{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T09:23:11Z","timestamp":1775726591115,"version":"3.50.1"},"reference-count":85,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T00:00:00Z","timestamp":1543363200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11042-018-6922-4","type":"journal-article","created":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T05:33:58Z","timestamp":1543383238000},"page":"30081-30096","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["Copy-move forgery detection using combined features and transitive matching"],"prefix":"10.1007","volume":"78","author":[{"given":"Cong","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4068-1766","authenticated-orcid":false,"given":"Wei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xinchao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hanhui","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,28]]},"reference":[{"issue":"11","key":"6922_CR1","doi-asserted-by":"crossref","first-page":"2274","DOI":"10.1109\/TPAMI.2012.120","volume":"34","author":"R Achanta","year":"2012","unstructured":"Achanta R, Shaji A, Smith K, Lucchi A, Fua P, S\u00fcsstrunk S. (2012) Slic superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274\u20132282","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"6922_CR2","doi-asserted-by":"crossref","unstructured":"Alcantarilla PF, Bartoli A, Davison AJ (2012) Kaze features. In: European conference on computer vision(ECCV), Florence, Italy, pp 214\u2013227","DOI":"10.1007\/978-3-642-33783-3_16"},{"issue":"3","key":"6922_CR3","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"6","key":"6922_CR4","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"99","key":"6922_CR5","first-page":"1","volume":"PP","author":"M Bashar","year":"2010","unstructured":"Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Trans Image Process PP(99):1\u20131","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"6922_CR6","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded up robust features. Comput Vis Image Underst 110(3):346\u2013359","journal-title":"Comput Vis Image Underst"},{"issue":"99","key":"6922_CR7","first-page":"1","volume":"PP","author":"G Bedi","year":"2018","unstructured":"Bedi G, Venayagamoorthy GK, Singh R, Brooks R, Wang KC (2018) Review of internet of things (iot) in electric power and energy systems. IEEE Int Things J PP(99):1\u20131","journal-title":"IEEE Int Things J"},{"key":"6922_CR8","doi-asserted-by":"crossref","unstructured":"Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: IEEE International conference on acoustics, speech and signal processing(ICASSP), Prague, Czech Republic, pp 1880\u20131883","DOI":"10.1109\/ICASSP.2011.5946873"},{"key":"6922_CR9","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.jvcir.2018.06.004","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen J, Lu W, Fang Y, Liu X, Yeung Y, Yingjie X (2018) Binary image steganalysis based on local texture pattern. J Vis Commun Image Represent 55:149\u2013156","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"6922_CR10","first-page":"201","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C, Zhang Y (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Continua 55(2):201\u2013211","journal-title":"Comput Mater Continua"},{"issue":"3","key":"6922_CR11","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244\u2013254","journal-title":"J Vis Commun Image Represent"},{"issue":"99","key":"6922_CR12","first-page":"1","volume":"PP","author":"X Chen","year":"2018","unstructured":"Chen X, Weng J, Lu W, Xu J (2018) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell PP(99):1\u20131","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"99","key":"6922_CR13","first-page":"1","volume":"PP","author":"X Chen","year":"2017","unstructured":"Chen X, Weng J, Lu W, Xu J, Weng J (2017) Deep manifold learning combined with convolutional neural networks for action recognition. IEEE Trans Neural Netw Learn Syst PP(99):1\u201315","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"6922_CR14","doi-asserted-by":"crossref","unstructured":"Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. In: EEE International workshop on information forensics and security (WIFS), Seattle, WA, USA , pp 1\u20136","DOI":"10.1109\/WIFS.2010.5711472"},{"issue":"6","key":"6922_CR15","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C (2012) Angelopoulou, e.: an evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"11","key":"6922_CR16","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensic Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"283","key":"6922_CR17","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.ins.2014.06.022","volume":"283","author":"W Fang","year":"2014","unstructured":"Fang W, Li Y, Zhang H, Xiong N, Lai J, Vasilakos AV (2014) On the throughput-energy tradeoff for data transmission between cloud and mobile devices. Inf Sci 283(283):79\u201393","journal-title":"Inf Sci"},{"issue":"11","key":"6922_CR18","doi-asserted-by":"crossref","first-page":"2956","DOI":"10.1109\/TSMC.2016.2557225","volume":"47","author":"Y Fang","year":"2017","unstructured":"Fang Y, Fang Z, Yuan F, Yang Y, Yang S, Xiong NN (2017) Optimized multioperator image retargeting based on perceptual similarity measure. IEEE Trans Syst Man Cybern Syst 47(11):2956\u20132966","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"2","key":"6922_CR19","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/TIFS.2014.2368364","volume":"10","author":"B Feng","year":"2014","unstructured":"Feng B, Lu W, Sun W (2014) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensic Secur 10(2):243\u2013255","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"6922_CR20","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.jvcir.2014.10.003","volume":"26","author":"B Feng","year":"2015","unstructured":"Feng B, Lu W, Sun W (2015) Binary image steganalysis based on pixel mesh markov transition matrix. J Vis Commun Image Represent 26:284\u2013295","journal-title":"J Vis Commun Image Represent"},{"issue":"21","key":"6922_CR21","doi-asserted-by":"crossref","first-page":"9623","DOI":"10.1007\/s11042-014-2140-x","volume":"74","author":"B Feng","year":"2015","unstructured":"Feng B, Lu W, Sun W (2015) Novel steganographic method based on generalized k-distance n-dimensional pixel matching. Multimed Tools Appl 74(21):9623\u20139646","journal-title":"Multimed Tools Appl"},{"issue":"C","key":"6922_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.image.2015.10.007","volume":"41","author":"B Feng","year":"2016","unstructured":"Feng B, Lu W, Sun W, Huang J, Shi YQ (2016) Robust image watermarking based on tucker decomposition and adaptive-lattice quantization index modulation. Signal Process Image Commun 41(C):1\u201314","journal-title":"Signal Process Image Commun"},{"key":"6922_CR23","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.jvcir.2017.01.008","volume":"46","author":"B Feng","year":"2017","unstructured":"Feng B, Weng J, Lu W, Pei B (2017) Steganalysis of content-adaptive binary image data hiding. J Vis Commun Image Represent 46:119\u2013127. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1047320317300081","journal-title":"J Vis Commun Image Represent"},{"key":"6922_CR24","doi-asserted-by":"crossref","unstructured":"Feng B, Weng J, Lu W, Pei B (2017) Multiple watermarking using multilevel quantization index modulation. In: International workshop on digital watermarking, Beijing, China, pp 312\u2013326","DOI":"10.1007\/978-3-319-53465-7_23"},{"issue":"10","key":"6922_CR25","doi-asserted-by":"crossref","first-page":"4729","DOI":"10.1109\/TIP.2016.2593583","volume":"25","author":"A Ferreira","year":"2016","unstructured":"Ferreira A, Felipussi SC, Alfaro C, Fonseca P, Vargasmunoz JE, Dos Santos JA, Rocha A (2016) Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans Image Process 25(10):4729\u20134742","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"6922_CR26","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381\u2013395","journal-title":"Commun ACM"},{"key":"6922_CR27","unstructured":"Fridrich J, Soukal D, Luk\u00e1\u0161 J (2003) Detection of copy-move forgery in digital images. In: Proceeding of digital forensic research workshop, Cleveland, OH, USA, pp 19\u201323"},{"issue":"1","key":"6922_CR28","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s10586-015-0499-8","volume":"19","author":"L Gao","year":"2016","unstructured":"Gao L, Yu F, Chen