{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T09:42:34Z","timestamp":1772530954283,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T00:00:00Z","timestamp":1510185600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636102"],"award-info":[{"award-number":["U1636102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China (CN)","award":["U1536105"],"award-info":[{"award-number":["U1536105"]}]},{"name":"National Key Technology R&D Program","award":["2016YFB0801003"],"award-info":[{"award-number":["2016YFB0801003"]}]},{"name":"National Key Technology R&D Program","award":["2016QY15Z2500"],"award-info":[{"award-number":["2016QY15Z2500"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-5374-6","type":"journal-article","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T12:32:45Z","timestamp":1510230765000},"page":"18269-18293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":80,"title":["Copy-move forgery detection based on convolutional kernel network"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1281-9182","authenticated-orcid":false,"given":"Yaqi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Qingxiao","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,9]]},"reference":[{"issue":"11","key":"5374_CR1","doi-asserted-by":"crossref","first-page":"2274","DOI":"10.1109\/TPAMI.2012.120","volume":"34","author":"R Achanta","year":"2012","unstructured":"Achanta R, Shaji A, Smith K, Lucchi A, Fua P, S\u00fcsstrunk S (2012) Slic superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274\u20132282","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"5374_CR2","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Bimbo A D, Serra G (2011) A sift-based forensic method for copycmove attack detection and transformation recovery. IEEE Trans Inf Forens Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"5374_CR3","unstructured":"Amin R, Islam SH, Vijayakumar P, Khan MK, Chang V (2017) A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication. Multimed Tools Appl 1\u201326"},{"key":"5374_CR4","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Futur Gener Comput Syst 78:1005\u20131019","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"5374_CR5","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TPAMI.2010.161","volume":"33","author":"P Arbelaez","year":"2011","unstructured":"Arbelaez P, Maire M, Fowlkes C, Malik J (2011) Contour detection and hierarchical image segmentation. IEEE Trans Pattern Anal Mach Intell 33(5):898\u2013916","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"10","key":"5374_CR6","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copycmove forgery detection by matching triangles of keypoints. IEEE Trans Inf Forens Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"5374_CR7","doi-asserted-by":"crossref","unstructured":"Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Trans Image Process","DOI":"10.1109\/TIP.2010.2046599"},{"key":"5374_CR8","doi-asserted-by":"crossref","unstructured":"Bayar B, Stamm MC (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security. ACM, pp 5\u201310","DOI":"10.1145\/2909827.2930786"},{"key":"5374_CR9","unstructured":"Borji A, Cheng MM, Jiang H, Li J (2014)"},{"key":"5374_CR10","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.jss.2015.12.031","volume":"124","author":"V Chang","year":"2017","unstructured":"Chang V (2017) A cybernetics social cloud. J Syst Softw 124:195\u2013211","journal-title":"J Syst Softw"},{"issue":"1","key":"5374_CR11","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/TSC.2015.2491281","volume":"9","author":"V Chang","year":"2016","unstructured":"Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1):138\u2013151","journal-title":"IEEE Trans Serv Comput"},{"key":"5374_CR12","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2015.10.003","volume":"57","author":"V Chang","year":"2016","unstructured":"Chang V, Wills G (2016) A model to compare cloud and non-cloud storage of big data. Futur Gener Comput Syst 57:56\u201376","journal-title":"Futur Gener Comput Syst"},{"issue":"6","key":"5374_CR13","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forens Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"11","key":"5374_CR14","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copycmove forgery detection. IEEE Trans Inform Forens Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"4","key":"5374_CR15","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TSMCA.2012.2223670","volume":"43","author":"J Cui","year":"2013","unstructured":"Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE Trans Syst Man Cybern Syst 