{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T08:07:06Z","timestamp":1648714026614},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11432-015-5296-8","type":"journal-article","created":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T06:47:30Z","timestamp":1433141250000},"page":"1-13","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Image composite authentication using a single shadow observation"],"prefix":"10.1007","volume":"58","author":[{"given":"XiaoChun","family":"Cao","sequence":"first","affiliation":[]},{"given":"HanDong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,1]]},"reference":[{"key":"5296_CR1","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/s11432-010-0058-0","volume":"53","author":"H Wang","year":"2010","unstructured":"Wang H, Fan M. Centroid-based semi-fragile audio watermarking in hybrid domain. Sci China Inf Sci, 2010, 53: 619\u2013633","journal-title":"Sci China Inf Sci"},{"key":"5296_CR2","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1007\/s11432-011-4470-x","volume":"55","author":"Y Zhao","year":"2012","unstructured":"Zhao Y, Ni R, Zhu Z. RST transforms resistant image watermarking based on centroid and sector-shaped partition. Sci China Inf Sci, 2012, 55: 650\u2013662","journal-title":"Sci China Inf Sci"},{"key":"5296_CR3","volume-title":"Digital Watermarking","author":"I Cox","year":"2002","unstructured":"Cox I, Miller M, Bloom J. Digital Watermarking. Morgan Kaufmann Publishers, 2002"},{"key":"5296_CR4","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TIFS.2009.2038742","volume":"5","author":"G Zhu","year":"2010","unstructured":"Zhu G, Huang J, Kwong S, et al. Fragility analysis of adaptive quantization-based image hashing. IEEE Trans Inf Forensics Secur, 2010, 5: 133\u2013147","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5296_CR5","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.1109\/TPAMI.2003.1240122","volume":"25","author":"A K Jain","year":"2003","unstructured":"Jain A K, Uludag U. Hiding biometric data. IEEE Trans Patt Anal Mach Intell, 2003, 25: 1494\u20131498","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"5296_CR6","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, et al. Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur, 2015, 10: 507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5296_CR7","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, et al. Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw, 2014, 7: 1283\u20131291","journal-title":"Secur Commun Netw"},{"key":"5296_CR8","volume-title":"Multimedia Tools Appl","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, et al. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl, 2014, doi: 10.1007\/s11042-014-2381-8"},{"key":"5296_CR9","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"2","author":"H Farid","year":"2009","unstructured":"Farid H. A survey of image forgery detection. IEEE Signal Process Mag, 2009, 2: 16\u201325","journal-title":"IEEE Signal Process Mag"},{"key":"5296_CR10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511811685","volume-title":"Multiple View Geometry in Computer Vision","author":"R Hartley","year":"2004","unstructured":"Hartley R, Zisserman A. Multiple View Geometry in Computer Vision. Cambridge: Cambridge University Press, 2004"},{"key":"5296_CR11","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1109\/TPAMI.2006.178","volume":"28","author":"F Lv","year":"2006","unstructured":"Lv F, Zhao T, Nevatia R. Camera calibration from video of a walking human. IEEE Trans Patt Anal Mach Intell, 2006, 28: 1513\u20131518","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"5296_CR12","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1023\/A:1026598000963","volume":"40","author":"A Criminisi","year":"2000","unstructured":"Criminisi A, Reid I, Zisserman A. Single view metrology. Int J Comput Vis, 2000, 40: 123\u2013148","journal-title":"Int J Comput Vis"},{"key":"5296_CR13","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/TPAMI.2005.80","volume":"27","author":"J S Kim","year":"2005","unstructured":"Kim J S, Gurdjos P, Kweon I S. Geometric and algebraic constraints of projected concentric circles and their applications to camera calibration. IEEE Trans Patt Anal Mach Intell, 2005, 27: 