Q, Xiong N (2016) Consistency maintenance of do and undo\/redo operations in real-time collaborative bitmap editing systems. Clust Comput 19(1):255\u2013267","journal-title":"Clust Comput"},{"key":"6922_CR29","doi-asserted-by":"crossref","unstructured":"Ghorbani M, Firouzmand M, Faraahi A (2011) DWT-DCT (QCD) based copy-move image forgery detection. In: International conference on systems, signals and image processing, pp 1\u20134. Sarajevo","DOI":"10.1049\/cp.2012.0439"},{"issue":"99","key":"6922_CR30","doi-asserted-by":"crossref","first-page":"2396","DOI":"10.1109\/ACCESS.2017.2672561","volume":"5","author":"J Gui","year":"2017","unstructured":"Gui J, Hui L, Xiong N (2017) A game-based localized multi-objective topology control scheme in heterogeneous wireless networks. IEEE Access 5(99):2396\u20132416","journal-title":"IEEE Access"},{"key":"6922_CR31","unstructured":"Harris CG, Stephens MJ (1988) A combined corner and edge detector. In: Alvey vision conference, pp 147\u2013151"},{"issue":"3","key":"6922_CR32","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TETC.2014.2316525","volume":"2","author":"C Hu","year":"2014","unstructured":"Hu C, Xu Z, Liu Y, Mei L, Chen L, Luo X (2014) Semantic link network-based model for organizing multimedia big data. IEEE Trans Emerg Topics Comput 2(3):376\u2013387","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"6922_CR33","doi-asserted-by":"crossref","unstructured":"Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia workshop on computational intelligence and industrial application, pp 272\u2013276","DOI":"10.1109\/PACIIA.2008.240"},{"issue":"1-3","key":"6922_CR34","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1-3):178\u2013184","journal-title":"Forensic Sci Int"},{"key":"6922_CR35","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.image.2017.05.010","volume":"57","author":"G Jin","year":"2017","unstructured":"Jin G, Wan X (2017) An improved method for SIFT-based copy-move forgery detection using non-maximum value suppression and optimized J-Linkage. Signal Process Image Commun 57:113\u2013 125","journal-title":"Signal Process Image Commun"},{"issue":"C","key":"6922_CR36","first-page":"250","volume":"321","author":"JC Lee","year":"2015","unstructured":"Lee JC, Chang CP, Chen WK (2015) Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci 321(C):250\u2013262","journal-title":"Inf Sci"},{"issue":"3","key":"6922_CR37","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"6922_CR38","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.jvcir.2016.06.003","volume":"40","author":"J Li","year":"2016","unstructured":"Li J, Lu W (2016) Blind image motion deblurring with L0-regularized priors. J Vis Commun Image Represent 40:14\u201323","journal-title":"J Vis Commun Image Represent"},{"issue":"24","key":"6922_CR39","doi-asserted-by":"crossref","first-page":"31895","DOI":"10.1007\/s11042-018-6175-2","volume":"77","author":"Jixian Li","year":"2018","unstructured":"Li J, Lu W, Weng J, Mao Y, Li G (2018) Double jpeg compression detection based on block statistics. Multimed Tools Appl 77(24):1\u201316","journal-title":"Multimedia Tools and Applications"},{"issue":"20","key":"6922_CR40","first-page":"1","volume":"76","author":"J Li","year":"2016","unstructured":"Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed Tools Appl 76(20):1\u201315","journal-title":"Multimed Tools Appl"},{"issue":"1-3","key":"6922_CR41","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Y Li","year":"2013","unstructured":"Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1-3):59","journal-title":"Forensic Sci Int"},{"issue":"3","key":"6922_CR42","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/TNSM.2016.2554143","volume":"13","author":"B Lin","year":"2016","unstructured":"Lin B, Guo W, Xiong N, Chen G, Vasilakos AV, Zhang H (2016) A pretreatment workflow scheduling approach for big data applications in multicloud environments. IEEE Trans Netw Serv Manag 13(3):581\u2013594","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"11","key":"6922_CR43","first-page":"14241","volume":"77","author":"Cong Lin","year":"2017","unstructured":"Lin C, Lu W, Sun W, Zeng J, Xu T, Lai JH (2017) Region duplication detection based on image segmentation