{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:06:15Z","timestamp":1771956375615,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2016,6,24]],"date-time":"2016-06-24T00:00:00Z","timestamp":1466726400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1536110"],"award-info":[{"award-number":["U1536110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373180"],"award-info":[{"award-number":["61373180"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11042-016-3687-5","type":"journal-article","created":{"date-parts":[[2016,6,24]],"date-time":"2016-06-24T07:49:34Z","timestamp":1466754574000},"page":"12627-12644","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A passive authentication scheme for copy-move forgery based on package clustering algorithm"],"prefix":"10.1007","volume":"76","author":[{"given":"Huan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hong-Xia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xing-Ming","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Qian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,24]]},"reference":[{"key":"3687_CR1","doi-asserted-by":"crossref","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. In: Information Forensics and Security, IEEE Transactions on. vol. 6, no. 3, pp 1099\u20131110","DOI":"10.1109\/TIFS.2011.2129512"},{"issue":"3","key":"3687_CR2","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy\u2013move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3687_CR3","unstructured":"Beste U, Gyzin U, Mustafa U, Vasif N, Arda U (2015) LBP-DCT based copy move forgery detection algorithm. In: Information Sciences and Systems, vol. 363, pp 127\u2013136"},{"issue":"1","key":"3687_CR4","first-page":"226","volume":"345","author":"XL Bi","year":"2016","unstructured":"Bi XL, Pun CM, Yuan CX (2016) Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf Sci 345(1):226\u2013242","journal-title":"Inf Sci"},{"issue":"6","key":"3687_CR5","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3687_CR6","unstructured":"Fridrich J, Soukalm D, Lukas J (2003) Detection of copy-move forgery in digital images. Digital Forensic Research workshop, Cleveland, pp 19\u201323"},{"issue":"1\u20133","key":"3687_CR7","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"YP Huang","year":"2011","unstructured":"Huang YP, Lu W, Sun W, Long DY (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1\u20133):178\u2013184","journal-title":"Forensic Sci Int"},{"key":"3687_CR8","doi-asserted-by":"crossref","unstructured":"Kang L, Cheng XP, Li K (2010) Copy-move forgery detection in digital image. In: Image and Signal Processing (CISP), vol. 5, pp 2419\u20132421","DOI":"10.1109\/CISP.2010.5648249"},{"key":"3687_CR9","unstructured":"Kodak Lossless True Color Image: http:\/\/r0k.us\/graphics\/kodak\/"},{"key":"3687_CR10","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1007\/978-3-319-03095-1_62","volume":"249","author":"S Kumar","year":"2014","unstructured":"Kumar S, Desai J, Mukherjee S (2014) DCT-PCA based method for copy-move forgery detection. Adv Intell Syst Comput 249:577\u2013583","journal-title":"Adv Intell Syst Comput"},{"issue":"1","key":"3687_CR11","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Y Li","year":"2013","unstructured":"Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1):59\u201367","journal-title":"Forensic Sci Int"},{"issue":"3","key":"3687_CR12","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3687_CR13","first-page":"3","volume":"33","author":"S Lian","year":"2009","unstructured":"Lian S, Kanellopoulos D (2009) Recent advances in multimedia information system security. Informatica 33:3\u201324","journal-title":"Informatica"},{"key":"3687_CR14","unstructured":"Mahmoud E, Han Q, Niu XM (2015) PCET based copy-move forgery detection in images under geometric transforms. Multimed Tools Appl 1\u201315"},{"key":"3687_CR15","first-page":"645","volume":"425","author":"VT Manu","year":"2016","unstructured":"Manu VT, Mehtre BM (2016) Detection of copy-move forgery in images using segmentation and SURF. Proc Second Int Symp Signal Process Intell Recogn Syst 425:645\u2013654","journal-title":"Proc Second Int Symp Signal Process Intell Recogn Syst"},{"key":"3687_CR16","doi-asserted-by":"crossref","unstructured":"Mishra A, Goel A, Singh R, Chelty G, Singh L (2012) A novel image watermarking scheme using extreme learning machine. In: The 2012 International Joint Conference on Neural Networks (IJCNN), pp 1\u20136","DOI":"10.1109\/IJCNN.2012.6252363"},{"key":"3687_CR17","unstructured":"Ng T-T, Chang S-F, Hsu J, Pepeljugoski M (2004) Columbia photographic images and photorealistic computer graphics dataset ADVENT. Columbia Univ., New York, Tech. Rep"},{"key":"3687_CR18","unstructured":"Popscu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions, Tech. Rep. TR2003-515, Dartmouth College"},{"key":"3687_CR19","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/978-3-319-28658-7_47","volume":"425","author":"S Rani","year":"2016","unstructured":"Rani S, Jayamohan M, Sruthy S (2016) Scale invariant detection of copy-move forgery using fractal dimension and singular values. Adv Signal Process Intell Recogn Syst 425:559\u2013570","journal-title":"Adv Signal Process Intell Recogn Syst"},{"key":"3687_CR20","unstructured":"Sebe N, Liu Y, Zhuang Y, Huang T, Chang SF (2007) Blind passive Madia forensics: motivation and opportunity, multimedia conten analysis and mining, vol. 4577. Springer, Berlin\/Heidelberg, pp 57\u201359"},{"key":"3687_CR21","unstructured":"Shabnam MS, Mohsen EM, Mohsen M (2015) A new approach for copy-move detection based on improved weber local descriptor. In: Journal of Forensic Sciences"},{"key":"3687_CR22","unstructured":"The Columbia image splicing detection evaluation database: http:\/\/www.ee.columabia.edu.cn\/ln\/dvmm\/downloads\/AuthSpliceDataset"},{"key":"3687_CR23","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"28","author":"X Tong","year":"2013","unstructured":"Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28:301\u2013308","journal-title":"Signal Process Image Commun"},{"key":"3687_CR24","unstructured":"Yu J, Han QL (2015) Detection of copy-move forgery in digital images using discrete cosine transform and cluster analysis. In: International Conference on Computer Networks and Information Security (CNIS), pp 73\u201376"},{"key":"3687_CR25","doi-asserted-by":"crossref","unstructured":"Zhou L, Wang D, Guo Y, Zhang J (2007) Blur detection of digital forgery using mathematical morphology. In: Proceedings of the 1st KES International Symposium on Agent and Multi-Agent systems. Technologies and Applications, Springer-verlag, Wroclaw, Poland","DOI":"10.1007\/978-3-540-72830-6_105"},{"issue":"1","key":"3687_CR26","doi-asserted-by":"crossref","first-page":"251","DOI":"10.4156\/jdcta.vol5.issue1.27","volume":"5","author":"M Zimba","year":"2011","unstructured":"Zimba M, Xingming S (2011) DWT-PCA (EVD) based copy-move image forgery detection. Int J Digit Content Technol Appl 5(1):251\u2013258","journal-title":"Int J Digit Content Technol Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3687-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3687-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3687-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3687-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T00:34:25Z","timestamp":1692405265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3687-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,24]]},"references-count":26,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["3687"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3687-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,24]]}}}