{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:12:30Z","timestamp":1751515950668,"version":"3.41.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T00:00:00Z","timestamp":1740700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T00:00:00Z","timestamp":1740700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10044-025-01442-9","type":"journal-article","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T06:33:18Z","timestamp":1740724398000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Source screen identification using difference image mask obtained from images recaptured through screenshots based on spatial rich features"],"prefix":"10.1007","volume":"28","author":[{"given":"Areesha","family":"Anjum","sequence":"first","affiliation":[]},{"given":"Saiful","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Mahreen","family":"Saleem","sequence":"additional","affiliation":[]},{"given":"Nadia","family":"Siddiqui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,28]]},"reference":[{"issue":"5","key":"1442_CR1","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1080\/00450618.2018.1424241","volume":"51","author":"S Walia","year":"2019","unstructured":"Walia S, Kumar K (2019) Digital image forgery detection: a systematic scrutiny. Aust J Forensic Sci 51(5):488\u2013526. https:\/\/doi.org\/10.1080\/00450618.2018.1424241","journal-title":"Aust J Forensic Sci"},{"issue":"21","key":"1442_CR2","doi-asserted-by":"publisher","first-page":"30977","DOI":"10.1007\/S11042-022-12637-1","volume":"81","author":"P Mehta","year":"2022","unstructured":"Mehta P, Tripathi RK (2022) Near-duplicate detection for LCD screen acquired images using edge histogram descriptor. Multimed Tools Appl 81(21):30977\u201330995. https:\/\/doi.org\/10.1007\/S11042-022-12637-1","journal-title":"Multimed Tools Appl"},{"key":"1442_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2017.08.009","volume":"71","author":"K Pawel","year":"2017","unstructured":"Pawel K (2017) Digital image integrity\u2014a survey of protection and verification techniques. Digit Signal Process 71:1\u201326. https:\/\/doi.org\/10.1016\/j.dsp.2017.08.009","journal-title":"Digit Signal Process"},{"key":"1442_CR4","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701","author":"A Piva","year":"2013","unstructured":"Piva A (2013) An overview on image forensics. ISRN Signal Process. https:\/\/doi.org\/10.1155\/2013\/496701","journal-title":"ISRN Signal Process"},{"unstructured":"Kong C, Luo A, Wang S, Li H, Rocha A, Kot AC (2023) Pixel-inconsistency modeling for image manipulation localization. CoRR arXiv:2310.00234","key":"1442_CR5"},{"doi-asserted-by":"publisher","unstructured":"Anjum A, Islam S (2022) The detection of images recaptured through screenshots based on spatial rich model analysis. In: Computational intelligence based solutions for vision systems. IOP Publishing, United Kingdom, pp 7\u20131720. https:\/\/doi.org\/10.1088\/978-0-7503-4821-8ch7","key":"1442_CR6","DOI":"10.1088\/978-0-7503-4821-8ch7"},{"issue":"5","key":"1442_CR7","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1109\/TIFS.2015.2392566","volume":"10","author":"T Thongkamwitoon","year":"2015","unstructured":"Thongkamwitoon T, Muammar H, Dragotti P-L (2015) An image recapture detection algorithm based on learning dictionaries of edge profiles. IEEE Trans Inf Forensics Secur 10(5):953\u2013968. https:\/\/doi.org\/10.1109\/TIFS.2015.2392566","journal-title":"IEEE Trans Inf Forensics Secur"},{"doi-asserted-by":"publisher","unstructured":"Agarwal S, Fan W, Farid H (2018) A diverse large-scale dataset for evaluating rebroadcast attacks. In: 2018 IEEE international conference on acoustics, speech and signal processing, ICASSP 2018, Calgary, AB, Canada, April 15\u201320, 2018, pp 1997\u20132001. https:\/\/doi.org\/10.1109\/ICASSP.2018.8462205","key":"1442_CR8","DOI":"10.1109\/ICASSP.2018.8462205"},{"doi-asserted-by":"publisher","unstructured":"Anjum A, Islam S (2019) Hlrecapnet: convnet to detect high and low-resolution screen captured images. In: ICT for competitive strategies: proceedings of 4th international conference on information and communication technology for competitive strategies (ICTCS 2019), December 13\u201314, 2019, Udaipur, India (1st edn). CRC Press, pp 257\u2013264. https:\/\/doi.org\/10.1201\/9781003052098","key":"1442_CR9","DOI":"10.1201\/9781003052098"},{"issue":"1","key":"1442_CR10","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/3687264","volume":"57","author":"M Pooshideh","year":"2025","unstructured":"Pooshideh M, Beheshti A, Qi Y, Farhood H, Simpson M, Gatland N, Soltany M (2025) Presentation attack detection: a systematic literature review. ACM Comput Surv 57(1):25\u201312532. https:\/\/doi.org\/10.1145\/3687264","journal-title":"ACM Comput Surv"},{"doi-asserted-by":"crossref","unstructured":"Li J, Kong C, Wang S, Li H (2022) Two-branch multi-scale deep neural network for generalized document recapture attack detection. CoRR arXiv:2211.16786","key":"1442_CR11","DOI":"10.1109\/ICASSP49357.2023.10095419"},{"key":"1442_CR12","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1109\/TIFS.2023.3333548","volume":"19","author":"C Chen","year":"2024","unstructured":"Chen C, Li B, Cai R, Zeng J, Huang J (2024) Distortion model-based spectral augmentation for generalized recaptured document detection. IEEE Trans Inf Forensics Secur 19:1283\u20131298. https:\/\/doi.org\/10.1109\/TIFS.2023.3333548","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1442_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/J.PATCOG.2024.110433","volume":"151","author":"C Chen","year":"2024","unstructured":"Chen C, Li X, Chen B, Li H (2024) A distortion model guided adversarial surrogate for recaptured document detection. Pattern Recognit 151:110433. https:\/\/doi.org\/10.1016\/J.PATCOG.2024.110433","journal-title":"Pattern Recognit"},{"key":"1442_CR14","doi-asserted-by":"publisher","first-page":"5804665","DOI":"10.1155\/2021\/5804665","volume":"2021","author":"Y Wang","year":"2021","unstructured":"Wang Y, Sun Q, Rong D, Li S, Xu LD (2021) Image source identification using convolutional neural networks in iot environment. Wirel Commun Mob Comput 2021:5804665\u20131580466512. https:\/\/doi.org\/10.1155\/2021\/5804665","journal-title":"Wirel Commun Mob Comput"},{"doi-asserted-by":"publisher","unstructured":"Pasquini C, Brunetta C, Vinci AF, Conotter V, Boato G (2015) Towards the verification of image integrity in online news. In: 2015 IEEE international conference on multimedia & expo workshops, ICME workshops 2015, Turin, Italy, June 29\u2013July 3, 2015. IEEE Computer Society, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICMEW.2015.7169801","key":"1442_CR15","DOI":"10.1109\/ICMEW.2015.7169801"},{"doi-asserted-by":"publisher","unstructured":"Conotter V, Dang-Nguyen D, Boato G, Men\u00e9ndez M, Larson MA (2014) Assessing the impact of image manipulation on users\u2019 perceptions of deception. In: Rogowitz BE, Pappas TN, Ridder H (eds) Human vision and electronic imaging XIX, San Francisco, California, USA, February 3\u20136, 2014. SPIE proceedings, vol 9014. SPIE, p 90140. https:\/\/doi.org\/10.1117\/12.2039418","key":"1442_CR16","DOI":"10.1117\/12.2039418"},{"doi-asserted-by":"publisher","unstructured":"Yang M, Li S, Qiu X, Zeng J (2024) Research on the source tracing and authentication of mobile phone screenshot images. In: Lin JC-W, Shao H (eds) International conference on computer application and information security (ICCAIS 2023), vol 13090. International Society for Optics and Photonics, SPIE, p 130903. https:\/\/doi.org\/10.1117\/12.3026269","key":"1442_CR17","DOI":"10.1117\/12.3026269"},{"doi-asserted-by":"crossref","unstructured":"VESA (2017) Vesa displayid standard 2.0","key":"1442_CR18","DOI":"10.26416\/MED.116.2.2017.626"},{"issue":"3","key":"1442_CR19","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"JJ Fridrich","year":"2012","unstructured":"Fridrich