{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T01:37:15Z","timestamp":1648604235096},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,7,19]],"date-time":"2016-07-19T00:00:00Z","timestamp":1468886400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Memetic Comp."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s12293-016-0200-7","type":"journal-article","created":{"date-parts":[[2016,7,19]],"date-time":"2016-07-19T02:56:18Z","timestamp":1468896978000},"page":"325-332","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Authenticated media uploading framework for mobile cloud computing"],"prefix":"10.1007","volume":"8","author":[{"given":"M. Shamim","family":"Hossain","sequence":"first","affiliation":[]},{"given":"Ghulam","family":"Muhammad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,19]]},"reference":[{"key":"200_CR1","doi-asserted-by":"crossref","unstructured":"Al-Hammadi MH, Muhammad G, Hussain M, Bebis G (2013) Curvelet transform and local texture based image forgery detection, ISVC 2013, Part II, LNCS, vol 8034, pp 503\u2013512","DOI":"10.1007\/978-3-642-41939-3_49"},{"issue":"6","key":"200_CR2","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1109\/JCN.2011.6157475","volume":"13","author":"P Calyam","year":"2011","unstructured":"Calyam P, Sridharan M, Xu Y, Zhu K, Berryman A, Patali R, Venkataraman A (2011) Enabling performance intelligence for application adaptation in the future Internet. J Commun Netw 13(6):591\u2013601","journal-title":"J Commun Netw"},{"key":"200_CR3","unstructured":"CASIA Tampered Image Detection Evaluation Database (2016) Downloadable at: http:\/\/forensics.idealtest.org . Accessed 10 Feb 2016"},{"issue":"3","key":"200_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang CC, Lin CJ (2011) LIBSVM-a library for support vector machine. ACM Trans Intell Syst Technol 2(3):1\u201327","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"9","key":"200_CR5","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TPAMI.2009.155","volume":"32","author":"J Chen","year":"2010","unstructured":"Chen J, Shan S, He C, Zhao G, Pietik\u00e4inen M, Chen X, Gao W (2010) WLD: a robust local image descriptor. IEEE Trans Pattern Anal Mach Intell 32(9):1705\u20131720","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"200_CR6","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"issue":"4","key":"200_CR7","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"N Davies","year":"2009","unstructured":"Davies N (2009) The case for VM-Based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14\u201323","journal-title":"IEEE Pervasive Comput"},{"key":"200_CR8","doi-asserted-by":"crossref","unstructured":"El-Alfy M, Qureshi MA (2015) Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal Appl 18(3):713\u2013723","DOI":"10.1007\/s10044-014-0396-4"},{"key":"200_CR9","doi-asserted-by":"publisher","unstructured":"Hossain MS, Muhammad G (2015) Audio-visual emotion recognition using multi-directional regression and ridgelet transform. J Multimodal User Interfaces 1\u20139. doi: 10.1007\/s12193-015-0207-2","DOI":"10.1007\/s12193-015-0207-2"},{"key":"200_CR10","unstructured":"Jain AK (1989) Fundamentals of digital image processing, vol 51. Prentice Hall, Upper Saddle River, NJ, USA"},{"issue":"4","key":"200_CR11","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","volume":"25","author":"G Muhammad","year":"2014","unstructured":"Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985\u2013995","journal-title":"Mach Vis Appl"},{"issue":"2","key":"200_CR12","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1007\/s10586-015-0439-7","volume":"18","author":"G Muhammad","year":"2015","unstructured":"Muhammad G (2015) Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system. Cluster Comput 18(2):795\u2013802","journal-title":"Cluster Comput"},{"key":"200_CR13","doi-asserted-by":"crossref","unstructured":"Muhammad G, Hossain MS (2011) Robust copy-move image forgery detection using undecimated wavelets and zernike moments. In: ACM third International conference on internet multimedia computing and service (ICIMCS). ACM, New York","DOI":"10.1145\/2043674.2043702"},{"issue":"4","key":"200_CR14","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14\u201323","journal-title":"IEEE Pervasive Comput"},{"key":"200_CR15","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1109\/TIP.2002.1014998","volume":"11","author":"J-L Starck","year":"2002","unstructured":"Starck J-L, Cand\u00e8s EJ, Donoho DL (2002) The curvelet transform for image denoising. IEEE Trans Image Process 11:670\u2013684","journal-title":"IEEE Trans Image Process"},{"key":"200_CR16","first-page":"806","volume":"4633","author":"M Tanya","year":"2007","unstructured":"Tanya M, Angshul M, Wu QMJ (2007) Face recognition by curvelet based feature extraction. ICIAR 4633:806\u2013817","journal-title":"ICIAR"},{"key":"200_CR17","unstructured":"Wei W, Jing D, Tieniu T (2010) Image tampering detection based on stationary distribution of Markov chain. In: IEEE Intl. conference on image processing (ICIP\u201910), pp 2101\u20132104"},{"key":"200_CR18","unstructured":"Welling M (2005) Robust higher order statistics. In: Proceedings of the 10th internation workshop on artificial intelligence and statistics (AISTATS), pp 405\u2013412"},{"issue":"4","key":"200_CR19","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/TMM.2014.2315596","volume":"16","author":"Y Wen","year":"2014","unstructured":"Wen Y, Zhu X, Rodrigues JPC, Chen CW (2014) Cloud mobile media: reflections and outlook. IEEE Trans Multimed 16(4):885\u2013902","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"200_CR20","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TCSVT.2014.2347513","volume":"25","author":"X Zhao","year":"2015","unstructured":"Zhao X, Wang S, Li S, Li J (2015) Passive image-splicing detection by a 2-D noncausal markov model. IEEE Trans Circ Syst Video Technol 25(2):185\u2013199","journal-title":"IEEE Trans Circ Syst Video Technol"}],"container-title":["Memetic Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12293-016-0200-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12293-016-0200-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12293-016-0200-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T06:29:25Z","timestamp":1568183365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12293-016-0200-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,19]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["200"],"URL":"https:\/\/doi.org\/10.1007\/s12293-016-0200-7","relation":{},"ISSN":["1865-9284","1865-9292"],"issn-type":[{"value":"1865-9284","type":"print"},{"value":"1865-9292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,19]]}}}