and keypoint contexts. Multimed Tools Appl 77(11):1\u201318","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"6922_CR44","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1016\/j.jnca.2010.09.001","volume":"34","author":"G Liu","year":"2011","unstructured":"Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34(5):1557\u20131565","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"6922_CR45","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91\u2013110","journal-title":"Int J Comput Vis"},{"issue":"8","key":"6922_CR46","doi-asserted-by":"crossref","first-page":"3562","DOI":"10.1007\/s11227-016-1821-9","volume":"73","author":"X Lu","year":"2017","unstructured":"Lu X, Tu L, Zhou X, Xiong N, Sun L (2017) Vimedianet: an emulation system for interactive multimedia based telepresence services. J Supercomput 73(8):3562\u20133578","journal-title":"J Supercomput"},{"issue":"8","key":"6922_CR47","first-page":"1","volume":"76","author":"Z Lu","year":"2017","unstructured":"Lu Z, Lin YR, Huang X, Xiong N, Fang Z (2017) Visual topic discovering, tracking and summarization from social media streams. Multimed Tools Appl 76(8):1\u201325","journal-title":"Multimed Tools Appl"},{"issue":"99","key":"6922_CR48","first-page":"1","volume":"PP","author":"Y Ma","year":"2018","unstructured":"Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set \u03b1-positive region reduction. IEEE Trans Circ Syst Video Technol PP(99): 1\u20131","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"6922_CR49","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171:180\u2013189","journal-title":"Forensic Sci Int"},{"issue":"2","key":"6922_CR50","first-page":"111","volume":"53","author":"LS Melro","year":"2017","unstructured":"Melro LS, Jensen LR (2017) Influence of functionalization on the structural and mechanical properties of graphene. Comput Mater Continua 53(2):111\u2013131","journal-title":"Comput Mater Continua"},{"key":"6922_CR51","unstructured":"Nelson B, Phillips A, Steuart C (2015) Guide to computer forensics and investigations delmar learning"},{"issue":"4","key":"6922_CR52","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensic Secur 5(4):857\u2013867","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"6922_CR53","unstructured":"Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Tech. Rep. TR2004-515, Department of Computer Science Dartmouth College"},{"issue":"8","key":"6922_CR54","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive over-segmentation and feature points matching. IEEE Trans Inf Forensic Secur 10 (8):1705\u20131716","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"8","key":"6922_CR55","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensic Secur 8(8):1355\u20131370","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"6922_CR56","first-page":"51","volume-title":"Information Hiding","author":"Seung-Jin Ryu","year":"2010","unstructured":"Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. In: IEEE International workshop on information hiding(IH). Springer, Berlin, pp 51\u201365"},{"issue":"4","key":"6922_CR57","first-page":"199","volume":"8","author":"BL Shivakumar","year":"2011","unstructured":"Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues 8(4):199\u2013205","journal-title":"Int J Comput Sci Issues"},{"issue":"5","key":"6922_CR58","first-page":"297","volume":"9","author":"L Shu","year":"2016","unstructured":"Shu L, Fang Y, Fang Z, Yang Y, Fei F, Xiong N (2016) A novel objective quality assessment for super-resolution images. Int J Sig Process 9(5):297\u2013308","journal-title":"Int J Sig Process"},{"issue":"C","key":"6922_CR59","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29(C):16\u201332","journal-title":"J Vis Commun Image Represent"},{"key":"6922_CR60","doi-asserted-by":"crossref","unstructured":"Vedaldi A, Fulkerson B (2010) Vlfeat: an open and portable library of computer vision algorithms. In: International conference on multimedea, Firenze, Italy, pp 1469\u20131472","DOI":"10.1145\/1873951.1874249"},{"issue":"22","key":"6922_CR61","first-page":"1","volume":"76","author":"J Wang","year":"2016","unstructured":"Wang J, Li T, Shi YQ, Lian S, Ye J (2016) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76(22):1\u201317","journal-title":"Multimed