{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T21:35:46Z","timestamp":1764020146921},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T00:00:00Z","timestamp":1501200000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11042-017-4978-1","type":"journal-article","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T12:17:30Z","timestamp":1501244250000},"page":"13615-13641","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Robust copy-move forgery detection based on multi-granularity Superpixels matching"],"prefix":"10.1007","volume":"77","author":[{"given":"Hong-ying","family":"Yang","sequence":"first","affiliation":[]},{"given":"Ying","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Li-xian","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Yu-nan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiang-yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhi-li","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,28]]},"reference":[{"issue":"6","key":"4978_CR1","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R et al (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"10","key":"4978_CR2","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4978_CR3","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.ins.2016.01.061","volume":"345","author":"X Bi","year":"2016","unstructured":"Bi X, Pun CM, Yuan XC (2016) Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf Sci 345:226\u2013242","journal-title":"Inf Sci"},{"issue":"3","key":"4978_CR4","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen L, Lu W, Ni J et al (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244\u2013254","journal-title":"J Vis Commun Image Represent"},{"key":"4978_CR5","doi-asserted-by":"publisher","unstructured":"Chen B, Yang J, Jeon B, Zhang X (2017) Kernel quaternion principal component analysis and its application in RGB-D object recognition. Neurocomputing. doi:\n10.1016\/j.neucom.2017.05.047","DOI":"10.1016\/j.neucom.2017.05.047"},{"issue":"6","key":"4978_CR6","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J et al (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"4978_CR7","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1109\/TIFS.2014.2337654","volume":"9","author":"A Costanzo","year":"2014","unstructured":"Costanzo A, Amerini I, Caldelli R et al (2014) Forensic analysis of SIFT keypoint removal and injection. IEEE Trans Inf Forensics Secur 9(9):1450\u20131464","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4978_CR8","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. 2014 I.E. International Conference on Image Processing (ICIP), Paris, France, 5312\u20135316","DOI":"10.1109\/ICIP.2014.7026075"},{"issue":"11","key":"4978_CR9","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy\u2013move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"4978_CR10","doi-asserted-by":"crossref","first-page":"1338","DOI":"10.1109\/34.977559","volume":"23","author":"JM Geusebroek","year":"2001","unstructured":"Geusebroek JM, Van den Boomgaard R, Smeulders AWM et al (2001) Color invariance. IEEE Trans Pattern Anal Mach Intell 23(12):1338\u20131350","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4978_CR11","volume-title":"Exponent moments and its application in pattern recognition","author":"YJ Jiang","year":"2011","unstructured":"Jiang YJ (2011) Exponent moments and its application in pattern recognition. Beijing University of Posts and Telecommunications, Beijing"},{"key":"4978_CR12","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.jvcir.2015.07.007","volume":"31","author":"JC Lee","year":"2015","unstructured":"Lee JC (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320\u2013334","journal-title":"J Vis Commun Image Represent"},{"key":"4978_CR13","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.ins.2015.03.009","volume":"321","author":"JC Lee","year":"2015","unstructured":"Lee JC, Chang CP, Chen WK (2015) Detection of copy\u2013move image forgery using histogram of orientated gradients. Inf Sci 321:250\u2013262","journal-title":"Inf Sci"},{"issue":"3","key":"4978_CR14","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B et al (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4978_CR15","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1016\/j.neucom.2014.08.003","volume":"149","author":"Y Li","year":"2015","unstructured":"Li Y, Wang S, Tian Q et al (2015) A survey of recent advances in visual feature detection. Neurocomputing 149:736\u2013751","journal-title":"Neurocomputing"},{"issue":"5","key":"4978_CR16","doi-asserted-by":"crossref","first-page":"1166","DOI":"10.1109\/TIP.2010.2041410","volume":"19","author":"WQ Lim","year":"2010","unstructured":"Lim WQ (2010) The discrete shearlet transform: a new directional transform and compactly supported shearlet frames. IEEE Trans Image Process 19(5):1166\u20131180","journal-title":"IEEE Trans Image Process"},{"key":"4978_CR17","doi-asserted-by":"crossref","unstructured":"Liu M, Tuzel O, Ramalingam S, Chellappa R (2011) Entropy rate superpixel segmentation. Proceedings