{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:04:56Z","timestamp":1773842696743,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T00:00:00Z","timestamp":1579737600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T00:00:00Z","timestamp":1579737600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11277-020-07126-3","type":"journal-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T16:02:31Z","timestamp":1579795351000},"page":"1763-1781","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Deep Convolutional Neural Network for Graphics Forgery Detection in Video"],"prefix":"10.1007","volume":"112","author":[{"given":"Harpreet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Neeru","family":"Jindal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,23]]},"reference":[{"issue":"3","key":"7126_CR1","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1007\/s11045-017-0496-6","volume":"29","author":"L Su","year":"2018","unstructured":"Su, L., & Li, C. (2018). A novel passive forgery detection algorithm for video region duplication. Multidimensional Systems and Signal Processing,29(3), 1173\u20131190.","journal-title":"Multidimensional Systems and Signal Processing"},{"issue":"7","key":"7126_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218001412500176","volume":"26","author":"GS Lin","year":"2012","unstructured":"Lin, G. S., & Chang, J. F. (2012). Detection of frame duplication forgery in videos based on spatial and temporal analysis. International Journal of Pattern Recognition and Artificial Intelligence,26(7), 1\u201318.","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"7126_CR3","unstructured":"GRIP. (2018). Image processing research group. Retrieved January 10, 2018, from http:\/\/www.grip.unina.it\/web-download.html."},{"key":"7126_CR4","unstructured":"REWIND \u2013 Video (2017). Copy-move forgeries dataset. Retrieved September 10, 2017, from https:\/\/sites.google.com\/site\/rewindpolimi\/downloads\/datasets\/videocopy-move-forgeries-dataset."},{"key":"7126_CR5","doi-asserted-by":"crossref","unstructured":"Lin, G. S., Chang, J. F., & Chuang, C. H. (2011). Detecting frame duplication based on spatial and temporal analyses. In Proc. 6th international conference on computer science & education (ICCSE), Virgo Singapore (pp. 1396\u20131399).","DOI":"10.1109\/ICCSE.2011.6028891"},{"key":"7126_CR6","doi-asserted-by":"crossref","unstructured":"Wang, W., & Farid, H. (2007). Exposing digital forgeries in the video by detecting duplication. In Proc. 9th workshop of multimedia and security, NY (pp. 35\u201342).","DOI":"10.1145\/1288869.1288876"},{"issue":"9","key":"7126_CR7","doi-asserted-by":"publisher","first-page":"12605","DOI":"10.3390\/s130912605","volume":"3","author":"DK Hyun","year":"2013","unstructured":"Hyun, D. K., Ryu, S. J., Lee, H. Y., & Lee, H. K. (2013). Detection of upscale-crop and partial manipulation in surveillance video based on sensor pattern noise. Sensors Basel,3(9), 12605\u201312630.","journal-title":"Sensors Basel"},{"key":"7126_CR8","doi-asserted-by":"crossref","unstructured":"Xu, J., Liang, Y., Tian, X., & Xie, A. (2016). A novel video inter-frame forgery detection method based on histogram intersection. In Proc. IEEE\/CIC international conference on communications in China (ICCC) (pp. 1\u20136).","DOI":"10.1109\/ICCChina.2016.7636851"},{"key":"7126_CR9","doi-asserted-by":"crossref","unstructured":"Andy, S., & Haikal, A. (2017). Duplicate frame detection of MJPEG codec for video forensic. In Proc. 2nd international conferences on information technology, information systems and electrical engineering (ICITISEE), Yogyakarta (pp. 321\u2013324).","DOI":"10.1109\/ICITISEE.2017.8285520"},{"key":"7126_CR10","doi-asserted-by":"crossref","unstructured":"Kiran, B. R., Thomas, D. M., & Parakkal, R. (2018). An overview of deep learning-based methods for unsupervised and semi-supervised anomaly detection in videos. In Proc. computer vision and pattern recognition (pp. 1\u201315).","DOI":"10.3390\/jimaging4020036"},{"key":"7126_CR11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.jvcir.2017.06.010","volume":"48","author":"P He","year":"2017","unstructured":"He, P., Jiang, X., Sun, T., Wang, S., Li, B., & Dong, Y. (2017). Frame-wise detection of relocated i-frames in double compressed H.264 videos based on convolutional neural network. Journal of Visual Communication and Image Recognition,48, 149\u2013158.","journal-title":"Journal of Visual Communication and Image Recognition"},{"key":"7126_CR12","doi-asserted-by":"crossref","unstructured":"Long, C., Smith, E., et al. (2017). A C3D-based convolutional neural network for frame dropping detection in a single video shot. In Proc. IEEE conference on computer vision and pattern recognition workshops, Honolulu, HI (pp. 1898\u20131906).","DOI":"10.1109\/CVPRW.2017.237"},{"key":"7126_CR13","unstructured":"Xu, L., Ren, J. S. J., et al. (2014). Deep convolutional neural network for image deconvolution. In Proc. 27th international conference on neural information processing systems (pp. 1790\u20131798). (Cambridge, MA: MIT Press)."},{"issue":"1","key":"7126_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/sym10010003","volume":"10","author":"Ye Yao","year":"2017","unstructured":"Yao, Y., et al. (2017). Deep learning for detection of object-based forgery in advanced video. In Proc. symmetry, China (pp. 1\u201310).","journal-title":"Symmetry"},{"key":"7126_CR15","unstructured":"D Avino, D., Cozzolino, D., Poggi, G., & Verdoliva, L. (2017). Autoencoder with recurrent neural networks for video forgery detection. In Proc. IS&T electronic imaging: media watermarking, security and forensics."},{"key":"7126_CR16","doi-asserted-by":"crossref","unstructured":"Qadir, G., Yahaya, S., & Ho, A. T. S. (2012). Surrey university library for forensic analysis (SULFA) of video content. In Proc. IET conference on image processing.","DOI":"10.1049\/cp.2012.0422"},{"key":"7126_CR17","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun, C. M., Yuan, X. C., & Bi, X. L. (2015). Image forgery detection using adaptive over segmentation and feature point matching. IEEE Transactions on Information Forensics and Security,10, 1705\u20131716.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7126_CR18","doi-asserted-by":"crossref","unstructured":"Subramanyam, A. V., & Emmanuel, S. (2012). Video forgery detection using HOG features and compression properties. In IEEE 14th international workshop on multimedia signal processing (MMSP) (pp. 89\u201394).","DOI":"10.1109\/MMSP.2012.6343421"},{"key":"7126_CR19","doi-asserted-by":"crossref","unstructured":"Wang, W., & Farid, H. (2009). Exposing digital forgeries in video by detecting double quantization. In 11th ACM workshop on multimedia and security (pp. 39\u201348).","DOI":"10.1145\/1597817.1597826"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07126-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07126-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07126-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T01:25:04Z","timestamp":1611278704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07126-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,23]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7126"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07126-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,23]]},"assertion":[{"value":"23 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}