Tools Appl"},{"issue":"C","key":"6922_CR62","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.ins.2017.04.035","volume":"408","author":"Y Wang","year":"2017","unstructured":"Wang Y, Chen K, Yu J, Xiong N, Leung H, Zhou H, Zhu L (2017) Dynamic propagation characteristics estimation and tracking based on an em-ekf algorithm in time-variant mimo channel. Inf Sci 408(C):70\u201383","journal-title":"Inf Sci"},{"key":"6922_CR63","unstructured":"Wang Z, Fan B, Wu F (2011) Local intensity order pattern for feature description. In: IEEE International conference on computer vision (ICCV), pp 603\u2013610"},{"key":"6922_CR64","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.jvcir.2017.04.004","volume":"46","author":"NBA Warif","year":"2017","unstructured":"Warif NBA, Wahab AWA, Idris MYI, Salleh R, Othman F (2017) SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46:219\u2013232","journal-title":"J Vis Commun Image Represent"},{"issue":"6","key":"6922_CR65","doi-asserted-by":"crossref","first-page":"1303","DOI":"10.3390\/s17061303","volume":"17","author":"P Wu","year":"2017","unstructured":"Wu P, Xiao F, Sha C, Huang H, Wang R, Xiong N (2017) Node scheduling strategies for achieving full-view area coverage in camera sensor networks. Sensors 17(6):1303","journal-title":"Sensors"},{"issue":"4","key":"6922_CR66","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of lsb matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947\u20131962","journal-title":"Multimed Tools Appl"},{"key":"6922_CR67","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.ins.2016.12.030","volume":"387","author":"Z Xia","year":"2017","unstructured":"Xia Z, Xiong NN, Vasilakos AV, Sun X (2017) Epcbir: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195\u2013204","journal-title":"Inf Sci"},{"issue":"9","key":"6922_CR68","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/TPDS.2010.29","volume":"21","author":"N Xiong","year":"2010","unstructured":"Xiong N, Jia X, Yang LT, Vasilakos AV, Li Y, Pan Y (2010) A distributed efficient flow control scheme for multirate multicast networks. IEEE Trans Parallel Distrib Syst 21(9):1254\u20131266","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"6922_CR69","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSEN.2016.2633501","volume":"17","author":"N Xiong","year":"2017","unstructured":"Xiong N, Liu RW, Liang M, Wu D, Liu Z, Wu H (2017) Effective alternating direction optimization methods for sparsity-constrained blind image deblurring. Sensors 17(1):1\u201327","journal-title":"Sensors"},{"issue":"4","key":"6922_CR70","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/JSAC.2009.090512","volume":"27","author":"N Xiong","year":"2009","unstructured":"Xiong N, Vasilakos AV, Yang LT, Song L, Pan Y, Kannan R, Li Y (2009) Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J Sel Areas Commun 27(4):495\u2013509","journal-title":"IEEE J Sel Areas Commun"},{"issue":"11","key":"6922_CR71","doi-asserted-by":"crossref","first-page":"2249","DOI":"10.1016\/j.ins.2009.12.001","volume":"180","author":"N Xiong","year":"2009","unstructured":"Xiong N, Vasilakos AV, Yang LT, Wang CX, Kannan R, Chang CC, Pan Y (2009) A novel self-tuning feedback controller for active queue management supporting tcp flows. Inf Sci 180(11):2249\u20132263","journal-title":"Inf Sci"},{"key":"6922_CR72","unstructured":"Xu B, Wang J, Liu G, Dai Y (2010) Image copy-move forgery detection based on SURF. In: International conference on multimedia information networking and security (MINES), Nanjing, China, pp 889\u2013 892"},{"issue":"4","key":"6922_CR73","first-page":"1098","volume":"22","author":"B Yang","year":"2013","unstructured":"Yang B, Sun X, Chen X, Zhang J, Li X (2013) An efficient forensic method for copy-move forgery detection based on dwt-fwht. Radioengineering 22(4):1098\u20131105","journal-title":"Radioengineering"},{"key":"6922_CR74","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.engappai.2016.12.022","volume":"59","author":"F Yang","year":"2017","unstructured":"Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73\u201383","journal-title":"Eng Appl Artif