{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:18:36Z","timestamp":1776277116486,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Macau Science and Technology Development Fund","award":["FDCT\/009\/2013\/A1"],"award-info":[{"award-number":["FDCT\/009\/2013\/A1"]}]},{"name":"Macau Science and Technology Development Fund","award":["FDCT\/046\/2014\/A1"],"award-info":[{"award-number":["FDCT\/046\/2014\/A1"]}]},{"name":"Macau Science and Technology Development Fund","award":["FDCT\/100\/2012\/A3"],"award-info":[{"award-number":["FDCT\/100\/2012\/A3"]}]},{"name":"Macau Science and Technology Development Fund","award":["FDCT\/026\/2013\/A"],"award-info":[{"award-number":["FDCT\/026\/2013\/A"]}]},{"name":"Research Committee at the University of Macau","award":["MRG007\/ZJT\/2015\/FST"],"award-info":[{"award-number":["MRG007\/ZJT\/2015\/FST"]}]},{"name":"Research Committee at the University of Macau","award":["MRG021\/ZJT\/2013\/FST"],"award-info":[{"award-number":["MRG021\/ZJT\/2013\/FST"]}]},{"name":"Research Committee at the University of Macau","award":["MYRG2014-00031-FST"],"award-info":[{"award-number":["MYRG2014-00031-FST"]}]},{"name":"Research Committee at the University of Macau","award":["MYRG205(Y1-L4)-FST11-TYY"],"award-info":[{"award-number":["MYRG205(Y1-L4)-FST11-TYY"]}]},{"name":"Research Committee at the University of Macau","award":["MYRG187(Y1-L3)-FST11-TYY"],"award-info":[{"award-number":["MYRG187(Y1-L3)-FST11-TYY"]}]},{"name":"Research Committee at the University of Macau","award":["MYRG2015-00049-FST"],"award-info":[{"award-number":["MYRG2015-00049-FST"]}]},{"name":"Research Committee at the University of Macau","award":["MYRG2015-00050-FST"],"award-info":[{"award-number":["MYRG2015-00050-FST"]}]},{"name":"Research Committee at the University of Macau","award":["MYRG2015-00056-FST"],"award-info":[{"award-number":["MYRG2015-00056-FST"]}]},{"name":"Research Committee at the University of Macau","award":["RDG009\/FST-TYY\/2012"],"award-info":[{"award-number":["RDG009\/FST-TYY\/2012"]}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61402547"],"award-info":[{"award-number":["61402547"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61300110"],"award-info":[{"award-number":["61300110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61273244"],"award-info":[{"award-number":["61273244"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Macau-China join Project","award":["008-2014-AMJ"],"award-info":[{"award-number":["008-2014-AMJ"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["HIT.NSRIF.2015067"],"award-info":[{"award-number":["HIT.NSRIF.2015067"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/tifs.2016.2553645","type":"journal-article","created":{"date-parts":[[2016,4,13]],"date-time":"2016-04-13T15:34:26Z","timestamp":1460561666000},"page":"1722-1735","source":"Crossref","is-referenced-by-count":23,"title":["SIFT Keypoint Removal and Injection via Convex Relaxation"],"prefix":"10.1109","volume":"11","author":[{"given":"Yuanman","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6015-2618","authenticated-orcid":false,"given":"Jiantao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"An","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Xianming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuan Yan","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Detection of copy-move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Proc Digital Forensic Res Workshop"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1117\/12.525375","article-title":"UCID&#x2014;An uncompressed color image database","volume":"5307","author":"schaefer","year":"2004","journal-title":"Proc SPIE"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1006\/jvci.2001.0495"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2362935"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482524"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2013-8"},{"key":"ref36","first-page":"1469","article-title":"VLFeat: An open and portable library of computer vision algorithms","author":"vedaldi","year":"2012","journal-title":"Proc 18th ACM Int Conf Multimedia"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-336156-1.50061-6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5681130"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.05.027"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282360"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.138"},{"key":"ref13","first-page":"869","article-title":"Efficient near-duplicate detection and sub-image retrieval","volume":"4","author":"ke","year":"2004","journal-title":"Proc ACM Int Conf Multimedia"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2004.53"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11957959_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2078506"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631376"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1877972.1877977"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2010.5661993"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874185"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","article-title":"Segmentation-based image copy-move forgery detection scheme","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSCT.2008.249"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.130"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.103"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2337654"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654941"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PACIIA.2008.240"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790410"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2013.03.006"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2015.7177423"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref20","first-page":"1817","article-title":"Enlarging hacker&#x2019;s toolbox: Deluding image recognition by attacking keypoint orientations","author":"do","year":"2012","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2012.10.031"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCCSP.2012.6217846"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2393434"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026075"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854083"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2013-18"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","article-title":"Rotation invariant localization of duplicated image regions based on Zernike moments","volume":"8","author":"ryu","year":"2013","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366305"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084315"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/EUSIPCO.2015.7362747"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7464417\/07452396.pdf?arnumber=7452396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:15Z","timestamp":1641987735000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7452396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":46,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2553645","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8]]}}}