{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:51:37Z","timestamp":1725742297633},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400988"},{"type":"electronic","value":"9783642400995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40099-5_25","type":"book-chapter","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T16:32:17Z","timestamp":1374683537000},"page":"300-310","source":"Crossref","is-referenced-by-count":0,"title":["Rapid Image Splicing Detection Based on Relevance Vector Machine"],"prefix":"10.1007","author":[{"given":"Bo","family":"Su","sequence":"first","affiliation":[]},{"given":"Quanqiao","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Yujin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mengying","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Shilin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","first-page":"915","volume-title":"IEEE International Conference on Multimedia and Expo.","author":"Z. Zhang","year":"2004","unstructured":"Zhang, Z., Qiu, G., Sun, Q., Lin, X., Ni, Z., Shi, Y.Q.: A Unified Authentication Framework for JPEG 2000. In: IEEE International Conference on Multimedia and Expo., vol.\u00a02, pp. 915\u2013918. IEEE Press, New York (2004)"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/B978-012369476-8\/50017-8","volume-title":"Multimedia Security Technologies for Digital Rights","author":"T.T. Ng","year":"2006","unstructured":"Ng, T.T., Chang, S.F., Lin, C.Y., Sun, Q.: Passive-blind Image Forensics. In: Zeng, W., Yu, H., Lin, C.Y. (eds.) Multimedia Security Technologies for Digital Rights, ch. 15, pp. 383\u2013412. Academic Press, Missouri (2006)"},{"key":"25_CR3","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1288869.1288878","volume-title":"9th Workshop on Multimedia and Security","author":"Y.Q. Shi","year":"2007","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A Natural Image Model Approach to Splicing Detection. In: 9th Workshop on Multimedia and Security, pp. 51\u201362. ACM, New York (2007)"},{"key":"25_CR4","first-page":"1","volume-title":"7th Workshop on Multimedia and Security","author":"M.K. Johnson","year":"2005","unstructured":"Johnson, M.K., Farid, H.: Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In: 7th Workshop on Multimedia and Security, pp. 1\u201310. ACM, New York (2005)"},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H. Farid","year":"2009","unstructured":"Farid, H.: Exposing Digital Forgeries from JPEG Ghost. IEEE Transactions onInformation Forensics and Security\u00a04(1), 154\u2013160 (2009)","journal-title":"IEEE Transactions onInformation Forensics and Security"},{"unstructured":"Fridrich, J., Lukas, J.: Digital Bullet Scratches for Images. In: Proceeding of IEEE International Conference on Image Processing, Genova, Italy (2005)","key":"25_CR6"},{"doi-asserted-by":"crossref","unstructured":"Pan, X., Lyu, S.: Detecting image region duplication using SIFT features. In: 2010 Acoustics Speech and Signal Processing, ICASSP 2010 (2010)","key":"25_CR7","DOI":"10.1109\/ICASSP.2010.5495482"},{"unstructured":"Wang, W., Dong, J., Tan, T.: Effective image splicing detection based on image chroma. In: 2009 International Conference on Image Processing, ICIP 2009 (2009)","key":"25_CR8"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/S0146-664X(75)80008-6","volume":"4","author":"M.M. Galloway","year":"1975","unstructured":"Galloway, M.M.: Texture analysis using gray level run lengths. Cornput. Graphics Image. Proc.\u00a04, 172\u2013179 (1975)","journal-title":"Cornput. Graphics Image. Proc."},{"unstructured":"Dong, J., Tan, T.N.: Blind image steganalysis based on run-length histogram analysis. In: 15th International Conference of Image Processing 2008 (ICIP 2008), pp. 2064\u20132067 (2008)","key":"25_CR10"},{"key":"25_CR11","first-page":"1257","volume-title":"16th IEEE International Conference on Image Processing","author":"W. Wang","year":"2009","unstructured":"Wang, W., Dong, J., Tan, T.: Effective Image Splicing Detection Based on Image Chroma. In: 16th IEEE International Conference on Image Processing, pp. 1257\u20131260. IEEE Press, New York (2009)"},{"unstructured":"Tipping, M.E.: The Relevance Vector Machine. In: Solla, S.A., Leen, T.K., M\u00fcller, K.-R. (eds.) Advances in Neural Information Processing Systems 12, pp. 652\u2013658. MIT Press (2000)","key":"25_CR12"},{"unstructured":"Tipping, M.E.: Sparse Bayesian learning and the relevance vector machine. Journal of Machine Learning Research, 211\u2013244 (2001)","key":"25_CR13"},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H. Abdi","year":"2010","unstructured":"Abdi, H., Williams, L.J.: Principal Component Analysis. \u00a0Wiley Interdisciplinary Reviews: Computational Statistics\u00a02, 433\u2013459 (2010)","journal-title":"\u00a0Wiley Interdisciplinary Reviews: Computational Statistics"},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1162\/neco.1992.4.5.720","volume":"4","author":"D.J.C. MacKay","year":"1992","unstructured":"MacKay, D.J.C.: The evidence framework applied to classificationnetworks. Neural Comput.\u00a04(5), 720\u2013736 (1992)","journal-title":"Neural Comput."},{"issue":"2","key":"25_CR16","first-page":"1053","volume":"100","author":"D.J.C. MacKay","year":"1994","unstructured":"MacKay, D.J.C.: Bayesian non-linearmodeling for the prediction competition. \u00a0ASHRAE Transactions, ASHRAE\u00a0100(2), 1053\u20131056 (1994)","journal-title":"\u00a0ASHRAE Transactions, ASHRAE"},{"unstructured":"Columbia DVMM Research Lab. Columbia Image Splicing Detection EvaluationDataset (2004), http:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/authsplcuncmp\/","key":"25_CR17"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermaking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40099-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T11:44:21Z","timestamp":1688384661000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40099-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400988","9783642400995"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40099-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}