{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:10:55Z","timestamp":1730279455902,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/iwbf.2019.8739168","type":"proceedings-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T23:16:24Z","timestamp":1561072584000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Copy-Move Forgery Detection Algorithm using Frequency Transforms, SURF and MSER"],"prefix":"10.1109","author":[{"given":"Kelsey","family":"Ramirez-Gutierrez","sequence":"first","affiliation":[]},{"family":"Mariko-Nakano","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Sanchez-Perez","sequence":"additional","affiliation":[]},{"given":"Hector","family":"Perez-Meana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP.2013.6707675"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","article-title":"Segmentation-based image copy-move forgery detection scheme","volume":"10","author":"li","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref12","first-page":"27","article-title":"A Study of Copy-Move Forgery Detection Scheme Based on segmentation","volume":"18","author":"ikhalavel","year":"2018","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1301290"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E96.D.1565"},{"key":"ref15","article-title":"Blind Tamper Detection to Copy Move Image Forgery using SURF and MSER","author":"ramirez-gutierrez","year":"2015","journal-title":"Proc International Conferences on Advances in Multimedia"},{"journal-title":"Digital Image Processing","year":"2008","author":"gonzalez","key":"ref16"},{"key":"ref17","article-title":"SURF: Seed Up Robust Features","author":"bay","year":"2006","journal-title":"Proc Int Conf on Computer Vision (ECCV&#x2019;06)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2004.02.006"},{"journal-title":"CASIA Image Tampering Detection Evaluation Database","year":"2014","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-013-0459-9"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.image.2012.11.006","article-title":"Watermarking-basewd image authentication with recovery capability using halftoning technique","volume":"28","author":"rosales-roldan","year":"2013","journal-title":"Signal Processing Image Communications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2316\/Journal.202.2012.4.202-3530"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2003.12.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2078506"},{"key":"ref2","article-title":"An Overview on Image Forensics","author":"piva","year":"2012","journal-title":"ASRN Signal Processing"},{"journal-title":"Notes on Digital Image Forensics & Counter Forensics","year":"2011","author":"kirchner","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2011.90"}],"event":{"name":"2019 7th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2019,5,2]]},"location":"Cancun, Mexico","end":{"date-parts":[[2019,5,3]]}},"container-title":["2019 7th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8735658\/8739167\/08739168.pdf?arnumber=8739168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:46:56Z","timestamp":1658141216000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8739168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwbf.2019.8739168","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}