JJ, Kodovsk\u00fd J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868\u2013882. https:\/\/doi.org\/10.1109\/TIFS.2012.2190402","journal-title":"IEEE Trans Inf Forensics Secur"},{"doi-asserted-by":"publisher","unstructured":"Liu Y, Guan Q, Zhao X, Cao Y (2018) Image forgery localization based on multi-scale convolutional neural networks. In: B\u00f6hme R, Pasquini C, Boato G, Sch\u00f6ttle P (eds) Proceedings of the 6th ACM workshop on information hiding and multimedia security, Innsbruck, Austria, June 20\u201322, 2018. ACM, Austria, pp 85\u201390. https:\/\/doi.org\/10.1145\/3206004.3206010","key":"1442_CR20","DOI":"10.1145\/3206004.3206010"},{"doi-asserted-by":"publisher","unstructured":"Li J, Wu G (2017) Image recapture detection through residual-based local descriptors and machine learning. In: Cloud computing and security - third international conference (ICCCS) 2017, Nanjing, China, June 16\u201318, 2017, revised selected papers, Part II, pp 653\u2013660. https:\/\/doi.org\/10.1007\/978-3-319-68542-7_56","key":"1442_CR21","DOI":"10.1007\/978-3-319-68542-7_56"},{"doi-asserted-by":"publisher","unstructured":"Saleem M, Warsi MR, Islam S (2019) Feature evaluation for learning underlying data-processing to enhance cloud trust through rich models. In: ICT for competitive strategies: proceedings of 4th international conference on information and communication technology for competitive strategies (ICTCS 2019), December 13\u201314, 2019, Udaipur, India (1st edn). CRC Press, pp 539\u2013544. https:\/\/doi.org\/10.1201\/9781003052098","key":"1442_CR22","DOI":"10.1201\/9781003052098"},{"doi-asserted-by":"publisher","unstructured":"Zhang R, Ni J (2020) A dense u-net with cross-layer intersection for detection and localization of image forgery. In: 2020 IEEE international conference on acoustics, speech and signal processing, ICASSP 2020, Barcelona, Spain, May 4\u20138, 2020. IEEE, Spain, pp 2982\u20132986. https:\/\/doi.org\/10.1109\/ICASSP40776.2020.9054068","key":"1442_CR23","DOI":"10.1109\/ICASSP40776.2020.9054068"},{"doi-asserted-by":"publisher","unstructured":"Yu H, Ng T-T, Sun Q (2008) Recaptured photo detection using specularity distribution. In: 15th IEEE international conference on image processing, 2008. ICIP 2008. IEEE, pp 3140\u20133143. https:\/\/doi.org\/10.1109\/ICIP.2008.4712461","key":"1442_CR24","DOI":"10.1109\/ICIP.2008.4712461"},{"doi-asserted-by":"crossref","unstructured":"Gao X, Ng T-T, Qiu B, Chang S-F (2010) Single-view recaptured image detection based on physics-based features. In: 2010 IEEE international conference on multimedia and expo (ICME). IEEE, pp 1469\u20131474","key":"1442_CR25","DOI":"10.1109\/ICME.2010.5583280"},{"doi-asserted-by":"publisher","unstructured":"Yin J, Fang Y (2012) Markov-based image forensics for photographic copying from printed picture. In: Proceedings of the 20th ACM international conference on multimedia. ACM, pp 1113\u20131116. https:\/\/doi.org\/10.1145\/2393347.2396396","key":"1442_CR26","DOI":"10.1145\/2393347.2396396"},{"doi-asserted-by":"publisher","unstructured":"Zhai X, Ni R, Zhao Y (2013) Recaptured image detection based on texture features. In: 2013 ninth international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 234\u2013237. https:\/\/doi.org\/10.1109\/IIHMSP.2013.67","key":"1442_CR27","DOI":"10.1109\/IIHMSP.2013.67"},{"doi-asserted-by":"publisher","unstructured":"Tsai M, Yuadi I, Tao Y, Yin J (2017) Source identification for printed documents. In: 3rd IEEE international conference on collaboration and internet computing, CIC 2017, San Jose, CA, USA, October 15\u201317, 2017. IEEE Computer Society, pp 54\u201358. https:\/\/doi.org\/10.1109\/CIC.2017.00019","key":"1442_CR28","DOI":"10.1109\/CIC.2017.00019"},{"doi-asserted-by":"publisher","unstructured":"Bibi M, Hamid A, Moetesum M, Siddiqi I (2019) Document forgery detection using printer source identification\u2014a text-independent approach. In: Second international