637\u2013642","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"5296_CR14","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.1109\/TPAMI.2010.26","volume":"32","author":"F Guo","year":"2010","unstructured":"Guo F, Chellappa R. Video metrology using a single camera. IEEE Trans Patt Anal Mach Intell, 2010, 32: 1329\u20131335","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"5296_CR15","first-page":"366","volume-title":"Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco","author":"T J Cham","year":"2010","unstructured":"Cham T J, Ciptadi A, Tan W, et al. Estimating camera pose from a single urban ground-view omnidirectional image and a 2D building outline map. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco, 2010. 366\u2013373"},{"key":"5296_CR16","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1016\/j.cviu.2010.04.003","volume":"114","author":"L Wu","year":"2010","unstructured":"Wu L, Cao X, Foroosh H. Camera calibration and geo-location estimation from two shadow trajectories. Comput Vis Image Understand, 2010, 114: 915\u2013927","journal-title":"Comput Vis Image Understand"},{"key":"5296_CR17","first-page":"754106","volume-title":"In: Proceedings of SPIE Symposium on Electronic Imaging, San Jose","author":"H Farid","year":"2010","unstructured":"Farid H, Bravo M J. Image forensic analyses that elude the human visual system. In: Proceedings of SPIE Symposium on Electronic Imaging, San Jose, 2010. 754106"},{"key":"5296_CR18","first-page":"19","volume-title":"Proceedings of International Workshop on Digital Watermarking, Guangzhou","author":"M K Johnson","year":"2007","unstructured":"Johnson M K, Farid H. Detecting photographic composites of people. In: Proceedings of International Workshop on Digital Watermarking, Guangzhou, 2007. 19\u201333"},{"key":"5296_CR19","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/S0262-8856(97)00046-2","volume":"16","author":"L Gool Vab","year":"1998","unstructured":"Vab Gool L, Proesmans M, Zisserman A. Planar homologies as a basis for grouping and recognition. Image Vis Comput, 1998, 16: 21\u201326","journal-title":"Image Vis Comput"},{"key":"5296_CR20","first-page":"1102","volume-title":"Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco","author":"N Jacobs","year":"2010","unstructured":"Jacobs N, Bies B, Pless R. Using cloud shadows to infer scene structure and camera calibration. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco, 2010. 1102\u20131109"},{"key":"5296_CR21","first-page":"47","volume-title":"Proceedings of Cognitive Robotics workshop at ECAI, Patras","author":"P Santos","year":"2008","unstructured":"Santos P, Dee H M, Fenelon V. Notes on a qualitative theory of shadows. In: Proceedings of Cognitive Robotics workshop at ECAI, Patras, 2008. 47\u201354"},{"key":"5296_CR22","first-page":"3040","volume-title":"Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, Hague","author":"A Matthew","year":"2004","unstructured":"Matthew A, Bosse M. Calibration of outdoor cameras from cast shadows. In: Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, Hague, 2004. 3040\u20133045"},{"key":"5296_CR23","first-page":"585","volume-title":"Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco","author":"L Wu","year":"2010","unstructured":"Wu L, Cao X. Geo-location estimation from two shadow trajectories. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, San Francisco, 2010. 585\u2013590"},{"key":"5296_CR24","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.cviu.2006.08.003","volume":"105","author":"X Cao","year":"2007","unstructured":"Cao X, Foroosh H. Camera calibration and light source orientation from solar shadows. Comput Vis Image Understand, 2007, 105: 60\u201372","journal-title":"Comput Vis Image Understand"},{"key":"5296_CR25","first-page":"1042","volume-title":"Proceedings of IEEE International Conference on Multimedia and Expo, New York City","author":"W Zhang","year":"2009","unstructured":"Zhang W, Cao X, Zhang J, et al. Detecting photographic composites using shadows. In: Proceedings of IEEE International Conference on Multimedia and Expo, New York City, 2009. 1042\u20131045"},{"key":"5296_CR26","first-page":"318","volume-title":"Proceedings of European Conference on Computer Vision, Marseille","author":"I N Junejo","year":"2008","unstructured":"Junejo I N, Foroosh H. Estimating geo-temporal location of stationary cameras using shadow trajectories. In: Proceedings of European Conference on Computer Vision, Marseille, 2008. 