{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:47:19Z","timestamp":1762004839365},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T00:00:00Z","timestamp":1477872000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s10044-016-0588-1","type":"journal-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T06:48:03Z","timestamp":1477896483000},"page":"451-467","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["Robust copy\u2013move forgery detection using quaternion exponent moments"],"prefix":"10.1007","volume":"21","author":[{"given":"Xiang-yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yu-nan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Pei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hong-ying","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,31]]},"reference":[{"issue":"Part A","key":"588_CR1","first-page":"46","volume":"39","author":"AQ Muhammad","year":"2015","unstructured":"Muhammad AQ, Mohamed D (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39(Part A):46\u201374","journal-title":"Signal Process Image Commun"},{"issue":"6","key":"588_CR2","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J (2012) An evaluation of popular copy\u2013move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"588_CR3","doi-asserted-by":"crossref","first-page":"4013","DOI":"10.1007\/s11042-013-1809-x","volume":"74","author":"J Chambers","year":"2015","unstructured":"Chambers J, Yan W, Garhwal A (2015) Currency security and forensics: a survey. Multimed Tools Appl 74(11):4013\u20134043","journal-title":"Multimed Tools Appl"},{"key":"588_CR4","doi-asserted-by":"crossref","unstructured":"Ali Qureshi M, Deriche M (2014) A review on copy move image forgery detection techniques. In: 11th International multi-conference on systems, signals and devices (SSD). Barcelona, Spain, pp 1\u20135","DOI":"10.1109\/SSD.2014.6808907"},{"issue":"3","key":"588_CR5","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226\u2013245","journal-title":"Digit Investig"},{"issue":"1\u20133","key":"588_CR6","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"231","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi OM, Khoo BE (2013) Passive detection of copy\u2013move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1\u20133):284\u2013295","journal-title":"Forensic Sci Int"},{"issue":"3","key":"588_CR7","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/TIFS.2012.2188390","volume":"7","author":"P Kakar","year":"2012","unstructured":"Kakar P, Sudha N (2012) Exposing postprocessed copy\u2013paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018\u20131028","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"588_CR8","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1049\/iet-ipr.2012.0388","volume":"7","author":"T Qazi","year":"2013","unstructured":"Qazi T, Hayat K, Khan SU (2013) Survey on blind image forgery detection. IET Image Process 7(7):660\u2013670","journal-title":"IET Image Process"},{"issue":"8","key":"588_CR9","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"C Pun","year":"2015","unstructured":"Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705\u20131716","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"588_CR10","doi-asserted-by":"crossref","unstructured":"Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). Prague, pp 1880\u20131883","DOI":"10.1109\/ICASSP.2011.5946873"},{"issue":"8","key":"588_CR11","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355\u20131370","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1\u20133","key":"588_CR12","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"R Davarzani","year":"2013","unstructured":"Davarzani R, Yaghmaie K, Mozaffari S (2013) Copy\u2013move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1\u20133):61\u201372","journal-title":"Forensic Sci Int"},{"key":"588_CR13","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2014) Copy\u2013move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP). Paris, France, pp 5312\u20135316","DOI":"10.1109\/ICIP.2014.7026075"},{"key":"588_CR14","doi-asserted-by":"crossref","unstructured":"Fattah SA, Ullah MMI, Ahmed M (2014) A scheme for copy\u2013move forgery detection in digital images based on 2D-DWT. In: IEEE 57th international midwest symposium on circuits and systems (MWSCAS). College Station, TX, pp 801\u2013804","DOI":"10.1109\/MWSCAS.2014.6908536"},{"key":"588_CR15","doi-asserted-by":"crossref","unstructured":"Imamoglu M, Ulutas G, Ulutas M (2013) Detection of copy\u2013move forgery using Krawtchouk moment. In: 2013 8th International conference on electrical and electronics engineering. Bursa, Turkey, pp 311\u2013314","DOI":"10.1109\/ELECO.2013.6713851"},{"key":"588_CR16","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.ins.2015.03.009","volume":"321","author":"J Lee","year":"2015","unstructured":"Lee J, Chang C, Chen W (2015) Detection of copy\u2013move image forgery using histogram of orientated gradients. Inf Sci 321:250\u2013262","journal-title":"Inf Sci"},{"issue":"1","key":"588_CR17","first-page":"1","volume":"57","author":"YJ Wu","year":"2014","unstructured":"Wu YJ, Yu D, Duan HB (2014) Dual tree complex wavelet transform approach to copy-rotate-move forgery detection. Sci China Inf Sci 57(1):1\u201312","journal-title":"Sci China Inf Sci"},{"issue":"1\u20133","key":"588_CR18","first-page":"158","volume":"233","author":"Z Jie","year":"2013","unstructured":"Jie Z, Guo J (2013) Passive forensics for copy\u2013move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1\u20133):158\u2013166","journal-title":"Forensic Sci Int"},{"key":"588_CR19","unstructured":"Ketenci