{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T13:50:57Z","timestamp":1774878657274,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/icassp.2011.5946873","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:50:30Z","timestamp":1310557830000},"page":"1880-1883","source":"Crossref","is-referenced-by-count":68,"title":["Exposing duplicated regions affected by reflection, rotation and scaling"],"prefix":"10.1109","author":[{"given":"Sergio","family":"Bravo-Solorio","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Asoke K.","family":"Nandi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"ref11","first-page":"1706","article-title":"Detecing image region duplication using SIFT features","author":"pan","year":"2010","journal-title":"Proc of ICASSP - IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"ref12","first-page":"824","article-title":"Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling","author":"bravo-solorio","year":"2009","journal-title":"Proc European Signal Processing Conf EUSIPCO 98"},{"key":"ref13","article-title":"The Fourier transform and its application","author":"bracewell","year":"1986"},{"key":"ref4","first-page":"746","article-title":"Robust detection of region-duplication forgery in digital images","volume":"4","author":"luo","year":"2006","journal-title":"Proc IAPR International Conference on Pattern Recognition"},{"key":"ref3","article-title":"Exposing digital forgeries by detecting duplicated image regions","author":"popescu","year":"2004","journal-title":"Tech Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.11.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CRV.2006.9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIMA.2007.271"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288877"},{"key":"ref2","first-page":"55","article-title":"Detection of copy-move forgery in digital images","author":"jessica","year":"2003","journal-title":"Proc of Digital Forensic Research Workshop"},{"key":"ref1","article-title":"Photo Fakery: The History and Techniques of Photographic Deception and Manipulation","author":"brugioni","year":"1999"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PACIIA.2008.240"}],"event":{"name":"ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Prague, Czech Republic","start":{"date-parts":[[2011,5,22]]},"end":{"date-parts":[[2011,5,27]]}},"container-title":["2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5916934\/5946226\/05946873.pdf?arnumber=5946873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T05:46:04Z","timestamp":1490075164000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5946873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icassp.2011.5946873","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}