{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:50Z","timestamp":1740122870717,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T00:00:00Z","timestamp":1610409600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T00:00:00Z","timestamp":1610409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10436-0","type":"journal-article","created":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T14:22:16Z","timestamp":1610547736000},"page":"12831-12842","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Source-destination discrimination on copy-move forgeries"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1959-9856","authenticated-orcid":false,"given":"Emre","family":"G\u00fcrb\u00fcz","sequence":"first","affiliation":[]},{"given":"Guzin","family":"Ulutas","sequence":"additional","affiliation":[]},{"given":"Mustafa","family":"Ulutas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"issue":"10","key":"10436_CR1","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-Move Forgery Detection by Matching Triangles of Keypoints. IEEE Trans Info Foren Sec 10(10):2084\u20132094. https:\/\/doi.org\/10.1109\/TIFS.2015.2445742","journal-title":"IEEE Trans Info Foren Sec"},{"key":"10436_CR2","volume-title":"Pattern Recognition and Machine Learning","author":"CM Bishop","year":"2006","unstructured":"Bishop CM (2006) Pattern Recognition and Machine Learning. Springer Science+Business Media, New York"},{"issue":"10","key":"10436_CR3","doi-asserted-by":"publisher","first-page":"13819","DOI":"10.1007\/s11042-018-6666-1","volume":"78","author":"R Dixit","year":"2019","unstructured":"Dixit R, Naskar R (2019) Region duplication detection in digital images based on Centroid Linkage Clustering of key\u2013points and graph similarity matching. Multimed Tools Appl 78(10):13819\u201313840. https:\/\/doi.org\/10.1007\/s11042-018-6666-1","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"10436_CR4","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1587\/transinf.2016EDL8024","volume":"E99D","author":"M Emam","year":"2016","unstructured":"Emam M, Han Q, Yu L, Zhang H (2016) A keypoint-based region duplication forgery detection algorithm. IEICE Trans Inf Syst E99D(9):2413\u20132416. https:\/\/doi.org\/10.1587\/transinf.2016EDL8024","journal-title":"IEICE Trans Inf Syst"},{"doi-asserted-by":"publisher","unstructured":"Huang HY, Ciou AJ (2019) Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation. J Image Video Proc. https:\/\/doi.org\/10.1186\/s13640-019-0469-9","key":"10436_CR5","DOI":"10.1186\/s13640-019-0469-9"},{"doi-asserted-by":"publisher","unstructured":"Ikhlayel M, Hariadi M, Pumama IKE (2018) Modified Multi-scale Feature Extraction for Copy-Move Forgery Detection Based on CMD-SIFT. 2018 International Conference on Computer Engineering, Network and Intelligent Multimedia (CENIM), Surabaya, Indonesia, pp. 260\u2013264. https:\/\/doi.org\/10.1109\/CENIM.2018.8711029","key":"10436_CR6","DOI":"10.1109\/CENIM.2018.8711029"},{"doi-asserted-by":"publisher","unstructured":"Islam MM, Karmakar G, Kamruzzaman J, Murshed M, Kahandawa G, Parvin N (2018) Detecting Splicing and Copy-Move Attacks in Color Images. 2018 Digital Image Computing: Techniques and Applications (DICTA), Canberra, Australia, pp. 1\u20137. https:\/\/doi.org\/10.1109\/DICTA.2018.8615874","key":"10436_CR7","DOI":"10.1109\/DICTA.2018.8615874"},{"doi-asserted-by":"publisher","unstructured":"Jwaid MF, Baraskar TN (2017) Detection of Copy-Move Image Forgery Using Local Binary Pattern with Discrete Wavelet Transform and Principle Component Analysis. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCUBEA.2017.8463695","key":"10436_CR8","DOI":"10.1109\/ICCUBEA.2017.8463695"},{"doi-asserted-by":"publisher","unstructured":"Khuspe K, Mane V (2015) Robust image forgery localization and recognition in copy-move using bag of features and SVM. 2015 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICCICT.2015.7045718","key":"10436_CR9","DOI":"10.1109\/ICCICT.2015.7045718"},{"issue":"5","key":"10436_CR10","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Y Li","year":"2018","unstructured":"Li Y, Zhou J (2018) Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching. IEEE Trans Info Foren Sec 14(5):1307\u20131322. https:\/\/doi.org\/10.1109\/TIFS.2018.2876837","journal-title":"IEEE Trans Info Foren Sec"},{"issue":"8","key":"10436_CR11","doi-asserted-by":"publisher","first-page":"10207","DOI":"10.1007\/s11042-018-6605-1","volume":"78","author":"J Ouyang","year":"2019","unstructured":"Ouyang J, Liu Y, Liao M (2019) Robust copy-move forgery detection method using pyramid model and Zernike moments. Multimed Tools Appl 78(8):10207\u201310225. https:\/\/doi.org\/10.1007\/s11042-018-6605-1","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"publisher","unstructured":"Parashar A, Upadhyay AK, Gupta K (2018) An effectual classification approach to detect copy-move forgery using support vector machines. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6707-9","key":"10436_CR12","DOI":"10.1007\/s11042-018-6707-9"},{"issue":"15","key":"10436_CR13","doi-asserted-by":"publisher","first-page":"20655","DOI":"10.1007\/s11042-019-7277-1","volume":"78","author":"A Pavlovi\u0107","year":"2019","unstructured":"Pavlovi\u0107 A, Gli\u0161ovi\u0107 N, Gavrovska A, Reljin I (2019) Copy-move forgery detection based on multifractals. Multimed Tools Appl 78(15):20655\u201320678. https:\/\/doi.org\/10.1007\/s11042-019-7277-1","journal-title":"Multimed Tools Appl"},{"issue":"20","key":"10436_CR14","doi-asserted-by":"publisher","first-page":"26939","DOI":"10.1007\/s11042-018-5899-3","volume":"77","author":"CS Prakash","year":"2018","unstructured":"Prakash CS, Kumar A, Maheshkar S, Maheshkar V (2018) An integrated method of copy-move and splicing for image forgery detection. Multimed Tools Appl 77(20):26939\u201326963. https:\/\/doi.org\/10.1007\/s11042-018-5899-3","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"10436_CR15","doi-asserted-by":"publisher","first-page":"23535","DOI":"10.1007\/s11042-019-7629-x","volume":"78","author":"CS Prakash","year":"2019","unstructured":"Prakash CS, Panzade PP, Om H, Maheshkar S (2019) Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multimed Tools Appl 78(16):23535\u201323558. https:\/\/doi.org\/10.1007\/s11042-019-7629-x","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"publisher","unstructured":"Ramirez-Gutierrez K, Mariko-Nakano, Sanchez-Perez G, Perez-Meana H (2019) Copy-Move Forgery Detection Algorithm using Frequency Transforms, SURF and MSER. 2019 7th International Workshop on Biometrics and Forensics (IWBF), Cancun, Mexico, pp. 1\u20136. https:\/\/doi.org\/10.1109\/IWBF.2019.8739168","key":"10436_CR16","DOI":"10.1109\/IWBF.2019.8739168"},{"issue":"2","key":"10436_CR17","doi-asserted-by":"publisher","first-page":"2311","DOI":"10.1007\/s11042-018-6354-1","volume":"78","author":"X Wang","year":"2019","unstructured":"Wang X, Jiao L, Wang X, Yang H, Niu P (2019) Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching. Multimed Tools Appl 78(2):2311\u20132344. https:\/\/doi.org\/10.1007\/s11042-018-6354-1","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"publisher","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: Detecting Copy-Move Image Forgery with Source\/Target Localization. European Conference on Computer Vision, Munich, Germany, pp. 170\u2013186. https:\/\/doi.org\/10.1007\/978-3-030-01231-1_11","key":"10436_CR18","DOI":"10.1007\/978-3-030-01231-1_11"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10436-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10436-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10436-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T17:49:00Z","timestamp":1618595340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10436-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10436"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10436-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,12]]},"assertion":[{"value":"3 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}