{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T11:59:52Z","timestamp":1770551992374,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,1,8]],"date-time":"2015-01-08T00:00:00Z","timestamp":1420675200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s11042-014-2431-2","type":"journal-article","created":{"date-parts":[[2015,1,6]],"date-time":"2015-01-06T21:56:45Z","timestamp":1420581405000},"page":"3221-3233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":92,"title":["Copy-move forgery detection based on scaled ORB"],"prefix":"10.1007","volume":"75","author":[{"given":"Ye","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Xuanjing","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Haipeng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,8]]},"reference":[{"key":"2431_CR1","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R et al (2011) A SIFT-based forensic method for copy\u2013move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6:1099\u20131110. doi: 10.1109\/TIFS.2011.2129512","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"2431_CR2","doi-asserted-by":"crossref","unstructured":"Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. ICASSP:1053\u20131056. doi: 10.1109\/ICASSP.2009.4959768","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"2431_CR3","doi-asserted-by":"crossref","unstructured":"Calonder M, Lepetit V, Strecha C et al. (2010) Brief: binary robust independent elementary features. ECCV:778\u2013792. doi: 10.1007\/978-3-642-15561-1_56","DOI":"10.1007\/978-3-642-15561-1_56"},{"key":"2431_CR4","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"R Davarzani","year":"2013","unstructured":"Davarzani R, Yaghmaie K, Mozaffari S et al (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231:61\u201372. doi: 10.1016\/j.forsciint.2013.04.023","journal-title":"Forensic Sci Int"},{"key":"2431_CR5","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24:381\u2013395. doi: 10.1145\/358669.358692","journal-title":"Commun ACM"},{"key":"2431_CR6","unstructured":"Fridrich J, Soukal BD, Luk\u00e1\u0161 AJ (2003) Detection of copy-move forgery in digital images. Proc Digit Forensic Res Work"},{"key":"2431_CR7","doi-asserted-by":"crossref","unstructured":"Heinly J, Dunn E, Frahm JM (2012) Comparative evaluation of binary features. ECCV:759\u2013773. doi: 10.1007\/978-3-642-33709-3_54","DOI":"10.1007\/978-3-642-33709-3_54"},{"key":"2431_CR8","doi-asserted-by":"crossref","unstructured":"Hu J, Zhang H, Gao Q (2011) An improved lexicographical sort algorithm of copy-move forgery detection. ICNDC:23\u201327. doi: 10.1109\/ICNDC.2011.12","DOI":"10.1109\/ICNDC.2011.12"},{"key":"2431_CR9","doi-asserted-by":"crossref","unstructured":"Huang H, Guo W, Zhang Y(2008) Detection of copy-move forgery in digital images using SIFT algorithm. PACIIA: 1241\u20131245. doi: 10.1109\/PACIIA.2008.240","DOI":"10.1109\/PACIIA.2008.240"},{"key":"2431_CR10","doi-asserted-by":"crossref","unstructured":"Leutenegger S, Chli M, Siegwart RY (2011) BRISK: binary robust invariant scalable keypoints. ICCV:2548\u20132555. doi: 10.1109\/ICCV.2011.6126542","DOI":"10.1109\/ICCV.2011.6126542"},{"key":"2431_CR11","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1016\/j.jnca.2010.09.001","volume":"34","author":"G Liu","year":"2011","unstructured":"Liu G, Wang J, Lian S (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34:1557\u20131565. doi: 10.1016\/j.jnca.2010.09.001","journal-title":"J Netw Comput Appl"},{"key":"2431_CR12","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60:91\u2013110. doi: 10.1023\/B:VISI.0000029664.99615.94","journal-title":"Int J Comput Vis"},{"key":"2431_CR13","first-page":"746","volume":"4","author":"W Luo","year":"2007","unstructured":"Luo W, Huang J, Qiu G (2007) Robust detection of region-duplication forgery in digital image. ICPR 4:746\u2013749. doi: 10.1109\/ICPR.2006.1003","journal-title":"ICPR"},{"key":"2431_CR14","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian B, Saic S (2007) Detection of copy\u2013move forgery using a method based on blur moment invariants. Forensic Sci Int 171:180\u2013189. doi: 10.1016\/j.forsciint.2006.11.002","journal-title":"Forensic Sci Int"},{"key":"2431_CR15","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"G Muhammad","year":"2012","unstructured":"Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9:49\u201357. doi: 10.1016\/j.diin.2012.04.004","journal-title":"Digit Investig"},{"key":"2431_CR16","unstructured":"Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Dissertation, Dartmouth College"},{"key":"2431_CR17","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1006\/cviu.1998.0719","volume":"73","author":"PL Rosin","year":"1999","unstructured":"Rosin PL (1999) Measuring corner properties. Comput Vis Image Underst 73:291\u2013307. doi: 10.1006\/cviu.1998.0719","journal-title":"Comput Vis Image Underst"},{"key":"2431_CR18","doi-asserted-by":"crossref","unstructured":"Rosten E, Drummond T (2005) Fusing points and lines for high performance tracking. ICCV: 1508\u20131515. doi: 10.1109\/ICCV.2005.104","DOI":"10.1109\/ICCV.2005.104"},{"key":"2431_CR19","doi-asserted-by":"crossref","unstructured":"Rosten E, Drummond T (2006) Machine learning for high-speed corner detection. ECCV:430\u2013443. doi: 10.1007\/11744023_34","DOI":"10.1007\/11744023_34"},{"key":"2431_CR20","doi-asserted-by":"crossref","unstructured":"Rublee E, Rabaud V, Konolige K (2011) ORB: an efficient alternative to SIFT or SURF. ICCV:2564\u20132571. doi: 10.1109\/ICCV.2011.6126544","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"2431_CR21","doi-asserted-by":"crossref","unstructured":"Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. Inf Hiding:51\u201365. doi: 10.1007\/978-3-642-16435-4_5","DOI":"10.1007\/978-3-642-16435-4_5"},{"key":"2431_CR22","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang X, Li Z et al. (2011) A DWT-DCT based passive forensics method for copy-move attacks. MINES:304\u2013308. doi: 10.1109\/MINES.2011.98","DOI":"10.1109\/MINES.2011.98"},{"key":"2431_CR23","doi-asserted-by":"crossref","unstructured":"Xu B, Wang J, Liu G (2010) Image copy-move forgery detection based on SURF. MINES:889\u2013892. doi: 10.1109\/MINES.2010.189","DOI":"10.1109\/MINES.2010.189"},{"key":"2431_CR24","doi-asserted-by":"crossref","unstructured":"Yao H, Qiao T, Tang Z, et al. (2011) Detecting copy-move forgery using non-negative matrix factorization. MINES:591\u2013594. doi: 10.1109\/MINES.2011.104","DOI":"10.1109\/MINES.2011.104"},{"key":"2431_CR25","doi-asserted-by":"crossref","unstructured":"Zhang T, Wang R (2009) Copy-move forgery detection based on SVD in digital image. ICISP:1\u20135. doi: 10.1109\/CISP.2009.5301325","DOI":"10.1109\/CISP.2009.5301325"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2431-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2431-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2431-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:32:14Z","timestamp":1559345534000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2431-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,8]]},"references-count":25,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["2431"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2431-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,8]]}}}