{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:16:17Z","timestamp":1769757377111,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,7,7]],"date-time":"2018-07-07T00:00:00Z","timestamp":1530921600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s11042-018-6354-1","type":"journal-article","created":{"date-parts":[[2018,7,7]],"date-time":"2018-07-07T05:11:38Z","timestamp":1530940298000},"page":"2311-2344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching"],"prefix":"10.1007","volume":"78","author":[{"given":"Xiang-yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Li-xian","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Xue-bing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hong-ying","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Pan-pan","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,7]]},"reference":[{"key":"6354_CR1","first-page":"1978","volume":"2","author":"AE Abdel-Hakim","year":"2006","unstructured":"Abdel-Hakim AE, Farag AACSIFT (2006) A SIFT descriptor with color invariant characteristics[C]\/\/computer vision and pattern recognition. 2006 IEEE Computer Society Conference on IEEE 2:1978\u20131983","journal-title":"2006 IEEE Computer Society Conference on IEEE"},{"issue":"11","key":"6354_CR2","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TPAMI.2012.120","volume":"34","author":"R Achanta","year":"2012","unstructured":"Achanta R, Shaji A, Smith K et al (2012) SLIC superpixels compared to state-of-the-art superpixel methods[J]. IEEE Trans Pattern Anal Mach Intell 34(11):2274\u20132282","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"6354_CR3","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R et al (2011) A SIFT-based forensic method for copy\u2013move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security 6(3):1099\u20131110","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"6354_CR4","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R et al (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage[J]. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"10","key":"6354_CR5","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy\u2013move forgery detection by matching triangles of keypoints[J]. IEEE Transactions on Information Forensics and Security 10(10):2084\u20132094","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6354_CR6","unstructured":"Aymaz S, Aymaz \u015e, Uluta\u015f G (2016) Detection of copy move forgery using Legendre Moments[C]\/\/Signal Processing and Communication Application Conference (SIU), 2016 24th. IEEE, 2016: 1125\u20131128"},{"key":"6354_CR7","unstructured":"Bo X, Junwen W, Guangjie L, et al. (2010) Image copy-move forgery detection based on SURF[C]\/\/Multimedia information networking and security (MINES), 2010 international conference on. IEEE, 889\u2013892"},{"key":"6354_CR8","unstructured":"Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling[C]\/\/Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. IEEE, 2011: 1880\u20131883"},{"issue":"8","key":"6354_CR9","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1016\/j.sigpro.2011.01.022","volume":"91","author":"S Bravo-Solorio","year":"2011","unstructured":"Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics[J]. Signal Process 91(8):1759\u20131770","journal-title":"Signal Process"},{"issue":"4","key":"6354_CR10","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s11859-015-1098-5","volume":"20","author":"M Cao","year":"2015","unstructured":"Cao M (2015) A new Delaunay triangulation algorithm based on constrained maximum circumscribed circle[J]. Wuhan University Journal of Natural Sciences 20(4):313\u2013317","journal-title":"Wuhan University Journal of Natural Sciences"},{"issue":"1\u20133","key":"6354_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L et al (2012) A robust detection algorithm for copy-move forgery in digital images.[J]. Forensic Sci Int 214(1\u20133):33\u201343","journal-title":"Forensic Sci Int"},{"issue":"11","key":"6354_CR12","doi-asserted-by":"publisher","first-page":"4013","DOI":"10.1007\/s11042-013-1809-x","volume":"74","author":"J Chambers","year":"2015","unstructured":"Chambers J, Yan W, Garhwal A et al (2015) Currency security and forensics: a survey[J]. Multimedia Tools and Applications 74(11):4013\u20134043","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"6354_CR13","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J et al (2012) An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on information forensics and security 7(6):1841\u20131854","journal-title":"IEEE Transactions on information forensics and security"},{"key":"6354_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.image.2016.03.007","volume":"45","author":"W Chun-peng","year":"2016","unstructured":"Chun-peng W, Xing-yuan W, Zhi-qiu X (2016) Geometrically invariant image watermarking based on fast radial harmonic Fourier moments[J]. Signal Process Image