{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:01Z","timestamp":1740102241182,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008389","name":"Ministry of Higher Education (MOHE)","doi-asserted-by":"publisher","award":["FRGS\/1\/2020\/ICT04\/UTHM\/02\/1"],"award-info":[{"award-number":["FRGS\/1\/2020\/ICT04\/UTHM\/02\/1"]}],"id":[{"id":"10.13039\/100008389","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icsecs58457.2023.10256380","type":"proceedings-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:36:02Z","timestamp":1695749762000},"page":"357-362","source":"Crossref","is-referenced-by-count":1,"title":["A Comparative Analysis on Three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method"],"prefix":"10.1109","author":[{"given":"Nur Izzati","family":"Nor Azaimi","sequence":"first","affiliation":[{"name":"Universiti Tun Hussein Onn Malaysia,Faculty of Computer Science and Information Technology,Johor,Malaysia"}]},{"given":"Nor Bakiah","family":"Abd Warif","sequence":"additional","affiliation":[{"name":"Centre for Information Security Research, Universiti Tun Hussein Onn Malaysia,Faculty of Computer Science and Information Technology,Johor,Malaysia"}]},{"given":"Nor-Syahidatul N","family":"Ismail","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Department of Computer System and Networking,Pekan,Pahang,Malaysia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.01.022"},{"key":"ref12","first-page":"55","article-title":"Detection of Copy- Move Forgery in Digital Images","volume":"3","author":"fridrich","year":"2003","journal-title":"Int J Comput Sci Issues"},{"key":"ref15","first-page":"49","article-title":"CoMoFoD- New database for copy-move forgery detection","author":"tralic","year":"2013","journal-title":"Proceedings ELMAR-2013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2018.1523346"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.13005\/ojcst\/09.03.09"},{"key":"ref10","first-page":"183","article-title":"FI-SIFT Algorithm for Exposing Image Copy- Move Forgery with Reflection Attacks","volume":"22","author":"yu","year":"2020","journal-title":"Int J Netw Secur"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.008"},{"key":"ref17","first-page":"4567","article-title":"Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors","volume":"11","author":"zhang","year":"2017","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2445742"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"journal-title":"Image Forgery Detection Based on SURF and Machine Learning Classifier","year":"2019","author":"rothe","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102526"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443141"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2018.03.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4270776"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.04.004"}],"event":{"name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","start":{"date-parts":[[2023,8,25]]},"location":"Penang, Malaysia","end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256260\/10256269\/10256380.pdf?arnumber=10256380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:51:21Z","timestamp":1697478681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256380\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icsecs58457.2023.10256380","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}