{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:12:02Z","timestamp":1725678722197},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9580052","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:29:48Z","timestamp":1635967788000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Identification of Multiple Copy-move Attacks in Digital Images using FFT and CNN"],"prefix":"10.1109","author":[{"given":"Gokul","family":"Nair","sequence":"first","affiliation":[]},{"given":"Kaustubh","family":"Venkatesh","sequence":"additional","affiliation":[]},{"given":"Dipankar","family":"Sen","sequence":"additional","affiliation":[]},{"given":"Reena","family":"Sonkusare","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICASSp.2018.8462205"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.14419\/ijet.v7i2.13.11604"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/s00138-013-0522-0"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/MINES.2010.189"},{"key":"ref14","first-page":"2021","article-title":"Identification of copy-move and splicing based forgeries using advanced SURF and revised template matching","author":"rani","year":"0","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/SAMI50585.2021.9378690"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2713168.2713194"},{"year":"2018","author":"sinha","journal-title":"Edge detection in images using Fourier Transform","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"year":"2017","author":"kingma","journal-title":"Adam A method for stochastic optimization","key":"ref19"},{"year":"2015","journal-title":"Chennai floods Edited Modi photo sparks online mockery","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TSp.2013.6614051"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s00521-016-2663-3"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MSPEC.1967.5217220"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIFS.2011.2129512"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.3390\/sym11101280"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.jisa.2020.102510"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-981-33-4604-8_70"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"ref20","first-page":"8792","article-title":"Generalized cross entropy loss for training deep neural networks with noisy labels","author":"zhang","year":"2018","journal-title":"32nd International Conference on Neural Information Processing Systems (NIPS'18)"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1609\/aaai.v33i01.33019808"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TKDE.2005.50"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2021,7,6]]},"location":"Kharagpur, India","end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09580052.pdf?arnumber=9580052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:57Z","timestamp":1652201757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9580052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9580052","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}