{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:35:03Z","timestamp":1764239703410,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T00:00:00Z","timestamp":1309478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T00:00:00Z","timestamp":1309478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icdsp.2011.6004974","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T19:32:18Z","timestamp":1315855938000},"page":"1-6","source":"Crossref","is-referenced-by-count":21,"title":["Blind copy move image forgery detection using dyadic undecimated wavelet transform"],"prefix":"10.1109","author":[{"given":"Ghulam","family":"Muhammad","sequence":"first","affiliation":[{"name":"College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]},{"given":"Muhammad","family":"Hussain","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]},{"given":"Khalid","family":"Khawaji","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]},{"given":"George","family":"Bebis","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"19","first-page":"362","article-title":"A new approach of detecting copy-move forgery in digital images","author":"zhang","year":"2008","journal-title":"Proc 2008 IEEE Int Conf Commun"},{"key":"17","first-page":"55","article-title":"Detection of copy-move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Proc Digital Forensic Res Workshop"},{"journal-title":"Exposing Digital Forgeries by Detecting Duplicated Image Regions","year":"2004","author":"popescu","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4285009"},{"key":"16","first-page":"824","article-title":"Passive forensic method for detecting duplicated regions affected by reflection, rotation, and scaling","author":"solario","year":"2009","journal-title":"Proc EUSIPCO"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.11.002"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PACIIA.2008.240"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2010.05.003"},{"key":"12","first-page":"1053","article-title":"An efficient and robust method for detecting copy-move forgery","author":"bayram","year":"2009","journal-title":"Proc ICASSP"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/34.142909"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2004288"},{"key":"20","article-title":"Tamper detection based on regularity of wavelet transform coefficients","author":"sutcu","year":"2007","journal-title":"Proc IEEE ICIP"},{"key":"2","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1155\/S1110865702204047","article-title":"A survey of watermarking algorithms for image authentication","volume":"2002","author":"rey","year":"2002","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/278476.278484"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024715"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2004.924603"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916010"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"}],"event":{"name":"2011 17th International Conference on Digital Signal Processing (DSP)","start":{"date-parts":[[2011,7,6]]},"location":"Corfu, Greece","end":{"date-parts":[[2011,7,8]]}},"container-title":["2011 17th International Conference on Digital Signal Processing (DSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5983340\/6004864\/06004974.pdf?arnumber=6004974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T20:14:17Z","timestamp":1704831257000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6004974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icdsp.2011.6004974","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}