workshop on computational document forensics, IWCDF@ICDAR 2019, Sydney, Australia, September 22\u201325, 2019. IEEE, , pp 7\u201312. https:\/\/doi.org\/10.1109\/ICDARW.2019.70134","key":"1442_CR29","DOI":"10.1109\/ICDARW.2019.70134"},{"doi-asserted-by":"publisher","unstructured":"Jiang W, Ho ATS, Treharne H, Shi YQ (2010) A novel multi-size block Benford\u2019s law scheme for printer identification. In: Qiu G, Lam K, Kiya H, Xue X, Kuo C-J, Lew MS (eds) Advances in multimedia information processing\u2014PCM 2010\u201411th Pacific rim conference on multimedia, Shanghai, China, September 21\u201324, 2010, proceedings, part I. Lecture notes in computer science, vol 6297. Springer, pp 643\u2013652. https:\/\/doi.org\/10.1007\/978-3-642-15702-8_59","key":"1442_CR30","DOI":"10.1007\/978-3-642-15702-8_59"},{"issue":"3","key":"1442_CR31","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1007\/S11042-013-1642-2","volume":"73","author":"M Tsai","year":"2014","unstructured":"Tsai M, Yin J, Yuadi I, Liu J (2014) Digital forensics of printed source identification for Chinese characters. Multimed Tools Appl 73(3):2129\u20132155. https:\/\/doi.org\/10.1007\/S11042-013-1642-2","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"1442_CR32","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1109\/TIFS.2017.2692722","volume":"12","author":"A Ferreira","year":"2017","unstructured":"Ferreira A, Bondi L, Baroffio L, Bestagini P, Huang J, Santos JA, Tubaro S, Rocha A (2017) Data-driven feature characterization techniques for laser printer attribution. IEEE Trans Inf Forensics Secur 12(8):1860\u20131873. https:\/\/doi.org\/10.1109\/TIFS.2017.2692722","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"1442_CR33","doi-asserted-by":"publisher","first-page":"1603","DOI":"10.1109\/TIFS.2017.2779441","volume":"13","author":"S Joshi","year":"2018","unstructured":"Joshi S, Khanna N (2018) Single classifier-based passive system for source printer classification using local texture features. IEEE Trans Inf Forensics Secur 13(7):1603\u20131614. https:\/\/doi.org\/10.1109\/TIFS.2017.2779441","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1442_CR34","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/TIFS.2019.2919869","volume":"15","author":"S Joshi","year":"2020","unstructured":"Joshi S, Khanna N (2020) Source printer classification using printer specific local texture descriptor. IEEE Trans Inf Forensics Secur 15:160\u2013171. https:\/\/doi.org\/10.1109\/TIFS.2019.2919869","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"1442_CR35","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/S11042-011-0835-9","volume":"67","author":"J Choi","year":"2013","unstructured":"Choi J, Lee H, Lee H (2013) Color laser printer forensic based on noisy feature and support vector machine classifier. Multimed Tools Appl 67(2):363\u2013382. https:\/\/doi.org\/10.1007\/S11042-011-0835-9","journal-title":"Multimed Tools Appl"},{"unstructured":"Kim D, Lee H (2014) Color laser printer identification using photographed halftone images. In: 22nd European signal processing conference, EUSIPCO 2014, Lisbon, Portugal, September 1\u20135. IEEE pp. 795\u2013799(2014)","key":"1442_CR36"},{"doi-asserted-by":"publisher","unstructured":"Tsai M, Liu J, Wang C, Chuang C (2011) Source color laser printer identification using discrete wavelet transform and feature selection algorithms. In: International symposium on circuits and systems (ISCAS 2011), May 15\u201319 2011, Rio de Janeiro, Brazil. IEEE, pp 2633\u20132636. https:\/\/doi.org\/10.1109\/ISCAS.2011.5938145","key":"1442_CR37","DOI":"10.1109\/ISCAS.2011.5938145"},{"issue":"1","key":"1442_CR38","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/S13640-022-00579-5","volume":"2022","author":"H James","year":"2022","unstructured":"James H, Gupta O, Raviv D (2022) Printing and scanning investigation for image counter forensics. EURASIP J Image Video Process 