{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T22:14:10Z","timestamp":1771539250387,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T00:00:00Z","timestamp":1506902400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-5248-y","type":"journal-article","created":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T15:38:06Z","timestamp":1506958686000},"page":"16795-16811","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Fast and robust copy-move forgery detection based on scale-space representation"],"prefix":"10.1007","volume":"77","author":[{"given":"Chun-Su","family":"Park","sequence":"first","affiliation":[]},{"given":"Joon Yeon","family":"Choeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,2]]},"reference":[{"issue":"6","key":"5248_CR1","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"5248_CR2","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"5248_CR3","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded up robust features. Comput Vis Image Understand 110(3):346\u2013359","journal-title":"Comput Vis Image Understand"},{"key":"5248_CR4","doi-asserted-by":"crossref","unstructured":"Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: IEEE international conference on acoustics, speech and signal processing, pp 1053\u20131056","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"5248_CR5","doi-asserted-by":"crossref","unstructured":"Beis JS, Lowe DG (1997) Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: IEEE conference on computer vision and pattern recognition, pp 1000\u20131006","DOI":"10.1109\/CVPR.1997.609451"},{"issue":"3","key":"5248_CR6","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226\u2013245","journal-title":"Digit Investig"},{"issue":"2","key":"5248_CR7","doi-asserted-by":"crossref","first-page":"4699","DOI":"10.1109\/TIP.2013.2277814","volume":"22","author":"C Chen","year":"2013","unstructured":"Chen C, Ni J, Huang J (2013) Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans Image Process 22(2):4699\u20134710","journal-title":"IEEE Trans Image Process"},{"key":"5248_CR8","doi-asserted-by":"crossref","unstructured":"Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. In: IEEE international workshop on information forensics and security, pp 1\u20136","DOI":"10.1109\/WIFS.2010.5711472"},{"issue":"6","key":"5248_CR9","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5248_CR10","unstructured":"Cullen CG (1990) Matrices and linear transformations, 2nd edn. Dover Books on Mathematics"},{"key":"5248_CR11","doi-asserted-by":"publisher","unstructured":"Emam M, Han Q, Zhang H (2017) Two-stage keypoint detection scheme for region duplication forgery detection in digital images. J Forensic Sci. https:\/\/doi.org\/10.1111\/1556-4029.13456","DOI":"10.1111\/1556-4029.13456"},{"key":"5248_CR12","unstructured":"Farid H (2006) Exposing digital forgeries in scientific images Multimedia secur. (MM&sec), pp 29\u201336"},{"key":"5248_CR13","unstructured":"Fridrich AJ, Soukal BD, Lukas AJ (2003) Detection of copy-move forgery in digital images. Digital Forensic Research Workshop"},{"key":"5248_CR14","doi-asserted-by":"crossref","unstructured":"Hartley RI, Zisserman A (2004) Multiple view geometry in computer vision. Cambridge University Press","DOI":"10.1017\/CBO9780511811685"},{"key":"5248_CR15","doi-asserted-by":"crossref","unstructured":"Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia workshop on computational intelligence and industrial application, vol 2, pp 272\u2013276","DOI":"10.1109\/PACIIA.2008.240"},{"issue":"1","key":"5248_CR16","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178\u2013184","journal-title":"Forensic Sci Int"},{"issue":"2","key":"5248_CR17","first-page":"883","volume":"11","author":"M Imran","year":"2017","unstructured":"Imran M, Harvey BA (2017) Block based blind & secure gray image watermarking technique based on discrete wavelet transform and singular value decomposition. KSII Trans Internet Inf Syst 11(2):883\u2013900","journal-title":"KSII Trans Internet Inf Syst"},{"key":"5248_CR18","doi-asserted-by":"crossref","unstructured":"Kang X, Wei S (2008) Identifying tampered regions using singular value decomposition in digital image forensics. In: International conference on computer science and software engineering, vol 3, pp 926\u2013930","DOI":"10.1109\/CSSE.2008.876"},{"issue":"5","key":"5248_CR19","first-page":"1801","volume":"2","author":"ES Khan","year":"2010","unstructured":"Khan ES, Kulkarni EA (2010) An efficient method for detection of copy-move forgery using discrete wavelet transform. Int J Comput Sci Eng 2(5):1801\u20131806","journal-title":"Int J Comput Sci Eng"},{"key":"5248_CR20","doi-asserted-by":"crossref","unstructured":"Kirchner M, Sch\u00f6ttle P, Riess C (2015) Thinking beyond the block: block matching for copy-move forgery detection revisited. Media Watermarking, Security, and Forensics","DOI":"10.1117\/12.2082789"},{"key":"5248_CR21","doi-asserted-by":"publisher","unstructured":"Kwon GR, Lama RK, Pyun JY, Park CS (2015) Multimedia digital rights management based on selective encryption for flexible business model. