{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:20:19Z","timestamp":1774264819617,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T00:00:00Z","timestamp":1439337600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61070062"],"award-info":[{"award-number":["61070062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s00530-015-0478-1","type":"journal-article","created":{"date-parts":[[2015,8,11]],"date-time":"2015-08-11T03:40:34Z","timestamp":1439264434000},"page":"223-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Exposing video inter-frame forgery by Zernike opponent chromaticity moments and coarseness analysis"],"prefix":"10.1007","volume":"23","author":[{"given":"Yuqing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tianqiang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,12]]},"reference":[{"issue":"6","key":"478_CR1","first-page":"77","volume":"32","author":"W Chen","year":"2011","unstructured":"Chen, W., Yang, G., Chen, R., Zhu, N.: Digital video passive forensics for its authenticity and source. J. Commun. 32(6), 77\u2013182 (2011)","journal-title":"J. Commun."},{"key":"478_CR2","first-page":"8","volume-title":"Digital image forensics","author":"L Zhou","year":"2008","unstructured":"Zhou, L., Wang, D.: Digital image forensics, pp. 8\u201313. Beijing University of Posts and Telecommunications Press, Beijing (2008)"},{"key":"478_CR3","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H.: Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the 8th Workshop on Multimedia and Security. ACM, pp. 37\u201347 (2006)","DOI":"10.1145\/1161366.1161375"},{"issue":"3","key":"478_CR4","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TIFS.2007.902661","volume":"2","author":"W Wang","year":"2007","unstructured":"Wang, W., Farid, H.: Exposing digital forgeries in interlaced and deinterlaced video. IEEE Trans. Inf. Forensics Secur. 2(3), 438\u2013449 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"478_CR5","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H.: Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th Workshop on Multimedia & security. ACM, pp. 35\u201342 (2007)","DOI":"10.1145\/1288869.1288876"},{"key":"478_CR6","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H.: Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM Workshop on Multimedia and Security. ACM, pp. 39\u201348 (2009)","DOI":"10.1145\/1597817.1597826"},{"key":"478_CR7","doi-asserted-by":"crossref","unstructured":"Su, Y., Zhang, J., Liu, J.: Exposing digital video forgery by detecting motion-compensated edge artifact. In: IEEE International Conference on Computational Intelligence and Software Engineering, pp. 1\u20134 (2009)","DOI":"10.1109\/CISE.2009.5366884"},{"key":"478_CR8","first-page":"227","volume":"46","author":"Y Qin","year":"2009","unstructured":"Qin, Y., Sun, G., Zhang, X.: Exposing digital forgeries in video via motion vectors. J. Comput. Res. Dev. 46, 227\u2013233 (2009)","journal-title":"J. Comput. Res. Dev."},{"issue":"4","key":"478_CR9","first-page":"13","volume":"41","author":"T Huang","year":"2011","unstructured":"Huang, T., Chen, Z.: Digital video forgeries detection based on bidirectional motion vectors. J. Shandong Univ. (Engineering Science) 41(4), 13\u201319 (2011)","journal-title":"J. Shandong Univ. (Engineering Science)"},{"key":"478_CR10","doi-asserted-by":"crossref","unstructured":"Hsu, C.C., Hung, T.Y., Lin, C.W.: Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 170\u2013174 (2008)","DOI":"10.1109\/MMSP.2008.4665069"},{"key":"478_CR11","first-page":"128","volume":"12","author":"X Xiao","year":"2008","unstructured":"Xiao, X., Zheng, H., Che, X.U.: Digital video forgeries detection based on prediction error. Inform. Secur. Commun. Priv. 12, 128\u2013130 (2008)","journal-title":"Inform. Secur. Commun. Priv."},{"key":"478_CR12","first-page":"13","volume":"S2","author":"J Wang","year":"2008","unstructured":"Wang, J., Liu, G.: Detection of forgery in digital video based on pattern noise. J. Southeast Univ. (Natural Science Edition) S2, 13\u201317 (2008)","journal-title":"J. Southeast Univ. (Natural Science Edition)"},{"issue":"6","key":"478_CR13","first-page":"91","volume":"21","author":"X Yuan","year":"2012","unstructured":"Yuan, X., Huang, T., Cheng, Z.: Digital video forgeries detection based on textural features. Comput. Syst. Appl. 21(6), 91\u201395 (2012)","journal-title":"Comput. Syst. Appl."},{"key":"478_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, J., Su, Y., Zhang, M.: Exposing digital video forgery by ghost shadow artifact. In: Proceedings of the First ACM Workshop on Multimedia in Forensics. ACM, pp. 49\u201354 (2009)","DOI":"10.1145\/1631081.1631093"},{"key":"478_CR15","doi-asserted-by":"crossref","unstructured":"Subramanyam, A.V., Emmanuel, S.: Video forgery detection using HOG features and compression properties. In: IEEE 14th International Workshop on Multimedia Signal Processing (MMSP), pp. 89\u201394 (2012)","DOI":"10.1109\/MMSP.2012.6343421"},{"issue":"5","key":"478_CR16","first-page":"493","volume":"47","author":"T Huang","year":"2011","unstructured":"Huang, T., Cheng, Z., Su, L.: Digital video forgeries detection based on content continuity. J. Nanjing Univ. (Natural Sciences) 47(5), 493\u2013503 (2011)","journal-title":"J. Nanjing Univ. (Natural Sciences)"},{"issue":"9","key":"478_CR17","first-page":"106","volume":"22","author":"Z Cheng","year":"2013","unstructured":"Cheng, Z., Huang, T., Wu, T.: Detection and recovery for copy-move forgery in homologous video. Comput. Syst. Appl. 22(9), 106\u2013110 (2013)","journal-title":"Comput. Syst. Appl."