of the IEEE Conference on Computer Vision and Pattern","DOI":"10.1109\/CVPR.2011.5995323"},{"issue":"2","key":"4978_CR18","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/s11263-013-0622-3","volume":"104","author":"P Mainali","year":"2013","unstructured":"Mainali P, Lafruit G, Yang Q et al (2013) SIFER: scale-invariant feature detector with error resilience. Int J Comput Vis 104(2):172\u2013197","journal-title":"Int J Comput Vis"},{"issue":"4","key":"4978_CR19","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857\u2013867","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4978_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.diin.2016.08.002","volume":"19","author":"R Pandey","year":"2016","unstructured":"Pandey R, Singh S, Shukla K (2016) Passive forensics in image and video using noise features: a review. Digit Investig 19:1\u201328","journal-title":"Digit Investig"},{"issue":"8","key":"4978_CR21","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705\u20131716","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4978_CR22","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.image.2015.08.008","volume":"39","author":"M Qureshi","year":"2015","unstructured":"Qureshi M, Deriche M (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39:46\u201374","journal-title":"Signal Process Image Commun"},{"issue":"8","key":"4978_CR23","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ et al (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355\u20131370","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4978_CR24","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A et al (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16\u201332","journal-title":"J Vis Commun Image Represent"},{"key":"4978_CR25","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1016\/j.ins.2014.02.158","volume":"277","author":"X Wang","year":"2014","unstructured":"Wang X, Niu P, Yang H et al (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731\u2013754","journal-title":"Inf Sci"},{"key":"4978_CR26","doi-asserted-by":"publisher","unstructured":"Wang J, Li T, Shi Y-Q, Lian S, Ye J (2016) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tool Appl. doi:\n10.1007\/s11042-016-4153-0","DOI":"10.1007\/s11042-016-4153-0"},{"issue":"10","key":"4978_CR27","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/LSP.2011.2163507","volume":"18","author":"Q Wu","year":"2011","unstructured":"Wu Q, Wang S, Zhang X (2011) Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Process Lett 18(10):559\u2013562","journal-title":"IEEE Signal Process Lett"},{"issue":"11","key":"4978_CR28","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4978_CR29","doi-asserted-by":"publisher","unstructured":"Xiang-yang W, Yu-nan L, Huan X, Pei W, Hong-ying Y Robust copy-move forgery detection using quaternion exponent moments. Pattern Anal Applic. doi:\n10.1007\/s10044-016-0588-1","DOI":"10.1007\/s10044-016-0588-1"},{"issue":"2","key":"4978_CR30","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1007\/s11042-014-2362-y","volume":"75","author":"L Yu","year":"2016","unstructured":"Yu L, Han Q, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools Appl 75(2):1159\u20131176","journal-title":"Multimedia Tools Appl"},{"issue":"11","key":"4978_CR31","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur 11(11):2499\u20132512","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4978_CR32","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.neucom.2013.07.027","volume":"124","author":"R Zhang","year":"2014","unstructured":"Zhang R, Wei F, Li B (2014) E2LSH based multiple kernel approach for object detection. Neurocomputing 124:105\u2013110","journal-title":"Neurocomputing"},{"issue":"6","key":"4978_CR33","first-page":"1531","volume":"99","author":"Z Zhili","year":"2016","unstructured":"Zhili Z, Ching-Nung Y, Xingming S et al (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans Inf Syst 99(6):1531\u20131540","journal-title":"IEICE Trans Inf Syst"},{"issue":"1","key":"4978_CR34","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou Z, Wang Y, Wu Q et al (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48\u201363","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"4978_CR35","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","volume":"25","author":"T Zong","year":"2015","unstructured":"Zong T, Xiang Y, Natgunanathan I et al (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25(5):717\u2013729","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4978-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4978-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4978-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T07:13:33Z","timestamp":1528182813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4978-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,28]]},"references-count":35,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["4978"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4978-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,28]]}}}