43(4):996\u20131002","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"10","key":"5374_CR16","doi-asserted-by":"crossref","first-page":"4729","DOI":"10.1109\/TIP.2016.2593583","volume":"25","author":"A Ferreira","year":"2016","unstructured":"Ferreira A, Felipussi SC, Alfaro C, Fonseca P, Vargas-Munoz JE, dos Santos JA, Rocha A (2016) Behavior knowledge space-based fusion for copycmove forgery detection. IEEE Trans Image Process 25(10):4729\u20134742","journal-title":"IEEE Trans Image Process"},{"key":"5374_CR17","unstructured":"Fischer P, Dosovitskiy A, Brox T (2014) Descriptor matching with convolutional neural networks: a comparison to sift. arXiv preprint arXiv: 1405.5769"},{"key":"5374_CR18","unstructured":"Fridrich AJ, Soukal BD, Luk\u00e1s\u0307 AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop. Citeseer"},{"key":"5374_CR19","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Identity mappings in deep residual networks. arXiv preprint arXiv: 1603.05027","DOI":"10.1007\/978-3-319-46493-0_38"},{"issue":"9","key":"5374_CR20","doi-asserted-by":"crossref","first-page":"1704","DOI":"10.1109\/TPAMI.2011.235","volume":"34","author":"H Jegou","year":"2012","unstructured":"Jegou H, Perronnin F, Douze M, Sanchez J, Perez P, Schmid C (2012) Aggregating local image descriptors into compact codes. IEEE Trans Pattern Anal Mach Intell 34(9):1704\u20131716","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5374_CR21","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Proceedings of the advances in neural information processing systems, pp 1097\u20131105"},{"issue":"1","key":"5374_CR22","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Y Li","year":"2013","unstructured":"Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forens Sci Int 224(1):59\u201367","journal-title":"Forens Sci Int"},{"key":"5374_CR23","doi-asserted-by":"crossref","unstructured":"Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on dwt and svd. In: 2007 IEEE International conference on multimedia and expo. IEEE, pp 1750\u20131753","DOI":"10.1109\/ICME.2007.4285009"},{"issue":"3","key":"5374_CR24","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inform Forens Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"1","key":"5374_CR25","first-page":"46","volume":"4","author":"L Li","year":"2013","unstructured":"Li L, Li S, Zhu H, Chu S C, Roddick JF, Pan JS (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inform Hiding Multimed Signal Process 4(1):46\u201356","journal-title":"J Inform Hiding Multimed Signal Process"},{"key":"5374_CR26","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang X, Cui J, Wu C, Aghajan H, Zha H (2010) Visual analysis of child-adult interactive behaviors in video sequences. In: 2010 16th International conference on virtual systems and multimedia (VSMM). IEEE, pp 26\u201333","DOI":"10.1109\/VSMM.2010.5665969"},{"key":"5374_CR27","unstructured":"Liu Y, Cui J, Zhao H, Zha H (2012) Fusion of low-and high-dimensional approaches by trackers sampling for generic human motion tracking. In: 2012 21st International conference on pattern recognition (ICPR). IEEE, pp 898\u2013901"},{"key":"5374_CR28","unstructured":"Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. In: IJCAI, pp 1617\u20131623"},{"key":"5374_CR29","doi-asserted-by":"crossref","unstructured":"Liu Y, Cai Q, Zhu X, Cao J, Li H (2015) Saliency detection using two-stage scoring. In: 2015 IEEE International conference on image processing (ICIP). IEEE, pp 4062\u20134066","DOI":"10.1109\/ICIP.2015.7351569"},{"key":"5374_CR30","doi-asserted-by":"crossref","unstructured":"Liu L, Cheng L, Liu Y, Jia Y, Rosenblum DS (2016) Recognizing complex activities by a probabilistic interval-based model. In: AAAI, vol 30, pp 1266\u20131272","DOI":"10.1609\/aaai.v30i1.10155"},{"key":"5374_CR31","unstructured":"Liu Y, Liang Y, Liu S, Rosenblum DS, Zheng Y (2016) Predicting urban water quality with ubiquitous data. arXiv preprint arXiv: 1610.09462"},{"key":"5374_CR32","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","volume":"181","author":"Y Liu","year":"2016","unstructured":"Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108\u2013115","journal-title":"Neurocomputing"},{"key":"5374_CR33","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. In: AAAI, pp 201\u2013207","DOI":"10.1609\/aaai.v30i1.9969"},{"key":"5374_CR34","unstructured":"Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning"},{"key":"5374_CR35","unstructured":"Liu Y, Guan Q, Zhao X, Cao Y (2017) Image forgery localization based on multi-scale convolutional neural networks. arXiv preprint arXiv: 1706.07842"},{"key":"5374_CR36","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang X, Zhu X, Guan Q, Zhao X (2017) Listnet-based object proposals ranking. Neurocomputing","DOI":"10.1016\/j.neucom.2017.06.008"},{"issue":"8","key":"5374_CR37","doi-asserted-by":"crossref","first-page":"10,701","DOI":"10.1007\/s11042-015-3188-y","volume":"76","author":"Y Lu","year":"2017","unstructured":"Lu Y, Wei Y, Liu L, Zhong J, Sun L, Liu Y (2017) Towards unsupervised physical activity recognition using smartphone accelerometers. Multimed Tools Appl 76(8):10,701\u201310,719","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"5374_CR38","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian B, Saic S (2007) Detection of copy\u2013move forgery using a method based on blur moment invariants. Forens Sci Int 171(2):180\u2013189","journal-title":"Forens Sci Int"},{"key":"5374_CR39","unstructured":"Mairal J (2016) End-to-end kernel learning with supervised convolutional kernel networks. In: Proceedings of the advances in neural information processing systems"},{"key":"5374_CR40","unstructured":"Mairal J, Koniusz P, Harchaoui Z, Schmid C (2014) Convolutional kernel networks. In: Proceedings of the advances in neural information processing systems, pp 2627\u20132635"},{"key":"5374_CR41","doi-asserted-by":"crossref","unstructured":"Maninis KK, Pont-Tuset J, Arbel\u00e1ez P, Van Gool L (2016) Convolutional oriented boundaries. In: European conference on computer vision. Springer, pp 580\u2013596","DOI":"10.1007\/978-3-319-46448-0_35"},{"key":"5374_CR42","doi-asserted-by":"crossref","unstructured":"Mostajabi M, Yadollahpour P, Shakhnarovich G (2015) Feedforward semantic segmentation with zoom-out features. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3376\u20133385","DOI":"10.1109\/CVPR.2015.7298959"},{"issue":"4","key":"5374_CR43","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inform Forens Secur 5(4):857\u2013867","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"5374_CR44","doi-asserted-by":"crossref","unstructured":"Paulin M, Douze M, Harchaoui Z, Mairal J, Perronin F, Schmid C (2015) Local convolutional features with unsupervised training for image retrieval. In: Proceedings of the international conference on computer vision. IEEE, pp 91\u201399","DOI":"10.1109\/ICCV.2015.19"},{"issue":"1","key":"5374_CR45","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s11263-016-0924-3","volume":"121","author":"M Paulin","year":"2017","unstructured":"Paulin M, Mairal J, Douze M, Harchaoui Z, Perronnin F, Schmid C (2017) Convolutional patch representations for image retrieval: an unsupervised approach. Int J Comput Vis 121(1):149\u2013168","journal-title":"Int J Comput Vis"},{"issue":"1","key":"5374_CR46","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TPAMI.2016.2537320","volume":"39","author":"J Pont-Tuset","year":"2017","unstructured":"Pont-Tuset J, Arbelaez P, Barron JT, Marques F, Malik J (2017) Multiscale combinatorial grouping for image segmentation and object proposal generation. IEEE Trans Pattern Anal Mach Intell 39(1):128\u2013140","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5374_CR47","unstructured":"Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image region [technical report]. 2004-515. Hanover, Department of Computer Science, Dartmouth College, USA, p 32"},{"key":"5374_CR48","doi-asserted-by":"crossref","unstructured":"Preot\u0307iuc-Pietro D, Liu Y, Hopkins D, Ungar L (2017) Beyond binary labels: political ideology prediction of twitter users. In: Proceedings of the 55th annual meeting of the association for computational linguistics (volume 1: Long Papers), vol 1, pp 729\u2013740","DOI":"10.18653\/v1\/P17-1068"},{"issue":"8","key":"5374_CR49","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inform Forens Secur 10(8):1705\u20131716","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"5374_CR50","doi-asserted-by":"crossref","unstructured":"Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: IEEE International workshop on information forensics and security (WIFS). IEEE, pp 1\u20136","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"5374_CR51","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: towards real-time object detection with region proposal networks. In: Proceedings of the advances in neural information processing systems, pp 91\u201399"},{"issue":"8","key":"5374_CR52","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inform Forens Secur 8(8):1355\u20131370","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"5374_CR53","unstructured":"Shivakumar B, Baboo LDSS (2011) Detection of region duplication forgery in digital images using surf. IJCSI Int J Comput Sci Issues 