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-015-2563-z","DOI":"10.1007\/s11042-015-2563-z"},{"key":"5248_CR22","doi-asserted-by":"crossref","unstructured":"Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: Canadian conference on computer and robot vision, pp 64\u201371","DOI":"10.1109\/CRV.2006.9"},{"issue":"3","key":"5248_CR23","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5248_CR24","doi-asserted-by":"crossref","unstructured":"Li W, Yu N (2010) Rotation robust detection of copy-move forgery. In: IEEE international conference on image processing, pp 2113\u20132116","DOI":"10.1109\/ICIP.2010.5652519"},{"issue":"5","key":"5248_CR25","first-page":"188","volume":"5","author":"HJ Lin","year":"2009","unstructured":"Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Signal Process 5(5):188\u2013197","journal-title":"WSEAS Trans Signal Process"},{"key":"5248_CR26","first-page":"1","volume":"2014","author":"B Liu","year":"2014","unstructured":"Liu B, Pun C-M, Yuan X-C (2014) Digital image forgery detection using JPEG features and local noise discrepancies. Sci World J 2014:1\u201312","journal-title":"Sci World J"},{"issue":"2","key":"5248_CR27","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91\u2013110","journal-title":"Int J Comput Vis"},{"issue":"2","key":"5248_CR28","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180\u2013189","journal-title":"Forensic Sci Int"},{"issue":"10","key":"5248_CR29","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1109\/TPAMI.2005.188","volume":"27","author":"K Mikolajczyk","year":"2005","unstructured":"Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1115\u20131125","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"5248_CR30","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"G Muhammad","year":"2012","unstructured":"Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49\u201357","journal-title":"Digit Investig"},{"issue":"6","key":"5248_CR31","first-page":"45","volume":"2","author":"S Murali","year":"2012","unstructured":"Murali S, Chittapur GB, Prabhakara HS, Anami BS (2012) Comparison and analysis of photo image forgery detection techniques. Int J Comput Sci Appl 2(6):45\u201356","journal-title":"Int J Comput Sci Appl"},{"key":"5248_CR32","doi-asserted-by":"crossref","first-page":"15","DOI":"10.14257\/ijast.2014.73.02","volume":"73","author":"S Mushtaq","year":"2014","unstructured":"Mushtaq S, Mir AH (2014) Digital image forgeries and passive image authentication techniques: a survey. International Journal of Advanced Science and Technology 73:15\u201332","journal-title":"International Journal of Advanced Science and Technology"},{"issue":"4","key":"5248_CR33","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857\u2013867","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"5248_CR34","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857\u2013867","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5248_CR35","doi-asserted-by":"publisher","unstructured":"Park C-S, Kim C, Lee J, Kwon G-R (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-016-3575-z","DOI":"10.1007\/s11042-016-3575-z"},{"issue":"1","key":"5248_CR36","doi-asserted-by":"crossref","first-page":"e21","DOI":"10.1016\/j.forsciint.2011.06.011","volume":"212","author":"F Peng","year":"2011","unstructured":"Peng F, Nie Y-Y, Long M (2011) A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Sci Int 212(1):e21\u2013e25","journal-title":"Forensic Sci Int"},{"key":"5248_CR37","unstructured":"Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515"},{"issue":"1","key":"5248_CR38","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133\u2013162","journal-title":"Multimedia Tools and Applications"},{"key":"5248_CR39","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","volume":"6387","author":"S Ryu","year":"2010","unstructured":"Ryu S, Lee M, Lee H (2010) Detection of copy-rotate-move forgery using Zernike moments. Lect Notes Comput Sci 6387:51\u201365","journal-title":"Lect Notes Comput Sci"},{"issue":"4","key":"5248_CR40","first-page":"199","volume":"8","author":"BL Shivakumar","year":"2011","unstructured":"Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci 8(4):199\u2013205","journal-title":"Int J Comput Sci"},{"issue":"12","key":"5248_CR41","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.3724\/SP.J.1004.2009.01488","volume":"35","author":"J Wang","year":"2009","unstructured":"Wang J, Liu G, Zhang Z, Dai Y, Wang Z (2009) Fast and robust forensics for image region-duplication forgery. Acta Automatica Sinica 35(12):1488\u20131495","journal-title":"Acta Automatica Sinica"},{"key":"5248_CR42","doi-asserted-by":"crossref","unstructured":"Wang M, et al. (2014) Countering anti-forensics to wavelet-based compression. In: IEEE international conference on image processing (ICIP), pp 5382\u20135386","DOI":"10.1109\/ICIP.2014.7026089"},{"key":"5248_CR43","doi-asserted-by":"publisher","unstructured":"Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z-L (2016) A new keypoint-based copy-move forgery detection for small smooth regions. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-016-4140-5","DOI":"10.1007\/s11042-016-4140-5"},{"issue":"12","key":"5248_CR44","first-page":"6206","volume":"10","author":"Y Wu","year":"2016","unstructured":"Wu Y, Zhang T, Hou X, Xu C (2016) New blind steganalysis framework combining image retrieval and outlier detection. KSII Trans Internet Inf Syst 10(12):6206\u20136219","journal-title":"KSII Trans Internet Inf Syst"},{"key":"5248_CR45","doi-asserted-by":"crossref","unstructured":"Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: International conference on image processing (ICIP), vol 2, pp 690\u2013683","DOI":"10.1109\/ICIP.1997.638587"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5248-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5248-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5248-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T05:06:03Z","timestamp":1570165563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5248-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,2]]},"references-count":45,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5248"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5248-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,2]]}}}