{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:30:38Z","timestamp":1761676238201},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T00:00:00Z","timestamp":1416441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s11042-014-2374-7","type":"journal-article","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T06:30:12Z","timestamp":1416551412000},"page":"1793-1811","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["Using similarity analysis to detect frame duplication forgery in videos"],"prefix":"10.1007","volume":"75","author":[{"given":"Jianmei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Tianqiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lichao","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,20]]},"reference":[{"issue":"2","key":"2374_CR1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MSP.2008.931089","volume":"26","author":"D Edward","year":"2009","unstructured":"Edward D, Nasir M, Min W (2009) Digital forensics [From the Guest Editors]. Sig Process Mag, IEEE 26(2):14\u201315","journal-title":"Sig Process Mag, IEEE"},{"key":"2374_CR2","doi-asserted-by":"crossref","unstructured":"Feng JZ, Song L, Yang XK, Zhang W (2009) Sub clustering K-SVD: Size variable dictionary learning for sparse representations. In: Image Processing (ICIP), 16th IEEE International Conference on, 2009. IEEE, pp 2149\u20132152","DOI":"10.1109\/ICIP.2009.5414328"},{"key":"2374_CR3","unstructured":"Hsu C, Hung T, Lin C (2008) Video forgery detection using correlation of noise residue. In: Proc.10th Workshop on IEEE Multimedia Signal Processing. pp 170\u2013174"},{"key":"2374_CR4","doi-asserted-by":"crossref","unstructured":"Hyun D-K, Lee M-J, Ryu S-J, Lee H-Y, Lee H-K (2013) Forgery detection for surveillance video. In: The Era of Interactive Media. Springer, pp 25\u201336","DOI":"10.1007\/978-1-4614-3501-3_3"},{"key":"2374_CR5","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-540-92957-4_27","volume":"5414","author":"M Kobayashi","year":"2009","unstructured":"Kobayashi M, Okabe T, Sato Y (2009) Detecting video forgeries based on noise characteristics. Lect Notes Comput Sci, Adv Image Video Technol 5414:306\u2013317","journal-title":"Lect Notes Comput Sci, Adv Image Video Technol"},{"key":"2374_CR6","doi-asserted-by":"crossref","unstructured":"Li L, Wang X, Zhang W, Yang G, Hu G (2013) Detecting removed object from video with stationary background. In: Digital Forensics and Watermaking. Springer, pp 242\u2013252","DOI":"10.1007\/978-3-642-40099-5_20"},{"key":"2374_CR7","doi-asserted-by":"crossref","unstructured":"Lin G-S, Chang J-F (2012) Detection of frame duplication forgery in videos based on spatial and temporal analysis. International Journal of Pattern Recognition and Artificial Intelligence 26 (07)","DOI":"10.1142\/S0218001412500176"},{"key":"2374_CR8","unstructured":"Lin CS, Tsay JJ (2013) Passive approach for video forgery detection and localization. In: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), 2013. The Society of Digital Information and Wireless Communication, pp 107\u2013112"},{"key":"2374_CR9","doi-asserted-by":"crossref","first-page":"e2","DOI":"10.1017\/ATSIP.2012.2","volume":"1","author":"S Milani","year":"2012","unstructured":"Milani S, Fontani M, Bestagini P, Barni M, Piva A, Tagliasacchi M, Tubaro S (2012) An overview on video forensics. APSIPA Trans Signal Inf Process 1:e2","journal-title":"APSIPA Trans Signal Inf Process"},{"issue":"Suppl","key":"2374_CR10","first-page":"227","volume":"46","author":"YSG Qin","year":"2009","unstructured":"Qin YSG, Zhang X (2009) Exposing digital forgeries in video via motion vectors. J Comput Res Dev 46(Suppl):227\u2013233","journal-title":"J Comput Res Dev"},{"key":"2374_CR11","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1142\/9789812836243_0015","volume":"3","author":"HT Sencar","year":"2008","unstructured":"Sencar HT, Memon N (2008) Overview of state-of-the-art in digital image forensics. Algoritm, Archit Inf Syst Secur 3:325\u2013348","journal-title":"Algoritm, Archit Inf Syst Secur"},{"key":"2374_CR12","doi-asserted-by":"crossref","unstructured":"Subramanyam AV, Emmanuel S (2012) Video forgery detection using HOG features and compression properties. In: Multimedia Signal Processing (MMSP), IEEE 14th International Workshop on, 17\u201319 Sept. 2012 2012. pp 89\u201394. doi: 10.1109\/MMSP.2012.6343421","DOI":"10.1109\/MMSP.2012.6343421"},{"key":"2374_CR13","doi-asserted-by":"crossref","unstructured":"Subramanyam A, Emmanuel S (2013) Pixel estimation based video forgery detection. In: Acoustics, Speech and Signal Processing (ICASSP), IEEE International Conference on, 2013. IEEE, pp 3038\u20133042","DOI":"10.1109\/ICASSP.2013.6638216"},{"key":"2374_CR14","doi-asserted-by":"crossref","unstructured":"Sun T, Wang W, Jiang X (2012) Exposing video forgeries by detecting MPEG double compression. In: Acoustics, Speech and Signal Processing (ICASSP), IEEE International Conference on, 2012. IEEE, pp 1389\u20131392","DOI":"10.1109\/ICASSP.2012.6288150"},{"key":"2374_CR15","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2007) Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th workshop on Multimedia & security. ACM, pp 35\u201342","DOI":"10.1145\/1288869.1288876"},{"key":"2374_CR16","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2007) Exposing digital forgeries in video by detecting duplication. Proceedings of the 9th workshop on Multimedia and security ACM,","DOI":"10.1145\/1288869.1288876"},{"issue":"4","key":"2374_CR17","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"2374_CR18","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2006) Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the 8th workshop on Multimedia and security. ACM, pp 37\u201347","DOI":"10.1145\/1161366.1161375"},{"issue":"3","key":"2374_CR19","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TIFS.2007.902661","volume":"2","author":"W Wang","year":"2007","unstructured":"Wang W, Farid H (2007) Exposing digital forgeries in interlaced and deinterlaced video. IEEE Trans Inf Forensic Secur 2(3):438\u2013449","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"2374_CR20","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. In: Proc.11th ACM workshop on Multimedia and Security. pp 39\u201348","DOI":"10.1145\/1597817.1597826"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2374-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2374-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2374-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T13:22:04Z","timestamp":1566048124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2374-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,20]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["2374"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2374-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,20]]}}}