{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T08:19:56Z","timestamp":1772180396219,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/wifs.2014.7084314","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T20:32:15Z","timestamp":1429734735000},"page":"119-124","source":"Crossref","is-referenced-by-count":29,"title":["Adaptive matching for copy-move Forgery detection"],"prefix":"10.1109","author":[{"given":"Mohsen","family":"Zandi","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Mahmoudi-Aznaveh","sequence":"additional","affiliation":[]},{"given":"Azadeh","family":"Mansouri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref11","article-title":"Detection of Copy Move Forgery in Digital Images","author":"fridrich","year":"2003","journal-title":"Digital Forensic Research Workshop"},{"key":"ref12","author":"popescu","year":"2004","journal-title":"Exposing Digital Forgeries by Detecting Duplicated Image Regions"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2046599"},{"key":"ref14","first-page":"1750","article-title":"A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD","author":"guohui","year":"2007","journal-title":"Multimedia and Expo 2007 IEEE International Conference on"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"ref16","first-page":"46","article-title":"An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns","volume":"4","author":"leida li","year":"2013","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495485"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711472"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7_12"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","article-title":"Detection of Copy-Rotate-Move Forgery Using Zernike Moments","volume":"6387","author":"ryu","year":"2010","journal-title":"Information Hiding"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2011.07.015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"ref5","first-page":"272","article-title":"Detection of Copy-Move Forgery in Digital Images using SIFT Algorithm","author":"hailing","year":"2008","journal-title":"Computational Intelligence and Industrial Application 2008 PACIIA '08 Pacific-Asia Workshop on"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2012.10.031"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","article-title":"Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments","volume":"8","author":"ryu","year":"2013","journal-title":"Information Forensics and Security IEEE Transactions on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2013.03.006"}],"event":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"Atlanta, GA, USA","start":{"date-parts":[[2014,12,3]]},"end":{"date-parts":[[2014,12,5]]}},"container-title":["2014 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7070475\/7084286\/07084314.pdf?arnumber=7084314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T23:53:49Z","timestamp":1566604429000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7084314\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wifs.2014.7084314","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}