Commun 45:10\u201323","journal-title":"Signal Process Image Commun"},{"key":"6354_CR15","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch[C]\/\/Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014: 5312\u20135316"},{"issue":"11","key":"6354_CR16","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy\u2013move forgery detection[J]. IEEE Transactions on Information Forensics and Security 10(11):2284\u20132297","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"6354_CR17","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s11042-015-2496-6","volume":"75","author":"R Davarzani","year":"2016","unstructured":"Davarzani R, Mozaffari S, Yaghmaie K (2016) Perceptual image hashing using center-symmetric local binary patterns[J]. Multimedia Tools and Applications 75(8):4639\u20134667","journal-title":"Multimedia Tools and Applications"},{"issue":"18","key":"6354_CR18","doi-asserted-by":"publisher","first-page":"11513","DOI":"10.1007\/s11042-015-2872-2","volume":"75","author":"M Emam","year":"2016","unstructured":"Emam M, Han Q, Niu X (2016) PCET based copy-move forgery detection in images under geometric transforms[J]. Multimedia Tools & Applications 75(18):11513\u201311527","journal-title":"Multimedia Tools & Applications"},{"issue":"2","key":"6354_CR19","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s12209-016-2705-z","volume":"22","author":"J Gong","year":"2016","unstructured":"Gong J, Guo J (2016) Image copy-move forgery detection using SURF in opponent color space[J]. Transactions of Tianjin University 22(2):151\u2013157","journal-title":"Transactions of Tianjin University"},{"issue":"8","key":"6354_CR20","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1016\/j.patcog.2014.02.014","volume":"47","author":"H Hu","year":"2014","unstructured":"Hu H, Zhang Y, Shao C et al (2014) Orthogonal moments based on exponent functions: exponent-Fourier moments[J]. Pattern Recogn 47(8):2596\u20132606","journal-title":"Pattern Recogn"},{"key":"6354_CR21","unstructured":"Isaac MM, Wilscy M (2015) Copy-Move forgery detection based on Harris Corner points and BRISK[C]\/\/Proceedings of the Third International Symposium on Women in Computing and Informatics. ACM, 2015: 394\u2013399"},{"issue":"6","key":"6354_CR22","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TPAMI.2015.2477814","volume":"38","author":"S Korman","year":"2016","unstructured":"Korman S, Avidan S (2016) Coherency sensitive hashing[J]. IEEE Trans Pattern Anal Mach Intell 38(6):1099\u20131112","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"6","key":"6354_CR23","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1016\/j.compeleceng.2013.11.034","volume":"40","author":"L Li","year":"2014","unstructured":"Li L, Li S, Zhu H et al (2014) Detecting copy-move forgery under affine transforms for image forensics[J]. Computers & Electrical Engineering 40(6):1951\u20131962","journal-title":"Computers & Electrical Engineering"},{"key":"6354_CR24","unstructured":"Li C, Ma Q, Xiao L, et al (2016) An Image Copy Move Forgery Detection Method Using QDCT[C]\/\/Proceedings of the International Conference on Internet Multimedia Computing and Service. ACM, 2016: 5\u20138"},{"key":"6354_CR25","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.image.2017.01.001","volume":"52","author":"C Lin","year":"2017","unstructured":"Lin C, Li Y, Xu G et al (2017) Optimizing ZNCC calculation in binocular stereo matching[J]. Signal Process Image Commun 52:64\u201373","journal-title":"Signal Process Image Commun"},{"issue":"1","key":"6354_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TPAMI.2013.107","volume":"36","author":"MY Liu","year":"2014","unstructured":"Liu MY, Tuzel O, Ramalingam S et al (2014) Entropy-rate clustering: cluster analysis via maximizing a submodular function subject to a matroid constraint[J]. IEEE Trans Pattern Anal Mach Intell 36(1):99\u2013112","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"6354_CR27","unstructured":"Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI 2015) 1617\u20131623"},{"key":"6354_CR28","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16), 2016: 201\u2013207","DOI":"10.1609\/aaai.v30i1.9969"},{"issue":"2","key":"6354_CR29","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/s11263-013-0622-3","volume":"104","author":"P Mainali","year":"2013","unstructured":"Mainali P, Lafruit G, Yang Q et al (2013) SIFER: scale-invariant feature detector with error resilience[J]. Int J Comput Vis 104(2):172\u2013197","journal-title":"Int J Comput Vis"},{"key":"6354_CR30","unstructured":"Oommen R S, Jayamohan M, Sruthy S (2016) Scale invariant detection of copy-move forgery using fractal dimension and singular values[M]\/\/Advances in Signal Processing and Intelligent Recognition Systems. Springer, Cham, 2016: 559\u2013570"},{"issue":"4","key":"6354_CR31","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Security 