{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:35:27Z","timestamp":1772159727707,"version":"3.50.1"},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000266","name":"National Geospatial-Intelligence Agency","doi-asserted-by":"publisher","award":["HM047619C0056"],"award-info":[{"award-number":["HM047619C0056"]}],"id":[{"id":"10.13039\/100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3276640","type":"journal-article","created":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T14:20:58Z","timestamp":1684160458000},"page":"3212-3221","source":"Crossref","is-referenced-by-count":2,"title":["Resampling Estimation Based RPC Metadata Verification in Satellite Imagery"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7737-4110","authenticated-orcid":false,"given":"Chandrakanth","family":"Gudavalli","sequence":"first","affiliation":[{"name":"Mayachitra, Inc., Santa Barbara, CA, USA"}]},{"given":"Michael","family":"Goebel","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7400-5352","authenticated-orcid":false,"given":"Tejaswi","family":"Nanjundaswamy","sequence":"additional","affiliation":[{"name":"Mayachitra, Inc., Santa Barbara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4510-7237","authenticated-orcid":false,"given":"Lakshmanan","family":"Nataraj","sequence":"additional","affiliation":[{"name":"Mayachitra, Inc., Santa Barbara, CA, USA"}]},{"given":"Shivkumar","family":"Chandrasekaran","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"B. S.","family":"Manjunath","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"263","reference":[{"key":"ref13","year":"2023","journal-title":"USGS EarthExplorer"},{"key":"ref12","year":"2023","journal-title":"USGS Eros Archive&#x2014;Commercial Satellites&#x2014;Orbview 3"},{"key":"ref14","year":"2023","journal-title":"USGS EROS Archive&#x2014;Digital Elevation&#x2014;Shuttle Radar Topography Mission (SRTM) 1 Arc-Second Global"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref10","article-title":"Orthorectification of high resolution satellite images","author":"boccardo","year":"2004"},{"key":"ref2","first-page":"21","article-title":"Anomaly-based manipulation detection in satellite images","volume":"29","author":"horv\u00e1th","year":"2019","journal-title":"Networks"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","article-title":"Segmentation-based image copymove forgery detection scheme","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2191946"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2004.924603"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-212"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.235"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411333"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10124789.pdf?arnumber=10124789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T14:30:53Z","timestamp":1687789853000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10124789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3276640","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.19026266.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19026266","asserted-by":"object"}]},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}