318\u2013331"},{"key":"5296_CR27","first-page":"1","volume-title":"Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Anchorage","author":"J Hays","year":"2008","unstructured":"Hays J, Efros A A. IM2GPS: estimating geographic information from a single image. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Anchorage, 2008. 1\u20138"},{"key":"5296_CR28","first-page":"2956","volume":"32","author":"E Kee","year":"2013","unstructured":"Kee E, O\u2019Brien J, Farid H. Exposing photo manipulation with inconsistent shadows. ACM Trans Graph, 2013, 32: 2956\u20132067","journal-title":"ACM Trans Graph"},{"key":"5296_CR29","first-page":"165","volume":"33","author":"E Kee","year":"2014","unstructured":"Kee E, O\u2019Brien J, Farid H. Exposing photo manipulation from shading and shadows. ACM Trans Graph, 2014, 33: 165\u2013185","journal-title":"ACM Trans Graph"},{"key":"5296_CR30","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1109\/TIFS.2012.2188796","volume":"7","author":"P Kakar","year":"2012","unstructured":"Kakar P, Sudha N. Verifying temporal data in geotagged images via sun azimuth estimation. IEEE Trans Inf Forensics Secur, 2012, 7: 1029\u20131039","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5296_CR31","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s00371-005-0335-x","volume":"21","author":"X Cao","year":"2005","unstructured":"Cao X, Shen Y, Shah M, et al. Single view compositing with shadows. Vis Comput, 2005, 21: 639\u2013648","journal-title":"Vis Comput"},{"key":"5296_CR32","first-page":"72","volume-title":"Proceedings of IEEE International Conference on Computer Vision, Kyoto","author":"S Agarwal","year":"2009","unstructured":"Agarwal S, Snavely N, Simon I, et al. Building Rome in a day. In: Proceedings of IEEE International Conference on Computer Vision, Kyoto, 2009. 72\u201379"},{"key":"5296_CR33","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11263-006-0031-y","volume":"75","author":"D Hoiem","year":"2007","unstructured":"Hoiem D, Efros A E, Hebert M. Recovering surface layout from an image. Int J Comput Vis, 2007, 75: 151\u2013172","journal-title":"Int J Comput Vis"},{"key":"5296_CR34","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/TPAMI.2008.300","volume":"32","author":"R G Gioi","year":"2010","unstructured":"Gioi R G, Jakubowicz J, Morel J M, et al. LSD: a fast line segment detector with a false detection control. IEEE Trans Patt Anal Mach Intell, 2010, 32: 722\u2013732","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"5296_CR35","first-page":"582","volume":"15","author":"N Aggarwal","year":"2006","unstructured":"Aggarwal N, Karl W C. Line detection in images through regularized Hough transform. IEEE Trans Patt Anal Mach Intell, 2006, 15: 582\u2013591","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"5296_CR36","first-page":"183","volume-title":"Proceedings of IEEE International Conference on Computer Vision, Kyoto","author":"J F Lalonde","year":"2009","unstructured":"Lalonde J F, Efros A A, Narasimhan S G. Estimating natural illumination from a single outdoor image. In: Proceedings of IEEE International Conference on Computer Vision, Kyoto, 2009. 183\u2013190"},{"key":"5296_CR37","volume-title":"Sundials: History, Theory, and Practice","author":"R R J Rohr","year":"1996","unstructured":"Rohr R R J. Sundials: History, Theory, and Practice. New York: Dover, 1996"},{"key":"5296_CR38","volume-title":"Sundials: Their Theory and Construction","author":"A Waugh","year":"1973","unstructured":"Waugh A. Sundials: Their Theory and Construction. New York: Dover, 1973"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5296-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5296-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5296-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:38:01Z","timestamp":1559403481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5296-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,1]]},"references-count":38,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["5296"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5296-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,1]]}}}