S, Ulutas G, Ulutas M (2014) Detection of duplicated regions in images using 1D-Fourier transform. In: International conference on systems, signals and image processing. Dubrovnik, Croatia, pp 171\u2013174"},{"key":"588_CR20","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.jvcir.2015.07.007","volume":"31","author":"JC Lee","year":"2015","unstructured":"Lee JC (2015) Copy\u2013move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320\u2013334","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"588_CR21","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"G Muhammad","year":"2012","unstructured":"Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49\u201357","journal-title":"Digit Investig"},{"key":"588_CR22","doi-asserted-by":"crossref","unstructured":"Al-Qershi OM, Khoo BE (2015) Enhanced matching method for copy\u2013move forgery detection by means of Zernike moments. In: 13th International workshop on digital-forensics and watermarking (IWDW 2014), LNCS 9023, pp 485\u2013497","DOI":"10.1007\/978-3-319-19321-2_37"},{"issue":"3","key":"588_CR23","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R (2011) A SIFT-based forensic method for copy\u2013move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"588_CR24","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A (2015) Going deeper into copy\u2013move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16\u201332","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"588_CR25","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/TIFS.2012.2188390","volume":"7","author":"P Kakar","year":"2012","unstructured":"Kakar P, Sudha N (2012) Exposing postprocessed copy\u2013paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018\u20131028","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"588_CR26","doi-asserted-by":"crossref","unstructured":"Caldelli R, Amerini I, Ballan L (2012) On the effectiveness of local warping against SIFT-based copy\u2013move detection. In: Proceedings of the 5th international symposium on communications, control and signal processing. Rome, Italy, pp 1\u20135","DOI":"10.1109\/ISCCSP.2012.6217846"},{"issue":"10","key":"588_CR27","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy\u2013move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"588_CR28","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1109\/TIFS.2014.2337654","volume":"9","author":"A Costanzo","year":"2014","unstructured":"Costanzo A, Amerini I, Caldelli R (2014) Forensic analysis of SIFT keypoint removal and injection. IEEE Trans Inf Forensics Secur 9(9):1450\u20131464","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"588_CR29","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B (2015) Segmentation-based image copy\u2013move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"588_CR30","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen L, Lu W, Ni J, Sun W (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244\u2013254","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"588_CR31","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s00138-013-0522-0","volume":"25","author":"M Jaberi","year":"2014","unstructured":"Jaberi M, Bebis G, Hussain M (2014) Accurate and robust localization of duplicated region in copy\u2013move image forgery. Mach Vis Appl 25(2):451\u2013475","journal-title":"Mach Vis Appl"},{"key":"588_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2362-y","author":"L Yu","year":"2015","unstructured":"Yu L, Han Q, Niu X (2015) Feature point-based copy\u2013move forgery detection: covering the non-textured areas. Multimed Tools Appl. doi:\n                        10.1007\/s11042-014-2362-y","journal-title":"Multimed Tools Appl"},{"key":"588_CR33","volume-title":"Exponent moments and its application in pattern recognition","author":"YJ Jiang","year":"2011","unstructured":"Jiang YJ (2011) Exponent moments and its application in pattern recognition. Beijing University of Posts and Telecommunications, Beijing"},{"key":"588_CR34","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1016\/j.ins.2014.02.158","volume":"277","author":"Wang Xiang-yang","year":"2014","unstructured":"Xiang-yang Wang, Pan-pan Niu, Hong-ying Yang, Chun-peng Wang, Ai-long Wang (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731\u2013754","journal-title":"Inf Sci"},{"issue":"5","key":"588_CR35","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","volume":"25","author":"T Zong","year":"2015","unstructured":"Zong T, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25(5):717\u2013729","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"588_CR36","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.neucom.2013.07.027","volume":"124","author":"R Zhang","year":"2014","unstructured":"Zhang R, Wei F, Li B (2014) E2LSH based multiple kernel approach for object detection. Neurocomputing 124(2):105\u2013110","journal-title":"Neurocomputing"},{"issue":"6","key":"588_CR37","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381\u2013395","journal-title":"Commun ACM"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-016-0588-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-016-0588-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-016-0588-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T02:02:56Z","timestamp":1524448976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-016-0588-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,31]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["588"],"URL":"https:\/\/doi.org\/10.1007\/s10044-016-0588-1","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,31]]}}}