{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:33:29Z","timestamp":1730270009577,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/ipta.2017.8310139","type":"proceedings-article","created":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T21:52:17Z","timestamp":1520891537000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["JPEG compression model in copy-move forgery detection"],"prefix":"10.1109","author":[{"given":"Adam","family":"Novozamsky","sequence":"first","affiliation":[]},{"given":"Michal","family":"Sorel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2010.08.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1997.609451"},{"key":"ref12","first-page":"331","article-title":"Fast approximate nearest neighbors with automatic algorithm configuration","volume":"2","author":"muja","year":"2009","journal-title":"VISAPP"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/361237.361242"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PACIIA.2008.240"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.189"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2046599"},{"key":"ref27","article-title":"Efficient jpeg decompression by the alternating direction method of multipliers","author":"\u0161orel","year":"2016","journal-title":"ICPR - International Conference on Pattern Recognition"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.01.016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"ref29","first-page":"49","article-title":"CoMoFoD-New database for copy-move forgery detection","author":"tralic","year":"2013","journal-title":"Proceedings Elmar 2013"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.142"},{"key":"ref8","first-page":"51","author":"ryu","year":"2010","journal-title":"Information Hiding 12th International Conference IH 2010 Calgary AB Canada"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.11.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"ref9","article-title":"Exposing digital forgeries by detecting duplicated image regions","author":"popescu","year":"2004","journal-title":"Department of Computer Science Dartmouth College Technical Report TR2005536"},{"key":"ref1","article-title":"Detection of copy move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Digital Forensic Research Workshop"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2362-y"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/83.392332"},{"journal-title":"JPEG Still Image Data Compression Standard","year":"1992","author":"pennebaker","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144593251710"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2627802"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF01581204"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1956-0084194-4"}],"event":{"name":"2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)","start":{"date-parts":[[2017,11,28]]},"location":"Montreal, QC","end":{"date-parts":[[2017,12,1]]}},"container-title":["2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8304402\/8310074\/08310139.pdf?arnumber=8310139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T21:07:24Z","timestamp":1523308044000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8310139\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ipta.2017.8310139","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}