{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:07:36Z","timestamp":1760299656599,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Macau Science and Technology Development Fund","award":["FDCT\/046\/2014\/A1","FDCT\/022\/2017\/A1"],"award-info":[{"award-number":["FDCT\/046\/2014\/A1","FDCT\/022\/2017\/A1"]}]},{"DOI":"10.13039\/501100004733","name":"Research Committee at the University of Macau","doi-asserted-by":"publisher","award":["MYRG2015-00056-FST","MYRG2016-00137-FST"],"award-info":[{"award-number":["MYRG2015-00056-FST","MYRG2016-00137-FST"]}],"id":[{"id":"10.13039\/501100004733","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61402547"],"award-info":[{"award-number":["61402547"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/tifs.2017.2730362","type":"journal-article","created":{"date-parts":[[2017,7,21]],"date-time":"2017-07-21T18:25:53Z","timestamp":1500661553000},"page":"2971-2985","source":"Crossref","is-referenced-by-count":14,"title":["SIFT Keypoint Removal via Directed Graph Construction for Color Images"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4526-3018","authenticated-orcid":false,"given":"Yuanman","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6015-2618","authenticated-orcid":false,"given":"Jiantao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"An","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/j.forsciint.2013.05.027"},{"key":"ref38","article-title":"Detection of copy-move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Proc Digital Forensic Res Workshop"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1117\/12.525375"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TIP.2003.819861"},{"year":"2009","author":"cormen","journal-title":"Introduction to Algorithms","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1017\/CBO9780511804441"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/s11263-015-0808-y"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1186\/1687-417X-2013-8"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/2482513.2482524"},{"key":"ref34","first-page":"1469","article-title":"VLFeat: An open and portable library of computer vision algorithms","author":"vedaldi","year":"2012","journal-title":"Proc 18th ACM Int Conf Multimedia"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/CVPR.2005.138"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"ref11","first-page":"869","article-title":"Efficient near-duplicate detection and sub-image retrieval","volume":"4","author":"ke","year":"2004","journal-title":"Proc ACM Int Conf Multimedia"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ISMAR.2004.53"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/11957959_4"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ISCSCT.2008.249"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICASSP.2007.366305"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIFS.2010.2078506"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIFS.2012.2218597"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1631272.1631376"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1877972.1877977"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TIFS.2014.2337654"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2647868.2654941"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/1873951.1874185"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TPAMI.2008.130"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","article-title":"Segmentation-based image copy-move forgery detection scheme","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TPAMI.2014.2362935"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TPAMI.2011.103"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIFS.2011.2129512"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/PACIIA.2008.240"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICCV.1999.790410"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.image.2013.03.006"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref20","first-page":"1817","article-title":"Enlarging hacker&#x2019;s toolbox: Deluding image recognition by attacking keypoint orientations","author":"do","year":"2012","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ISCCSP.2012.6217846"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2393347.2393434"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICASSP.2014.6854083"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","article-title":"Rotation invariant localization of duplicated image regions based on zernike moments","volume":"8","author":"ryu","year":"2013","journal-title":"IEEE Trans Inf Forensics Security"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1186\/1687-5281-2013-18"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIFS.2016.2553645"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ICME.2015.7177423"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8017695\/07987728.pdf?arnumber=7987728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:18Z","timestamp":1642004538000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7987728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":41,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2730362","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}