Intell"},{"issue":"12","key":"6922_CR75","doi-asserted-by":"crossref","first-page":"22,408","DOI":"10.3390\/s141222408","volume":"14","author":"Y Yang","year":"2014","unstructured":"Yang Y, Tong S, Huang S, Lin P (2014) Dual-tree complex wavelet transform and image block residual-based multi-focus image fusion in visual sensor networks. Sensors 14(12):22,408\u201322,430","journal-title":"Sensors"},{"issue":"3","key":"6922_CR76","doi-asserted-by":"crossref","first-page":"219","DOI":"10.32604\/cmc.2017.053.235","volume":"53","author":"Z Yang","year":"2017","unstructured":"Yang Z, Ma L, Ma Q, Cui J, Nie Y, Dong H, An X (2017) Multiscale nonlinear thermo-mechanical coupling analysis of composite structures with quasi-periodic properties. Comput Mater Continua 53(3):219\u2013248","journal-title":"Comput Mater Continua"},{"issue":"7","key":"6922_CR77","first-page":"1301","volume":"16","author":"C Zhang","year":"2015","unstructured":"Zhang C, Wu D, Liu RW, Xiong N (2015) Non-local regularized variational model for image deblurring under mixed gaussian-impulse noise. J Int Technol 16(7):1301\u20131319","journal-title":"J Int Technol"},{"issue":"20","key":"6922_CR78","doi-asserted-by":"crossref","first-page":"26239","DOI":"10.1007\/s11042-018-5847-2","volume":"77","author":"Fengjun Zhang","year":"2018","unstructured":"Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on l0-regularization and kernel shape optimization. Multimed Tools Appl 77(20):1\u201319","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"6922_CR79","first-page":"1391","volume":"17","author":"H Zhang","year":"2016","unstructured":"Zhang H, Liu RW, Wu D, Liu Y, Xiong NN (2016) Non-convex total generalized variation with spatially adaptive regularization parameters for edge-preserving image restoration. J Int Technol 17(7):1391\u20131403","journal-title":"J Int Technol"},{"issue":"23","key":"6922_CR80","doi-asserted-by":"crossref","first-page":"31239","DOI":"10.1007\/s11042-018-6230-z","volume":"77","author":"Qingbo Zhang","year":"2018","unstructured":"Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimed Tools Appl 77(23):1\u201322","journal-title":"Multimedia Tools and Applications"},{"key":"6922_CR81","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.jvcir.2016.07.013","volume":"40","author":"Q Zhang","year":"2016","unstructured":"Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449\u2013458","journal-title":"J Vis Commun Image Represent"},{"key":"6922_CR82","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Sig Process 146:1\u20131","journal-title":"Sig Process"},{"issue":"99","key":"6922_CR83","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSMC.2017.2764039","volume":"PP","author":"H Zheng","year":"2017","unstructured":"Zheng H, Guo W, Xiong N (2017) A kernel-based compressive sensing approach for mobile data gathering in wireless sensor network systems. IEEE Trans Syst Man Cybern Syst PP(99):1\u201313","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"6","key":"6922_CR84","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1109\/TMM.2016.2537216","volume":"18","author":"P Zhou","year":"2016","unstructured":"Zhou P, Zhou Y, Wu D, Jin H (2016) Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks. IEEE Trans Multimed 18(6):1217\u20131229","journal-title":"IEEE Trans Multimed"},{"issue":"6","key":"6922_CR85","doi-asserted-by":"crossref","first-page":"714","DOI":"10.23919\/TST.2017.8195353","volume":"22","author":"Y Zhou","year":"2017","unstructured":"Zhou Y, Zhang D, Xiong N (2017) Post-cloud computing paradigms: a survey and comparison. Tsinghua Sci Technol 22(6):714\u2013732","journal-title":"Tsinghua Sci Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6922-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6922-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6922-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:29:57Z","timestamp":1775284197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6922-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,28]]},"references-count":85,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["6922"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6922-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,28]]},"assertion":[{"value":"13 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}