{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:48:35Z","timestamp":1761598115746,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813292901"},{"type":"electronic","value":"9789813292918"}],"license":[{"start":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:00:00Z","timestamp":1568937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-32-9291-8_7","type":"book-chapter","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T14:07:48Z","timestamp":1568902068000},"page":"75-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Copy\u2013Move Image Forgery Detection Using Gray-Tones with Texture Description"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8649-0463","authenticated-orcid":false,"given":"Anuja","family":"Dixit","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4257-8076","authenticated-orcid":false,"given":"Soumen","family":"Bag","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"issue":"11","key":"7_CR1","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi, M., Mahmoudi-Aznaveh, A., Talebpour, A.: Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans. Inf. Forensics Secur. 11(11), 2499\u20132512 (2016). \n                  https:\/\/doi.org\/10.1109\/TIFS.2016.2585118","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"7_CR2","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.1109\/TIP.2017.2682963","volume":"26","author":"C Chen","year":"2017","unstructured":"Chen, C., Ni, J., Shen, Z., Shi, Y.Q.: Blind forensics of successive geometric transformations in digital images using spectral method: theory and applications. IEEE Trans. Image Process. 26(6), 2811\u20132824 (2017). \n                  https:\/\/doi.org\/10.1109\/TIP.2017.2682963","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR3","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Digital Forensic Research Workshop, pp. 55\u201361. IEEE Computer Society (2003)"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"Mohammed Hazim Alkawaz","year":"2016","unstructured":"Alkawaz, M.H., Sulong, G., Saba, T., Rehman, A.: Detection of copy-move image forgery based on discrete cosine transform. Neural Comput. Appl. 1\u201310 (2016). \n                  https:\/\/doi.org\/10.1007\/s00521-016-2663-3","journal-title":"Neural Computing and Applications"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. IEEE International Workshop on Information Forensics and Security (WIFS), pp. 119\u2013124 (2014). \n                  https:\/\/doi.org\/10.13140\/RG.2.1.2189.5200","DOI":"10.13140\/RG.2.1.2189.5200"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2015.03.009","volume":"321","author":"Jen-Chun Lee","year":"2015","unstructured":"Lee, J.C., Chang, C.P., Chen, W.K.: Detection of copy-move image forgery using histogram of orientated gradients. Inf. Sci. 321(C), 250\u2013262 (2015). \n                  https:\/\/doi.org\/10.1016\/j.ins.2015.03.009","journal-title":"Information Sciences"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva, E., Carvalho, T., Ferreira, A., Rocha, A.: Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J. Vis. Commun. Image Represent. 29, 16\u201332 (2015). \n                  https:\/\/doi.org\/10.1016\/j.jvcir.2015.01.016","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1049\/iet-ipr.2016.0238","volume":"11","author":"X Shen","year":"2017","unstructured":"Shen, X., Shi, Z., Chen, H.: Splicing image forgery detection using textural features based on grey level co-occurrence matrices. IET Image Process. 11(1), 44\u201353 (2017). \n                  https:\/\/doi.org\/10.1049\/iet-ipr.2016.0238","journal-title":"IET Image Process."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patcog.2015.08.010","volume":"50","author":"Y Tai","year":"2016","unstructured":"Tai, Y., Yang, J., Luo, L., Zhang, F., Qian, J.: Learning discriminative singular value decomposition representation for face recognition. Pattern Recognit. 50, 1\u201316 (2016). \n                  https:\/\/doi.org\/10.1016\/j.patcog.2015.08.010","journal-title":"Pattern Recognit."},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Zhang, T., Wang, R.: Copy-move forgery detection based on SVD in digital images. In: International Congress on Image and Signal Processing, pp. 1\u20135 (2009). \n                  https:\/\/doi.org\/10.1109\/CISP.2009.5301325","DOI":"10.1109\/CISP.2009.5301325"},{"issue":"1","key":"7_CR11","first-page":"46","volume":"4","author":"L Li","year":"2013","unstructured":"Li, L., Li, S., Zhu, H., Chu, S.C., Roddick, J.F., Pan, J.S.: An efficient scheme for detecting copy-move forged images by local binary patterns. J. Inf. Hiding Multimed. Signal Process. 4(1), 46\u201356 (2013)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"issue":"4","key":"7_CR12","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/TIP.2011.2173697","volume":"21","author":"Z Li","year":"2012","unstructured":"Li, Z., Liu, G.Z., Yang, Y., You, Z.Y.: Scale and rotation-invariant local binary pattern using scale-adaptive texton subuniform-based circular shift and sub uniform-based circular shift. IEEE Trans. Image Process. 21(4), 2130\u20132140 (2012). \n                  https:\/\/doi.org\/10.1109\/TIP.2011.2173697","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR13","unstructured":"Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD\u2014new database for copy-move forgery detection. In: International Symposium Electronics in Marine, pp. 49\u201354 (2013)"},{"key":"7_CR14","unstructured":"Khan, S., Kulkarni, A.: An efficient method for detection of copy-move forgery using discrete wavelet transform. Int. J. Comput. Sci. Eng. 2(5), 1801\u20131806 (2010)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of 3rd International Conference on Computer Vision and Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-32-9291-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T14:08:44Z","timestamp":1568902124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-32-9291-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,20]]},"ISBN":["9789813292901","9789813292918"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-32-9291-8_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,20]]},"assertion":[{"value":"20 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}