{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:26:24Z","timestamp":1760955984482},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T00:00:00Z","timestamp":1568419200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T00:00:00Z","timestamp":1568419200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11042-019-08169-w","type":"journal-article","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T16:02:41Z","timestamp":1568476961000},"page":"34585-34612","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Copy-move forgery detection based on adaptive keypoints extraction and matching"],"prefix":"10.1007","volume":"78","author":[{"given":"Hong-Ying","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shu-Ren","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Pan-Pan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xiang-Yang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,14]]},"reference":[{"issue":"3","key":"8169_CR1","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans on Information Forensics & Security 6(3):1099\u20131110","journal-title":"IEEE Trans on Information Forensics & Security"},{"issue":"6","key":"8169_CR2","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"9","key":"8169_CR3","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"M Asikuzzaman","year":"2017","unstructured":"Asikuzzaman M, Pickering MR (2017) An overview of digital video watermarking. IEEE Trans on Circuits and Systems for Video Technology 28(9):2131\u20132153","journal-title":"IEEE Trans on Circuits and Systems for Video Technology"},{"issue":"3","key":"8169_CR4","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T et al (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346\u2013359","journal-title":"Comput Vis Image Underst"},{"issue":"3","key":"8169_CR5","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Digit Investig 10(3):226\u2013245","journal-title":"Digit Investig"},{"key":"8169_CR6","first-page":"1","volume-title":"Image Classification using random forests and ferns","author":"A Bosch","year":"2007","unstructured":"Bosch A, Zisserman A, Munoz X (2007) Image Classification using random forests and ferns. IEEE 11th International Conference on Computer Vision, Rio de Janeiro, pp 1\u20138"},{"key":"8169_CR7","first-page":"1880","volume-title":"Exposing duplicated regions affected by reflection, rotation and scaling","author":"S Bravo-Solorio","year":"2011","unstructured":"Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, pp 1880\u20131883"},{"issue":"6","key":"8169_CR8","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans on Information Forensics & Security 7(6):1841\u20131854","journal-title":"IEEE Trans on Information Forensics & Security"},{"key":"8169_CR9","first-page":"5312","volume-title":"Copy-move forgery detection based on patchmatch","author":"D Cozzolino","year":"2014","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. 2014 IEEE International Conference on Image Processing (ICIP), Paris, pp 5312\u20135316"},{"issue":"11","key":"8169_CR10","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans on Information Forensics and Security 10(11):2284\u20132297","journal-title":"IEEE Trans on Information Forensics and Security"},{"issue":"9","key":"8169_CR11","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1049\/iet-ipr.2016.0322","volume":"11","author":"R Dixit","year":"2017","unstructured":"Dixit R, Naskar R (2017) Review, analysis and parameterization of techniques for copy\u2013move forgery detection in digital image. IET Image Process 11(9):746\u2013759","journal-title":"IET Image Process"},{"key":"8169_CR12","first-page":"516","volume-title":"Discriminative feature-to-point matching in image-based localization","author":"M Donoser","year":"2014","unstructured":"Donoser M, Schmalstieg D (2014) Discriminative feature-to-point matching in image-based localization. 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Columbus, pp 516\u2013523"},{"key":"8169_CR13","unstructured":"Fridrich J, Soukal D, Lukas J (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, Cleveland"},{"issue":"2","key":"8169_CR14","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s12209-016-2705-z","volume":"22","author":"J Gong","year":"2016","unstructured":"Gong J, Guo J (2016) Image copy-move forgery detection using SURF in opponent color space. Transactions of Tianjin University 22(2):151\u2013157","journal-title":"Transactions of Tianjin University"},{"key":"8169_CR15","first-page":"272","volume-title":"Detection of copy-move forgery in digital images using SIFT algorithm","author":"H Huang","year":"2008","unstructured":"Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm, vol 2. Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA), Wuhan, pp 272\u2013276"},{"key":"8169_CR16","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.image.2017.05.010","volume":"57","author":"G Jin","year":"2017","unstructured":"Jin G, Wan X (2017) An improved method for SIFT-based copy\u2013move forgery detection using non-maximum value suppression and optimized J-Linkage. Signal Process Image Commun 57:113\u2013125","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"8169_CR17","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/TIFS.2012.2188390","volume":"7","author":"P Kakar","year":"2012","unstructured":"Kakar P, Sudha N (2012) Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Trans on Information Forensics & Security 7(3):1018\u20131028","journal-title":"IEEE Trans on Information Forensics & Security"},{"key":"8169_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.dsp.2017.08.009","volume":"71","author":"P Korus","year":"2017","unstructured":"Korus P (2017) Digital image integrity\u2013a survey of protection and verification techniques. Digital Signal Processing 71:1\u201326","journal-title":"Digital Signal Processing"},{"issue":"2","key":"8169_CR19","first-page":"91","volume":"4","author":"S Kumar","year":"2016","unstructured":"Kumar S, Desai JV, Mukherjee S (2016) A fast keypoint based hybrid method for copy move forgery detection. Computer Vision and Pattern Recognition 4(2):91\u201399","journal-title":"Computer Vision and Pattern Recognition"},{"key":"8169_CR20","doi-asserted-by":"crossref","unstructured":"Lepetit V, Fua P (2013) Keypoint recognition using random forests and random ferns. Decision Forests for Computer Vision and Medical Image Analysis:111\u2013124","DOI":"10.1007\/978-1-4471-4929-3_9"},{"key":"8169_CR21","first-page":"2548","volume-title":"BRISK: Binary Robust invariant scalable keypoints","author":"S Leutenegger","year":"2011","unstructured":"Leutenegger S, Chli M, Siegwart RY (2011) BRISK: Binary Robust invariant scalable keypoints. 2011 International Conference on Computer Vision, Barcelona, pp 2548\u20132555"},{"issue":"3","key":"8169_CR22","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans on Information Forensics & security 10(3):507\u2013518","journal-title":"IEEE Trans on Information Forensics & security"},{"key":"8169_CR23","first-page":"10264","volume-title":"A novel fast target tracking based on video image","author":"C Li","year":"2016","unstructured":"Li C, Yu F, Lin Z, Kang X (2016) A novel fast target tracking based on video image. Proceedings of the 35th Chinese Control Conference, Chengdu, pp 10264\u201310268"},{"issue":"5","key":"8169_CR24","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Y Li","year":"2018","unstructured":"Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans on Information Forensics and Security 14(5):1307\u20131322","journal-title":"IEEE Trans on Information Forensics and Security"},{"key":"8169_CR25","first-page":"645","volume-title":"Detection of copy-move forgery in images using segmentation and SURF","author":"VT Manu","year":"2016","unstructured":"Manu VT, Mehtre BM (2016) Detection of copy-move forgery in images using segmentation and SURF. Advances in Intelligent Systems and Computing, Cham, pp 645\u2013654"},{"issue":"1","key":"8169_CR26","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"G Muhammad","year":"2012","unstructured":"Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49\u201357","journal-title":"Digit Investig"},{"issue":"Part A","key":"8169_CR27","first-page":"46","volume":"39","author":"AQ Muhammad","year":"2015","unstructured":"Muhammad AQ, Mohamed D (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39(Part A):46\u201374","journal-title":"Signal Process Image Commun"},{"key":"8169_CR28","first-page":"1","volume-title":"Recent keypoint based copy move forgery detection techniques","author":"G Muzaffer","year":"2017","unstructured":"Muzaffer G, Karaagacli ES (2017) Recent keypoint based copy move forgery detection techniques. 2017 International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, pp 1\u20137"},{"issue":"3","key":"8169_CR29","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1109\/TPAMI.2009.23","volume":"32","author":"M Ozuysal","year":"2009","unstructured":"Ozuysal M, Calonder M, Lepetit V, Fua P (2009) Fast keypoint recognition using random ferns. IEEE Trans on Pattern Analysis and Machine Intelligence 32(3):448\u2013461","journal-title":"IEEE Trans on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"8169_CR30","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans on Information Forensics and Security 5(4):857\u2013867","journal-title":"IEEE Trans on Information Forensics and Security"},{"issue":"8","key":"8169_CR31","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"C Pun","year":"2015","unstructured":"Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive over-segmentation and feature point matching. IEEE Trans on Information Forensics Security 10(8):1705\u20131716","journal-title":"IEEE Trans on Information Forensics Security"},{"key":"8169_CR32","first-page":"51","volume-title":"Detection of copy-rotate-move forgery using Zernike moments","author":"SJ Ryu","year":"2010","unstructured":"Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. International Workshop on Information Hiding, Berlin, Heidelberg, pp 51\u201365"},{"key":"8169_CR33","unstructured":"Sachdev K, Kaur M, Gupta S (2017) A robust and fast technique to detect copy move