2022(1):2. https:\/\/doi.org\/10.1186\/S13640-022-00579-5","journal-title":"EURASIP J Image Video Process"},{"issue":"3","key":"1442_CR39","doi-asserted-by":"publisher","first-page":"50","DOI":"10.3390\/JIMAGING7030050","volume":"7","author":"A Ferreira","year":"2021","unstructured":"Ferreira A, Nowroozi E, Barni M (2021) Vipprint: validating synthetic image detection and source linking methods on a large scale dataset of printed documents. J Imaging 7(3):50. https:\/\/doi.org\/10.3390\/JIMAGING7030050","journal-title":"J Imaging"},{"key":"1442_CR40","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4454971.","author":"A Ferreira","year":"2021","unstructured":"Ferreira A, Nowroozi E, Barni M (2021) VIPPrint: a large scale dataset for colored printed documents authentication and source linking. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.4454971.","journal-title":"Zenodo"},{"doi-asserted-by":"publisher","unstructured":"Cao H, Kot AC (2010) Identification of recaptured photographs on lcd screens. In: 2010 IEEE international conference on acoustics speech and signal processing (ICASSP). IEEE, pp 1790\u20131793. https:\/\/doi.org\/10.1109\/ICASSP.2010.5495419","key":"1442_CR41","DOI":"10.1109\/ICASSP.2010.5495419"},{"unstructured":"Cao H (2010) Statistical image source model identification and forgery detection. PhD thesis, Nanyang Technological University","key":"1442_CR42"},{"unstructured":"Cao H, Kot AC (2010) Rose recaptured image dataset. http:\/\/rose1.ntu.edu.sg\/Datasets\/recapturedImages.asp","key":"1442_CR43"},{"unstructured":"Thongkamwitoon T, Muammar H, Dragotti P-L (2014) Recapture image database. http:\/\/www.commsp.ee.ic.ac.uk\/~pld\/research\/Rewind\/Recapture\/","key":"1442_CR44"},{"doi-asserted-by":"crossref","unstructured":"Muammar H, Dragotti PL (2013) An investigation into aliasing in images recaptured from an lcd monitor using a digital camera. In: 2013 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2242\u20132246","key":"1442_CR45","DOI":"10.1109\/ICASSP.2013.6638053"},{"doi-asserted-by":"crossref","unstructured":"Li R, Ni R, Zhao Y (2015) An effective detection method based on physical traits of recaptured images on lcd screens. In: International workshop on digital watermarking. Springer, pp 107\u2013116","key":"1442_CR46","DOI":"10.1007\/978-3-319-31960-5_10"},{"key":"1442_CR47","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.diin.2017.10.001","volume":"23","author":"K Wang","year":"2017","unstructured":"Wang K (2017) A simple and effective image-statistics-based approach to detecting recaptured images from lcd screens. Digit Investig 23:75\u201387","journal-title":"Digit Investig"},{"issue":"11\u201312","key":"1442_CR48","doi-asserted-by":"publisher","first-page":"6965","DOI":"10.1007\/s11042-019-08418-y","volume":"79","author":"A Anjum","year":"2020","unstructured":"Anjum A, Islam S (2020) Recapture detection technique based on edge-types by analysing high-frequency components in digital images acquired through LCD screens. Multimed Tools Appl 79(11\u201312):6965\u20136985. https:\/\/doi.org\/10.1007\/s11042-019-08418-y","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"1442_CR49","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/S11760-021-01974-7","volume":"16","author":"N Zhu","year":"2022","unstructured":"Zhu N, Guo Q, Cui M, Guo X (2022) Recaptured image forensics based on normalized local ternary count histograms of residual maps. Signal Image Video Process 16(1):165\u2013173. https:\/\/doi.org\/10.1007\/S11760-021-01974-7","journal-title":"Signal Image Video Process"},{"doi-asserted-by":"crossref","unstructured":"Won CS (2005) Feature extraction and evaluation using edge histogram descriptor in mpeg-7. In: Advances in multimedia information processing\u2014PCM 2004. Springer, Berlin, Heidelberg, pp 583\u2013590","key":"1442_CR50","DOI":"10.1007\/978-3-540-30543-9_73"},{"doi-asserted-by":"publisher","unstructured":"Li H, Wang S, Kot AC (2017) Image recapture detection with