8(4)"},{"key":"5374_CR54","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16\u201332","journal-title":"J Vis Commun Image Represent"},{"key":"5374_CR55","unstructured":"Simo-Serra E, Trulls E, Ferraz L, Kokkinos I, Moreno-Noguer F (2014) Fracking deep convolutional image descriptors. arXiv preprint arXiv: 1412.6537"},{"key":"5374_CR56","doi-asserted-by":"crossref","unstructured":"Simo-Serra E, Trulls E, Ferraz L, Kokkinos I, Fua P, Moreno-Noguer F (2015) Discriminative learning of deep convolutional feature point descriptor. In: Proceedings of the IEEE International conference on computer vision, pp 118\u2013126","DOI":"10.1109\/ICCV.2015.22"},{"key":"5374_CR57","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv: 1409.155"},{"issue":"12","key":"5374_CR58","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.1109\/34.895972","volume":"22","author":"AW Smeulders","year":"2000","unstructured":"Smeulders AW, Worring M, Santini S, Gupta A, Jain R (2000) Content-based image retrieval at the end of the early years. IEEE Trans Pattern Anal Mach Intell 22(12):1349\u20131380","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5374_CR59","doi-asserted-by":"crossref","unstructured":"Sohal AS, Sandhu R, Sood SK, Chang V (2017) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur","DOI":"10.1016\/j.cose.2017.08.016"},{"key":"5374_CR60","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.jnca.2016.11.024","volume":"86","author":"G Sun","year":"2017","unstructured":"Sun G, Xie Y, Liao D, Yu H, Chang V (2017) User-defined privacy location-sharing system in mobile online social networks. J Netw Comput Appl 86:34\u201345","journal-title":"J Netw Comput Appl"},{"key":"5374_CR61","unstructured":"Tralic D, Zupancic I, Grgic S, Grgic M (2013) Comofodnew database for copy-move forgery detection. In: ELMAR, 2013 55th international symposium. IEEE, pp 49\u201354"},{"key":"5374_CR62","doi-asserted-by":"crossref","unstructured":"Xie S, Tu Z (2015) Holistically-nested edge detection. In: Proceedings of the IEEE international conference on computer vision, pp 1395\u20131403","DOI":"10.1109\/ICCV.2015.164"},{"key":"5374_CR63","unstructured":"Yang B, Sun X, Guo H, Xia Z, Chen X (2017) A copy-move forgery detection method based on cmfd-sift. Multimed Tools Appl 1\u201319"},{"key":"5374_CR64","doi-asserted-by":"crossref","unstructured":"Yang Y, Zheng X, Chang V, Tang C (2017) Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage. Concurr Comput Pract Exper 29(19)","DOI":"10.1002\/cpe.4211"},{"key":"5374_CR65","unstructured":"Yang Y, Zheng X, Chang V, Ye S, Tang C (2017) Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud. Multimed Tools Appl 1\u201315"},{"key":"5374_CR66","doi-asserted-by":"crossref","unstructured":"Yang Y, Zheng X, Liu X, Zhong S, Chang V (2017) Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. Fut Gen Comput Systems","DOI":"10.1016\/j.future.2017.06.025"},{"issue":"11","key":"5374_CR67","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inform Forens Secur 11(11):2499\u20132512","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"5374_CR68","doi-asserted-by":"crossref","unstructured":"Zeiler MD, Fergus R (2014) Visualizing and understanding convolutional networks. In: Proceedings of the European conference on computer vision. Springer, pp 818\u2013833","DOI":"10.1007\/978-3-319-10590-1_53"},{"issue":"12","key":"5374_CR69","doi-asserted-by":"crossref","first-page":"3034","DOI":"10.1109\/TNNLS.2015.2401595","volume":"26","author":"XY Zhang","year":"2015","unstructured":"Zhang XY, Wang S, Yun X (2015) Bidirectional active learning: a two-way exploration into unlabeled and labeled data set. IEEE Trans Neural Netw Learn Syst 26(12):3034\u20133044","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"5374_CR70","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.neucom.2015.03.056","volume":"162","author":"XY Zhang","year":"2015","unstructured":"Zhang XY, Wang S, Zhu X, Yun X, Wu G, Wang Y (2015) Update vs. upgrade: modeling with indeterminate multi-class active learning. Neurocomputing 162:163\u2013170","journal-title":"Neurocomputing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5374-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5374-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5374-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T22:25:41Z","timestamp":1659824741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5374-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,9]]},"references-count":70,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5374"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5374-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,9]]}}}