{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:39:44Z","timestamp":1730227184288,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/ic3.2018.8530489","type":"proceedings-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T00:30:16Z","timestamp":1542069016000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods"],"prefix":"10.1109","author":[{"given":"Amanpreet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Savita","family":"Walia","sequence":"additional","affiliation":[]},{"given":"Krishan","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"214","article-title":"KAZE Features","author":"fern","year":"2012","journal-title":"ECCV"},{"key":"ref11","article-title":"Digital Image Forgery Detection: A systematic study, issues and future directions","author":"walia","year":"2017","journal-title":"Australian J Forensic Sciences"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/619564"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5244\/C.2.23"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5244\/C.22.38"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","article-title":"Copy-move forgery detection: Survey, challenges and future directions","volume":"75","author":"bakiah","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"key":"ref16","first-page":"521","volume":"4","author":"zhang","year":"2012","journal-title":"SURF-based Detection of Copy-Move Forgery in Flat Region"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.12.022"},{"key":"ref4","first-page":"61","article-title":"A Survey on Keypoint Based Copy-Paste Forgery Detection Techniques","volume":"78","author":"dada","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref3","first-page":"28","article-title":"Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images","volume":"89","author":"sekhar","year":"0","journal-title":"Int J Computer App (0975-8887)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1301290"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2015.7389169"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.aasri.2012.11.055","article-title":"Object Tracking Method Based on SURF","volume":"3","author":"deng","year":"2012","journal-title":"Aasri Procedia"},{"key":"ref7","first-page":"653","article-title":"Copy Move Image Forgery Detection Using SURF Feature Point Extraction","volume":"7","author":"jaseela","year":"2016","journal-title":"Int J Sci Eng Res"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/978-981-10-8660-1_36","article-title":"An Eagle-Eye View of Recent Digital Image Forgery Detection Methods","author":"walia","year":"2018","journal-title":"Smart and Innovative Trends in Next Generation Computing Technologies (NGCT 2017) CCIS"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","article-title":"Digital image forgery detection using passive techniques: A survey","volume":"10","author":"birajdar","year":"2013","journal-title":"Digit Investig"},{"key":"ref9","first-page":"176","volume":"5","author":"oyallon","year":"2015","journal-title":"An Analysis of the SURF Method Context Motivation and Previous Work"}],"event":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2018,8,2]]},"location":"Noida","end":{"date-parts":[[2018,8,4]]}},"container-title":["2018 Eleventh International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8509799\/8530453\/08530489.pdf?arnumber=8530489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:59:04Z","timestamp":1643227144000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8530489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ic3.2018.8530489","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}