{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:03:47Z","timestamp":1770915827384,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T00:00:00Z","timestamp":1523404800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s10489-018-1168-4","type":"journal-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T06:23:43Z","timestamp":1523427823000},"page":"3630-3652","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["A new keypoint-based copy-move forgery detection for color image"],"prefix":"10.1007","volume":"48","author":[{"given":"Xiang-Yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Li-Xian","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Xue-Bing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hong-Ying","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Pan-Pan","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"issue":"9","key":"1168_CR1","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1049\/iet-ipr.2016.0322","volume":"11","author":"R Dixit","year":"2017","unstructured":"Dixit R, Naskar R (2017) Review, analysis and parameterisation of techniques for copy\u2013move forgery detection in digital images. IET Image Process 11(9):746\u2013759","journal-title":"IET Image Process"},{"key":"1168_CR2","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.diin.2016.06.003","volume":"18","author":"K Sitara","year":"2016","unstructured":"Sitara K, Mehtre BM (2016) Digital video tampering detection: an overview of passive techniques. Digit Investig 18:8\u201322","journal-title":"Digit Investig"},{"issue":"6","key":"1168_CR3","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"Part A","key":"1168_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2015.08.008","volume":"39","author":"MA Qureshi","year":"2015","unstructured":"Qureshi MA, Deriche M (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39(Part A):46\u201374","journal-title":"Signal Process Image Commun"},{"key":"1168_CR5","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"75","author":"NBA Warif","year":"2016","unstructured":"Warif NBA, Wahab AWA, Idris MYI et al (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259\u2013278","journal-title":"J Netw Comput Appl"},{"key":"1168_CR6","doi-asserted-by":"publisher","unstructured":"Li H, Luo W, Qiu X et al (2017) Image forgery localization via integrating tampering possibility maps. IEEE Trans Inf Forensics Secur. https:\/\/doi.org\/10.1109\/TIFS.2017.2656823","DOI":"10.1109\/TIFS.2017.2656823"},{"issue":"10","key":"1168_CR7","doi-asserted-by":"publisher","first-page":"4729","DOI":"10.1109\/TIP.2016.2593583","volume":"25","author":"A Ferreira","year":"2016","unstructured":"Ferreira A, Felipussi SC, Alfaro C et al (2016) Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans Image Process 25(10):4729\u20134742","journal-title":"IEEE Trans Image Process"},{"key":"1168_CR8","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.compeleceng.2017.03.013","volume":"62","author":"K Hayat","year":"2017","unstructured":"Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Comput Electr Eng 62:448\u2013458","journal-title":"Comput Electr Eng"},{"issue":"5","key":"1168_CR9","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1049\/iet-ipr.2016.0537","volume":"11","author":"R Dixit","year":"2017","unstructured":"Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD. IET Image Process 11(5):301\u2013309","journal-title":"IET Image Process"},{"issue":"5","key":"1168_CR10","first-page":"103","volume":"9","author":"S Manjunatha","year":"2017","unstructured":"Manjunatha S, Patil MM (2017) A survey on image forgery detection techniques. Digital Image Processing 9(5):103\u2013108","journal-title":"Digital Image Processing"},{"issue":"11","key":"1168_CR11","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur 11(11):2499\u20132512","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1168_CR12","doi-asserted-by":"publisher","unstructured":"Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection Of copy-move image forgery based on discrete cosine transform. Neural Comput Applic. https:\/\/doi.org\/10.1007\/s00521-016-2663-3","DOI":"10.1007\/s00521-016-2663-3"},{"issue":"5","key":"1168_CR13","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1049\/iet-ipr.2016.0537","volume":"11","author":"R Dixit","year":"2017","unstructured":"Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD. IET Image Process 11(5):301\u2013309","journal-title":"IET Image Process"},{"issue":"11","key":"1168_CR14","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1168_CR15","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.forsciint.2016.06.005","volume":"266","author":"H Zhou","year":"2016","unstructured":"Zhou H, Shen Y, Zhu X et al (2016) Digital image modification detection using color information and its histograms. Forensic Sci Int 266:379\u2013388","journal-title":"Forensic Sci Int"},{"key":"1168_CR16","doi-asserted-by":"publisher","unstructured":"Mahmood T, Mehmood Z, Shah M, Khan Z (2017) An efficient forensic technique for exposing region duplication forgery in digital images. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-017-1038-5","DOI":"10.1007\/s10489-017-1038-5"},{"key":"1168_CR17","doi-asserted-by":"publisher","unstructured":"Fadl SM, Semary NA (2017) Robust Copy-move forgery revealing in digital images using polar coordinate system. Neurocomputing. https:\/\/doi.org\/10.1016\/j.neucom.2016.11.091","DOI":"10.1016\/j.neucom.2016.11.091"},{"key":"1168_CR18","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.ins.2016.01.061","volume":"345","author":"X Bi","year":"2016","unstructured":"Bi X, Pun CM, Yuan XC (2016) Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf Sci 345:226\u2013242","journal-title":"Inf Sci"},{"issue":"18","key":"1168_CR19","doi-asserted-by":"publisher","first-page":"11513","DOI":"10.1007\/s11042-015-2872-2","volume":"75","author":"M Emam","year":"2016","unstructured":"Emam M, Han Q, Niu X (2016) PCET Based copy-move forgery detection in images under geometric transforms. Multimedia Tools and Applications 75(18):11513\u201311527","journal-title":"Multimedia Tools and Applications"},{"key":"1168_CR20","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP), Paris, France, pp 