{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T02:50:40Z","timestamp":1774839040948,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/ssd.2014.6808907","type":"proceedings-article","created":{"date-parts":[[2014,5,7]],"date-time":"2014-05-07T20:50:18Z","timestamp":1399495818000},"page":"1-5","source":"Crossref","is-referenced-by-count":32,"title":["A review on copy move image forgery detection techniques"],"prefix":"10.1109","author":[{"given":"M.","family":"Ali Qureshi","sequence":"first","affiliation":[]},{"given":"M.","family":"Deriche","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.5120\/1087-1418"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2046599"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.876"},{"key":"15","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","article-title":"Detection of copy-rotate-move forgery using zernike moments","author":"ryu","year":"2010","journal-title":"Information Hiding"},{"key":"16","article-title":"Exposing digital forgeries by detecting duplicated image regions","author":"popescu","year":"2004","journal-title":"Dept Comput Sci Dartmouth College Tech Rep TR2004-515"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.11.002"},{"key":"14","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.3724\/SP.J.1004.2009.01488","article-title":"Fast and robust forensics for image region-duplication forgery","volume":"35","author":"wang","year":"2009","journal-title":"ACTA Automatica Sinica"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"key":"12","article-title":"Detection of copy-move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Proceedings of Digital Forensic Research Workshop"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"20","first-page":"264","article-title":"Wavelet-based multiresolution features for detecting duplications in images","author":"bashar","year":"2007","journal-title":"Conference on Machine Vision and Intelligence"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.04.004"},{"key":"23","first-page":"188","article-title":"Fast copy-move forgery detection","volume":"5","author":"lin","year":"2009","journal-title":"WSEAS Transactions on Signal Processing"},{"key":"24","first-page":"93","article-title":"Fast and efficient region duplication detection in digital images using sub-blocking method","volume":"35","author":"singh","year":"2011","journal-title":"International Journal of Advanced Science and Technology"},{"key":"25","first-page":"746","article-title":"Robust detection of region-duplication forgery in digital image","volume":"4","author":"luo","year":"2006","journal-title":"18th International Conference on Pattern Recognition (ICPR'06)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.142"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1877972.1877990"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2012.6325319"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2078506"},{"key":"3","author":"cox","year":"2001","journal-title":"Digital Watermarking"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2010.05.003"},{"key":"1","author":"fonda kerry","year":"2004","journal-title":"The Washington Post"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4284575"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"32","first-page":"1","article-title":"Dwt-dct (qcd) based copy-move image forgery detection","author":"ghorbani","year":"2011","journal-title":"18th International Conference on Systems Signals and Image Processing (IWSSIP'11)"},{"key":"5","author":"cox","year":"2008","journal-title":"Digital Watermarking and Steganography"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.5120\/3283-4472"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913512","author":"barni","year":"2004","journal-title":"Watermarking Systems Engineering Enabling Digital Assets Security and Other Applications Signal Processing and Communications"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03688-0_27"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2008.4751315"}],"event":{"name":"2014 11th International Multi-Conference on Systems, Signals & Devices (SSD)","location":"Castelldefels-Barcelona, Spain","start":{"date-parts":[[2014,2,11]]},"end":{"date-parts":[[2014,2,14]]}},"container-title":["2014 IEEE 11th International Multi-Conference on Systems, Signals &amp; Devices (SSD14)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6802828\/6808745\/06808907.pdf?arnumber=6808907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T04:06:08Z","timestamp":1597809968000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6808907\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ssd.2014.6808907","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}