},{"key":"478_CR18","first-page":"267","volume-title":"A Novel Video Inter-Frame Forgery Model Detection Scheme Based on Optical Flow Consistency, Digital Forensics and Watermarking","author":"J Chao","year":"2013","unstructured":"Chao, J., Jiang, X., Sun, T.: A Novel Video Inter-Frame Forgery Model Detection Scheme Based on Optical Flow Consistency, Digital Forensics and Watermarking, pp. 267\u2013281. Springer, Berlin\/Heidelberg (2013)"},{"issue":"04","key":"478_CR19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.4236\/jcc.2014.24008","volume":"2","author":"Q Wang","year":"2014","unstructured":"Wang, Q., Li, Z., Zhang, Z.: Video inter-frame forgery identification based on consistency of correlation coefficients of gray values. J. Comput. Commun. 2(04), 51\u201357 (2014)","journal-title":"J. Comput. Commun."},{"issue":"8","key":"478_CR20","first-page":"91","volume":"22","author":"T Wu","year":"2013","unstructured":"Wu, T., Huang, T.: Video tamper detection based on inverse gravity density semi-supervised learning. Comput. Syst. Appl. 22(8), 91\u2013102 (2013)","journal-title":"Comput. Syst. Appl."},{"key":"478_CR21","doi-asserted-by":"crossref","unstructured":"Li, F., Huang, T.: Video copy-move forgery detection and localization based on structural similarity. In: Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013), pp. 63\u201376 (2014)","DOI":"10.1007\/978-3-642-41407-7_7"},{"issue":"07","key":"478_CR22","first-page":"1","volume":"26","author":"GS Lin","year":"2012","unstructured":"Lin, G.S., Chang, J.F.: Detection of frame duplication forgery in videos based on spatial and temporal analysis. Int. J. Pattern Recognit. Artif. Intell. 26(07), 1\u201318 (2012)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"issue":"1","key":"478_CR23","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1049\/ip-vis:20045064","volume":"153","author":"PT Yap","year":"2006","unstructured":"Yap, P.T., Paramesran, R.: Content-based image retrieval using Legendre chromaticity distribution moments. IEE Proc. Vis. Image Signal Processing 153(1), 17\u201324 (2006)","journal-title":"IEE Proc. Vis. Image Signal Processing"},{"key":"478_CR24","doi-asserted-by":"crossref","DOI":"10.1002\/9780470684757","volume-title":"Moments and Moment Invariants in Pattern Recognition","author":"J Flusser","year":"2009","unstructured":"Flusser, J., Zitova, B., Suk, T.: Moments and Moment Invariants in Pattern Recognition. Wiley, Chichester (2009)"},{"issue":"4","key":"478_CR25","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.1016\/j.amc.2012.07.055","volume":"219","author":"H Qin","year":"2012","unstructured":"Qin, H., Qin, L., Xue, L.: A parallel recurrence method for the fast computation of Zernike moments. Appl. Math. Comput. 219(4), 1549\u20131561 (2012)","journal-title":"Appl. Math. Comput."},{"issue":"6","key":"478_CR26","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TSMC.1978.4309999","volume":"8","author":"H Tamura","year":"1978","unstructured":"Tamura, H., Mori, S., Yamawaki, T.: Textural features corresponding to visual perception. IEEE Trans. Syst. Man Cybern. 8(6), 460\u2013473 (1978)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"478_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, X., Shen, P., Gao, J.: A license plate recognition system based on Tamura texture in complex conditions. In: IEEE International Conference on Information and Automation (ICIA), pp. 1947\u20131952 (2010)","DOI":"10.1109\/ICINFA.2010.5512011"},{"key":"478_CR28","doi-asserted-by":"crossref","unstructured":"Majtner, T., Svoboda, D., Extension of Tamura texture features for 3D fluorescence microscopy. In: 2012 IEEE Second International Conference on 3D Imaging, Modeling, Processing, Visualization and Transmission (3DIMPVT), pp. 301\u2013307 (2012)","DOI":"10.1109\/3DIMPVT.2012.61"},{"key":"478_CR29","unstructured":"http:\/\/sulfa.cs.surrey.ac.uk\/index.php"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-015-0478-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00530-015-0478-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-015-0478-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-015-0478-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T23:22:17Z","timestamp":1748560937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00530-015-0478-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,12]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["478"],"URL":"https:\/\/doi.org\/10.1007\/s00530-015-0478-1","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,12]]}}}