{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:46:09Z","timestamp":1729669569970,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/iccsce.2014.7072702","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T11:53:17Z","timestamp":1428061997000},"page":"130-135","source":"Crossref","is-referenced-by-count":0,"title":["A comparative analysis on pixel-based blind cloning techniques"],"prefix":"10.1109","author":[{"given":"Mariam","family":"Saleem","sequence":"first","affiliation":[]},{"given":"M.Qasim","family":"Altaf","sequence":"additional","affiliation":[]},{"given":"Qaiser","family":"Chaudry","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","article-title":"Detection of copy-rotate-move forgery using zernike moments","author":"ryu","year":"2010","journal-title":"Int Workshop Information Hiding Springer"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.04.004"},{"key":"ref12","article-title":"Fast and efficient region duplication detection in digital images using sub-blocking method","volume":"35","author":"vivek kumar","year":"2011","journal-title":"IJAST"},{"key":"ref13","article-title":"Detecting copy-move forgery under affine transforms for image forensics","author":"li","year":"2013","journal-title":"Compt Elect"},{"key":"ref14","article-title":"An efficient forensic method for copy&#x2014;move forgery detection based on DWT-FWHT","volume":"22","author":"bin","year":"2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.6614051"},{"key":"ref16","article-title":"An efficient expanding block algorithm for image copy-move forgery detection","author":"gavin","year":"2013","journal-title":"Information Sciences 239"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.189"},{"key":"ref18","first-page":"199","article-title":"Detection of region duplication forgery in digital images using SURF","volume":"8","author":"shivakumar","year":"2011","journal-title":"IJCSIS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref4","first-page":"6","article-title":"A Survey of image forgery detection","volume":"2","author":"farid","year":"2009","journal-title":"IEEE Signal Processing Magazine"},{"key":"ref3","article-title":"Survey of copy-move forgery detection techniques","author":"bayram","year":"2008","journal-title":"Proc of IEEE Western New York Image Processing Workshop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2008.4751315"},{"key":"ref8","article-title":"Exposing digital forgeries by detecting duplicated image regions","author":"popescu","year":"2004","journal-title":"TR2004-515 DC"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931078"},{"key":"ref2","article-title":"Osama bin Laden Corpse Photo is Fake","author":"hill","year":"2011","journal-title":"The Guardian"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIP.2010.5697444"},{"key":"ref1","first-page":"2645","article-title":"A classifier design for detecting image manipulations","author":"avcibas","year":"2004","journal-title":"Proc (ICIP) IEEE"},{"key":"ref20","article-title":"Detecting forgery in duplicated region using key-point matching","volume":"2","author":"suganthi","year":"2012","journal-title":"International Journal of Scientific and Research Publications"},{"key":"ref22","first-page":"1","article-title":"Image duplication detection using two robust features","volume":"1","author":"zahra","year":"2012","journal-title":"Res J Recent Sci"},{"key":"ref21","article-title":"Image copy-move forgery detection using local invariant feature","volume":"7","author":"jing","year":"2012","journal-title":"JM"},{"key":"ref24","article-title":"Detection techniques based on SURF and HAC","author":"huang","year":"2013","journal-title":"HPC"},{"key":"ref23","article-title":"Improving the detection and localization of duplicated regions in copy-move forgery","volume":"25","author":"maryam","year":"2014"},{"year":"0","key":"ref25"}],"event":{"name":"2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE)","start":{"date-parts":[[2014,11,28]]},"location":"Penang, Malaysia","end":{"date-parts":[[2014,11,30]]}},"container-title":["2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7063839\/7072673\/07072702.pdf?arnumber=7072702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T17:55:03Z","timestamp":1566496503000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7072702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccsce.2014.7072702","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}