5(4):857\u2013867","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"6354_CR32","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching[J]. IEEE Transactions on Information Forensics and Security 10(8):1705\u20131716","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"6354_CR33","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1364\/JOSAA.20.000631","volume":"20","author":"H Ren","year":"2003","unstructured":"Ren H, Ping Z, Bo W et al (2003) Multidistortion-invariant image recognition with radial harmonic Fourier moments[J]. JOSA A 20(4):631\u2013637","journal-title":"JOSA A"},{"issue":"8","key":"6354_CR34","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ et al (2013) Rotation invariant localization of duplicated image regions based on Zernike moments[J]. IEEE Transactions on Information Forensics and Security 8(8):1355\u20131370","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6354_CR35","unstructured":"Thirunavukkarasu V, Kumar J S, Chae G S, et al (2017) Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering[J]. Wireless Personal Communications, 2017:1\u201319"},{"key":"6354_CR36","unstructured":"\u00dcst\u00fcbi\u0307o\u011flu B, Ayas S, Do\u011fan H, et al (2015) Image forgery detection based on Colour SIFT[C]\/\/Signal Processing and Communications Applications Conference (SIU), 2015 23th. IEEE, 2015: 1741\u20131744"},{"key":"6354_CR37","first-page":"25","volume":"1","author":"J Wang","year":"2009","unstructured":"Wang J, Liu G, Li H et al (2009) Detection of image region duplication forgery using model with circle block[C]\/\/multimedia information networking and security, 2009. MINES'09. International conference on. IEEE 1:25\u201329","journal-title":"IEEE"},{"key":"6354_CR38","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"75","author":"NBA Warif","year":"2016","unstructured":"Warif NBA, Wahab AWA, Idris MYI et al (2016) Copy-move forgery detection: survey, challenges and future directions[J]. Journal of Network & Computer Applications 75:259\u2013278","journal-title":"Journal of Network & Computer Applications"},{"issue":"2","key":"6354_CR39","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1049\/iet-ipr.2016.0229","volume":"11","author":"Y Wo","year":"2016","unstructured":"Wo Y, Yang K, Han G et al (2016) Copy\u2013move forgery detection based on multi-radius PCET[J]. IET Image Process 11(2):99\u2013108","journal-title":"IET Image Process"},{"key":"6354_CR40","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.optlastec.2014.07.020","volume":"66","author":"W Xiang-yang","year":"2015","unstructured":"Xiang-yang W, Wei-yi L, Hong-ying Y et al (2015) Invariant quaternion radial harmonic Fourier moments for color image retrieval[J]. Opt Laser Technol 66:78\u201388","journal-title":"Opt Laser Technol"},{"key":"6354_CR41","unstructured":"Yang B, Sun X, Guo H, et al (2017) A copy-move forgery detection method based on CMFD-SIFT[J]. Multimedia Tools and Applications, 2017: 1\u201319"},{"key":"6354_CR42","doi-asserted-by":"crossref","unstructured":"Zhao J, Zhao W (2013) Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns[J]. Mathematical Problems in Engineering, (2013\u201312-29), 2013, 2013(4):1\u201312","DOI":"10.1155\/2013\/619564"},{"key":"6354_CR43","unstructured":"Zhao F, Shi W, Qin B, et al (2016) Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection[C]\/\/Security, Privacy, and Anonymity in Computation, Communication, and Storage: 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16\u201318, 2016, Proceedings 9. Springer International Publishing, 2016: 478\u2013490"},{"issue":"4","key":"6354_CR44","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s11045-016-0416-1","volume":"27","author":"J Zheng","year":"2016","unstructured":"Zheng J, Liu Y, Ren J et al (2016) Fusion of block and keypoints based approaches for effective copy-move image forgery detection[J]. Multidim Syst Sign Process 27(4):989\u20131005","journal-title":"Multidim Syst Sign Process"},{"issue":"6","key":"6354_CR45","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s11042-014-2431-2","volume":"75","author":"Y Zhu","year":"2016","unstructured":"Zhu Y, Shen X, Chen H (2016) Copy-move forgery detection based on scaled ORB[J]. Multimedia Tools & Applications 75(6):3221\u20133233","journal-title":"Multimedia Tools & Applications"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6354-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6354-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6354-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T02:26:18Z","timestamp":1661567178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6354-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,7]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["6354"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6354-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,7]]},"assertion":[{"value":"30 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}