forgery in digital images using SLIC segmentation and SURF keypoints. Proceeding of International Conference on Intelligent Communication, Control and Devices. Springer Singapore, 479: 787-793"},{"key":"8169_CR34","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16\u201332","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"8169_CR35","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1049\/iet-ipr.2017.0441","volume":"12","author":"B Soni","year":"2018","unstructured":"Soni B, Das PK, Thounaojam DM (2018) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167\u2013178","journal-title":"IET Image Process"},{"issue":"1","key":"8169_CR36","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TPAMI.2010.160","volume":"33","author":"L Sun","year":"2011","unstructured":"Sun L, Ji S, Ye J (2011) Canonical correlation analysis for multilabel classification: A least-squares formulation, extensions, and analysis. IEEE Trans on Pattern Analysis & Machine Intelligence 33(1):194\u2013200","journal-title":"IEEE Trans on Pattern Analysis & Machine Intelligence"},{"key":"8169_CR37","doi-asserted-by":"crossref","first-page":"40550","DOI":"10.1109\/ACCESS.2019.2907316","volume":"7","author":"S Teerakanok","year":"2019","unstructured":"Teerakanok S, Uehara T (2019) Copy-Move Forgery Detection: A State-of-the-Art Technical Review and Analysis. IEEE Access 7:40550\u201340568","journal-title":"IEEE Access"},{"issue":"22","key":"8169_CR38","doi-asserted-by":"crossref","first-page":"23353","DOI":"10.1007\/s11042-016-4140-5","volume":"76","author":"XY Wang","year":"2017","unstructured":"Wang XY, Li S, Liu YN, Niu Y et al (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multimed Tools Appl 76(22):23353\u201323382","journal-title":"Multimed Tools Appl"},{"key":"8169_CR39","doi-asserted-by":"crossref","unstructured":"Wang H, Wang HX (2018) Perceptual Hashing-Based Image Copy-Move Forgery Detection. Security and Communication Networks","DOI":"10.1155\/2018\/6853696"},{"issue":"10","key":"8169_CR40","doi-asserted-by":"crossref","first-page":"12627","DOI":"10.1007\/s11042-016-3687-5","volume":"76","author":"H Wang","year":"2017","unstructured":"Wang H, Wang HX, Sun XM, Qian Q (2017) A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multimed Tools Appl 76(10):12627\u201312644","journal-title":"Multimed Tools Appl"},{"key":"8169_CR41","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.engappai.2016.12.022","volume":"59","author":"F Yang","year":"2017","unstructured":"Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73\u201383","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"8169_CR42","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/s11042-016-4289-y","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang B, Sun X, Guo H, Xia Z, Chen X (2018) A copy-move forgery detection method based on CMFD-SIFT. Multimed Tools Appl 77(1):837\u2013855","journal-title":"Multimed Tools Appl"},{"issue":"14","key":"8169_CR43","doi-asserted-by":"crossref","first-page":"18139","DOI":"10.1007\/s11042-017-5206-8","volume":"77","author":"H Yao","year":"2018","unstructured":"Yao H, Cao F, Tang Z, Wang J, Qiao T (2018) Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multimed Tools Appl 77(14):18139\u201318161","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"8169_CR44","doi-asserted-by":"crossref","first-page":"12457","DOI":"10.1007\/s11042-016-3660-3","volume":"76","author":"H Yao","year":"2017","unstructured":"Yao H, Wang S, Zhang X, Qin C, Wang J (2017) Detecting image splicing based on noise level inconsistency. Multimed Tools Appl 76(10):12457\u201312479","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"8169_CR45","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/TIFS.2017.2716911","volume":"12","author":"AA Yavuz","year":"2017","unstructured":"Yavuz AA, Mudgerikar A, Singla A, Papapanagiotou I, Bertino E (2017) Real-time digital signatures for time-critical networks. IEEE Trans on Information Forensics Security 12(11):2627\u20132639","journal-title":"IEEE Trans on Information Forensics Security"},{"issue":"11","key":"8169_CR46","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans on Information Forensics and Security 11(11):2499\u20132512","journal-title":"IEEE Trans on Information Forensics and Security"},{"issue":"1-3","key":"8169_CR47","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1-3):158\u2013166","journal-title":"Forensic Sci Int"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08169-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08169-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08169-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T23:21:29Z","timestamp":1599952889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08169-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,14]]},"references-count":47,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["8169"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08169-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,14]]},"assertion":[{"value":"18 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}