convolutional and recurrent neural networks. In: Media watermarking, security, and forensics 2017, Burlingame, CA, USA, 29 January 2017\u20132 February 2017, pp 87\u201391. https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2017.7.MWSF-329","key":"1442_CR51","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-329"},{"key":"1442_CR52","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-18405-5_8","volume-title":"Digital watermarking","author":"X Gao","year":"2011","unstructured":"Gao X, Qiu B, Shen J, Ng T-T, Shi YQ (2011) A smart phone image database for single image recapture detection. In: Kim H-J, Shi YQ, Barni M (eds) Digital watermarking. Springer, Berlin, Heidelberg, pp 90\u2013104"},{"doi-asserted-by":"publisher","unstructured":"Luo J, Guo J, Qiu W, Huang Z, Hui H (2021) Scale invariant domain generalization image recapture detection. In: Mantoro T, Lee M, Ayu MA, Wong KW, Hidayanto AN (eds) Neural information processing\u201428th international conference, ICONIP 2021, Sanur, Bali, Indonesia, December 8\u201312, 2021, proceedings, part IV. Lecture notes in computer science, vol 13111. Springer, Indonesia, pp 75\u201386. https:\/\/doi.org\/10.1007\/978-3-030-92273-3_7","key":"1442_CR53","DOI":"10.1007\/978-3-030-92273-3_7"},{"key":"1442_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/J.JVCIR.2022.103692","volume":"90","author":"G Li","year":"2023","unstructured":"Li G, Yao H, Le Y, Qin C (2023) Recaptured screen image identification based on vision transformer. J Vis Commun Image Represent 90:103692. https:\/\/doi.org\/10.1016\/J.JVCIR.2022.103692","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"1442_CR55","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/J.CVIU.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Gool LV (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346\u2013359. https:\/\/doi.org\/10.1016\/J.CVIU.2007.09.014","journal-title":"Comput Vis Image Underst"},{"issue":"1","key":"1442_CR56","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1006\/cviu.1999.0832","volume":"78","author":"PHS Torr","year":"2000","unstructured":"Torr PHS, Zisserman A (2000) Mlesac: a new robust estimator with application to estimating image geometry. Comput Vis Image Underst 78(1):138\u2013156. https:\/\/doi.org\/10.1006\/cviu.1999.0832","journal-title":"Comput Vis Image Underst"},{"doi-asserted-by":"publisher","unstructured":"Fischler MA, Bolles RC (1987) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. In: Fischler MA, Firschein O (eds) Readings in computer vision. Morgan Kaufmann, San Francisco, CA, pp 726\u2013740. https:\/\/doi.org\/10.1016\/B978-0-08-051581-6.50070-2","key":"1442_CR57","DOI":"10.1016\/B978-0-08-051581-6.50070-2"},{"doi-asserted-by":"publisher","unstructured":"Gloe T, B\u00f6hme R (2010) The \u2018Dresden image database\u2019 for benchmarking digital image forensics. In: Shin SY, Ossowski S, Schumacher M, Palakal MJ, Hung C (eds) Proceedings of the 2010 ACM symposium on applied computing (SAC), Sierre, Switzerland, March 22\u201326, 2010. ACM, Switzerland, pp 1584\u20131590. https:\/\/doi.org\/10.1145\/1774088.1774427","key":"1442_CR58","DOI":"10.1145\/1774088.1774427"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-025-01442-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-025-01442-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-025-01442-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T16:41:57Z","timestamp":1751474517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-025-01442-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,28]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1442"],"URL":"https:\/\/doi.org\/10.1007\/s10044-025-01442-9","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"type":"print","value":"1433-7541"},{"type":"electronic","value":"1433-755X"}],"subject":[],"published":{"date-parts":[[2025,2,28]]},"assertion":[{"value":"24 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"56"}}