{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:57:10Z","timestamp":1730296630401,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/siu.2014.6830549","type":"proceedings-article","created":{"date-parts":[[2014,6,20]],"date-time":"2014-06-20T21:51:45Z","timestamp":1403301105000},"page":"1596-1599","source":"Crossref","is-referenced-by-count":0,"title":["A hybrid image authentication method robust to JPEG attacks"],"prefix":"10.1109","author":[{"given":"Beste","family":"Gencturk","sequence":"first","affiliation":[]},{"given":"Vasif","family":"Nabiyev","sequence":"additional","affiliation":[]},{"given":"Guzin","family":"Ulutas","sequence":"additional","affiliation":[]},{"given":"Mustafa","family":"Ulutas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2010.08.001"},{"key":"2","article-title":"Exposing digital forgeries by detecting duplicated image regions","author":"popescu","year":"2004","journal-title":"Technical Report TR2004-515"},{"key":"1","first-page":"19","article-title":"Detection of copy-move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Digital Forensic Research Workshop"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(01)00099-X"},{"key":"5","first-page":"371","article-title":"Detection of region duplication forgery in Digital Images using Wavelets and Log-Polar mapping","volume":"3","author":"myrna","year":"2007","journal-title":"Conference on Computational Intelligence and Multimedia Applications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2011.07.015"},{"key":"8","first-page":"746","article-title":"Robust detection of region duplication forgery in digital image","volume":"4","author":"luo","year":"2006","journal-title":"18th International Conference on Pattern Recognition"}],"event":{"name":"2014 22nd Signal Processing and Communications Applications Conference (SIU)","start":{"date-parts":[[2014,4,23]]},"location":"Trabzon, Turkey","end":{"date-parts":[[2014,4,25]]}},"container-title":["2014 22nd Signal Processing and Communications Applications Conference (SIU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820096\/6830164\/06830549.pdf?arnumber=6830549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:41:14Z","timestamp":1490287274000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6830549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/siu.2014.6830549","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}