{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T07:24:17Z","timestamp":1771053857133,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,8,19]],"date-time":"2017-08-19T00:00:00Z","timestamp":1503100800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11042-017-5094-y","type":"journal-article","created":{"date-parts":[[2017,8,19]],"date-time":"2017-08-19T14:17:47Z","timestamp":1503152267000},"page":"15093-15110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["An improved block-based matching algorithm of copy-move forgery detection"],"prefix":"10.1007","volume":"77","author":[{"given":"Yuecong","family":"Lai","sequence":"first","affiliation":[]},{"given":"Tianqiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Henan","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,19]]},"reference":[{"issue":"1","key":"5094_CR1","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"231","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1):284\u2013295","journal-title":"Forensic Sci Int"},{"issue":"1","key":"5094_CR2","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1):33\u201343","journal-title":"Forensic Sci Int"},{"key":"5094_CR3","unstructured":"CASIA tampered image detection evaluation (TIDE) database, v2.0, \n                        http:\/\/forensics.idealtest.org\n                        \n                     (2011)"},{"issue":"6","key":"5094_CR4","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"5094_CR5","unstructured":"Fridrich J, Soukal D, Luk\u00e1article\u0161 J (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop"},{"issue":"2","key":"5094_CR6","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/TIT.1962.1057692","volume":"8","author":"MK Hu","year":"1962","unstructured":"Hu MK (1962) Visual pattern recognition by moment invariants. IEEE Trans Inf Theory 8(2):179\u2013187","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"5094_CR7","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178\u2013184","journal-title":"Forensic Sci Int"},{"issue":"1","key":"5094_CR8","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Y Li","year":"2013","unstructured":"Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1):59\u201367","journal-title":"Forensic Sci Int"},{"issue":"6","key":"5094_CR9","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1016\/j.compeleceng.2013.11.034","volume":"40","author":"L Li","year":"2014","unstructured":"Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951\u20131962","journal-title":"Comput Electr Eng"},{"issue":"5","key":"5094_CR10","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1016\/j.jnca.2010.09.001","volume":"34","author":"G Liu","year":"2011","unstructured":"Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. Jnetw Comput Appl 34 (5):1557\u20131565","journal-title":"Jnetw Comput Appl"},{"key":"5094_CR11","doi-asserted-by":"crossref","unstructured":"Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. In: Information Hiding, pp 51\u201365","DOI":"10.1007\/978-3-642-16435-4_5"},{"key":"5094_CR12","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image R 29:16\u201332","journal-title":"J Vis Commun Image R"},{"key":"5094_CR13","unstructured":"Uncompressed Colour Image Dataset. \n                        http:\/\/homepages.lboro.ac.uk\/cogs\/datasets\/ucid\/ucid.html\n                        \n                     (2003)"},{"key":"5094_CR14","doi-asserted-by":"crossref","unstructured":"Wang J, Liu G, Li H, Dai Y, Wang Z (2009) Detection of image region duplication forgery using model with circle block. In: International Conference on Multimedia Information Networking and Security, pp 25\u201329","DOI":"10.1109\/MINES.2009.142"},{"issue":"7","key":"5094_CR15","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1109\/JSAC.2011.110803","volume":"29","author":"L Zhou","year":"2011","unstructured":"Zhou L, Chao HC, Vasilakos AV (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Area Comm 29(7):1358\u20131367","journal-title":"IEEE J Sel Area Comm"}],"updated-by":[{"DOI":"10.1007\/s11042-017-5153-4","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T00:00:00Z","timestamp":1504656000000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5094-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5094-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5094-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T10:52:57Z","timestamp":1530010377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5094-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,19]]},"references-count":15,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5094"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5094-y","relation":{"erratum":[{"id-type":"doi","id":"10.1007\/s11042-017-5153-4","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,19]]}}}