5312\u20135316","DOI":"10.1109\/ICIP.2014.7026075"},{"issue":"13","key":"1168_CR21","doi-asserted-by":"publisher","first-page":"14887","DOI":"10.1007\/s11042-016-4201-9","volume":"76","author":"J Zhong","year":"2017","unstructured":"Zhong J, Gan Y, Young J et al (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools and Applications 76(13):14887\u201314903","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"1168_CR22","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"1168_CR23","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"8","key":"1168_CR24","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705\u20131716","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1168_CR25","doi-asserted-by":"crossref","unstructured":"Warif NBA, Wahab AWA, Idris MYI et al (2017) SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46:219\u2013232","DOI":"10.1016\/j.jvcir.2017.04.004"},{"key":"1168_CR26","doi-asserted-by":"publisher","unstructured":"Li J, Yang F, Lu W et al (2016) Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-016-3967-0","DOI":"10.1007\/s11042-016-3967-0"},{"issue":"9","key":"1168_CR27","doi-asserted-by":"publisher","first-page":"1450","DOI":"10.1109\/TIFS.2014.2337654","volume":"9","author":"A Costanzo","year":"2014","unstructured":"Costanzo A, Amerini I, Caldelli R (2014) Forensic analysis of SIFT keypoint removal and Injection. IEEE Trans Inf Forensics Secur 9(9):1450\u20131464","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"1168_CR28","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s11042-014-2362-y","volume":"75","author":"L Yu","year":"2016","unstructured":"Yu L, Han Q, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications 75(2):1159\u20131176","journal-title":"Multimedia Tools and Applications"},{"key":"1168_CR29","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.engappai.2016.12.022","volume":"59","author":"F Yang","year":"2017","unstructured":"Yang F, Li J, Lu W et al (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73\u201383","journal-title":"Eng Appl Artif Intell"},{"key":"1168_CR30","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16\u201332","journal-title":"J Vis Commun Image Represent"},{"issue":"10","key":"1168_CR31","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1168_CR32","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.image.2017.05.010","volume":"57","author":"G Jin","year":"2017","unstructured":"Jin G, Wan X (2017) An improved method for SIFT-based copy-move forgery detection using non-maximum value suppression and optimized J-Linkage. Signal Process Image Commun 57:113\u2013125","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"1168_CR33","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s11263-011-0431-5","volume":"94","author":"S Gauglitz","year":"2011","unstructured":"Gauglitz S, H\u00f6llerer T, Turk M (2011) Evaluation of interest point detectors and feature descriptors for visual tracking. Int J Comput Vis 94(3):335\u2013360","journal-title":"Int J Comput Vis"},{"issue":"2","key":"1168_CR34","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/s11263-013-0622-3","volume":"104","author":"P Mainali","year":"2013","unstructured":"Mainali P, Lafruit G, Yang Q (2013) SIFER: Scale-Invariant feature detector with error resilience. Int J Comput Vis 104(2):172\u2013197","journal-title":"Int J Comput Vis"},{"issue":"3","key":"1168_CR35","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T et al (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346\u2013359","journal-title":"Comput Vis Image Underst"},{"issue":"12","key":"1168_CR36","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1109\/34.977559","volume":"23","author":"JM Geusebroek","year":"2001","unstructured":"Geusebroek JM, van den Boomgaard R, Smeulders AWM, Geerts H (2001) Color invariance. IEEE Trans Pattern Anal Mach Intell 23(12):1338\u20131350","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1168_CR37","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1016\/j.amc.2015.01.075","volume":"256","author":"X-Y Wang","year":"2015","unstructured":"Wang X-Y, Li W-Y, Yang H-Y, Wang P, Li Y-W (2015) Quaternion polar complex exponential transform for invariant color image description. Appl Math Comput 256:951\u2013967","journal-title":"Appl Math Comput"},{"issue":"7","key":"1168_CR38","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1109\/TPAMI.2009.119","volume":"32","author":"PT Yap","year":"2010","unstructured":"Yap PT, Jiang X, Kot AC (2010) Two-dimensional polar harmonic transforms for invariant image representation. IEEE Trans Pattern Anal Mach Intell 32(7):1259\u20131270","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1168_CR39","doi-asserted-by":"crossref","unstructured":"Dang QB, Rusi\u00f1ol M, Coustaty M et al (2016) Delaunay triangulation-based features for camera-based document image retrieval system. In: The 12th IAPR workshop on document analysis systems (DAS), pp 1\u20136","DOI":"10.1109\/DAS.2016.66"},{"key":"1168_CR40","unstructured":"Li Y, Liu N, Zhang B, Yuan K-G, Yang Y-X (2015) Image multiple copy-move forgery detection algorithm based on reversed-generalized 2 nearest-neighbor. J Electron Inf Technol (7):1767\u20131773"},{"key":"1168_CR41","doi-asserted-by":"publisher","unstructured":"D\u2019Amiano L, Cozzolino D, Poggi G et al (2018) A patchmatch-based dense-field algorithm for video copy-move detection and localization. https:\/\/doi.org\/10.1109\/TCSVT.2018.2804768","DOI":"10.1109\/TCSVT.2018.2804768"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-018-1168-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-018-1168-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-018-1168-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T13:56:03Z","timestamp":1604152563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-018-1168-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,11]]},"references-count":41,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["1168"],"URL":"https:\/\/doi.org\/10.1007\/s10489-018-1168-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,11]]},"assertion":[{"value":"11 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"All authors declare that there are no conflict of interests regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}