","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40099-5_20","type":"book-chapter","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T12:32:17Z","timestamp":1374669137000},"page":"242-252","source":"Crossref","is-referenced-by-count":19,"title":["Detecting Removed Object from Video with Stationary Background"],"prefix":"10.1007","author":[{"given":"Leida","family":"Li","sequence":"first","affiliation":[]},{"given":"Xuewei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gaobo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Guozhang","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"20_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H. Farid","year":"2009","unstructured":"Farid, H.: A survey of image forgery detection. IEEE Signal Processing Magnazine\u00a026(2), 16\u201325 (2009)","journal-title":"IEEE Signal Processing Magnazine"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: Proc. MMSec 2007, ACM Multimedia and Security Workshop, pp. 35\u201342 (2007)","DOI":"10.1145\/1288869.1288876"},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1109\/TIFS.2007.902661","volume":"2","author":"W.H. Wang","year":"2007","unstructured":"Wang, W.H., Farid, H.: Exposing digital forgeries in interlaced and de-interlaced video. IEEE Transactions on Information Forensics and Security\u00a02(3), 438\u2013449 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-88961-8_6","volume-title":"Information Hiding","author":"W. Wang","year":"2008","unstructured":"Wang, W., Farid, H.: Detecting re-projected video. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol.\u00a05284, pp. 72\u201386. Springer, Heidelberg (2008)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Wang, W.H., Farid, H.: Exposing digital forgeries in video by detecting double MPEG compression. In: Proc. MMSec 2006, ACM Multimedia and Security Workshop, pp. 37\u201347 (2006)","DOI":"10.1145\/1161366.1161375"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-04438-0_2","volume-title":"Digital Watermarking","author":"W. Chen","year":"2009","unstructured":"Chen, W., Shi, Y.Q.: Detection of double MPEG compression based on first digit statistics. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol.\u00a05450, pp. 16\u201330. Springer, Heidelberg (2009)"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-92957-4_27","volume-title":"Advances in Image and Video Technology","author":"M. Kobayashi","year":"2009","unstructured":"Kobayashi, M., Okabe, T., Sato, Y.: Detecting video forgeries based on noise characteristics. In: Wada, T., Huang, F., Lin, S. (eds.) PSIVT 2009. LNCS, vol.\u00a05414, pp. 306\u2013317. Springer, Heidelberg (2009)"},{"issue":"4","key":"20_CR8","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TIFS.2010.2074194","volume":"5","author":"M. Kobayashi","year":"2010","unstructured":"Kobayashi, M., Okabe, T., Sato, Y.: Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Transactions on Information Forensics and Security\u00a05(4), 883\u2013892 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Su, Y.T., Zhang, J., Liu, J.: Exposing digital video forgery by detecting motion-compensated edge artifact. In: Proc. CiSE 2009, International Conference on Computational Intelligence and Software Engineering, pp. 1\u20134 (2009)","DOI":"10.1109\/CISE.2009.5366884"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, J., Su, Y.T., Zhang, M.Y.: Exposing digital video forgery by ghost shadow artifact. In: Proc. MiFor 2009, ACM Workshop on Multimedia in Forensics, pp. 49\u201353 (2009)","DOI":"10.1145\/1631081.1631093"},{"issue":"7","key":"20_CR11","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1142\/S0218001410008317","volume":"24","author":"Y.T. Su","year":"2010","unstructured":"Su, Y.T., Zhang, J., Han, Y., Chen, J.: Exposing digital video logo-removal forgery by inconsistency of blur. International Journal of Pattern Recognition and Artificial Intelligence\u00a024(7), 1027\u20131046 (2010)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Chetty, G.: Blind and passive digital video tamper detection based on multimodal fusion. In: Proc. of the 14th WSEAS International Conference on Communications, pp. 109\u2013117 (2010)","DOI":"10.1109\/NSS.2010.8"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Chetty, G., Biswas, M., Singh, R.: Digital video tamper detection based on multimodal fusion of residue features. In: Proc. International Conference on Network and System Security, pp. 606\u2013613 (2010)","DOI":"10.1109\/NSS.2010.8"},{"key":"20_CR14","unstructured":"http:\/\/v.youku.com\/v_show\/id_XMTcwMzU4ODQ0.html"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermaking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40099-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T23:02:02Z","timestamp":1557961322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40099-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400988","9783642400995"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40099-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}