{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T17:05:28Z","timestamp":1730307928152,"version":"3.28.0"},"reference-count":12,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7,6]]},"DOI":"10.1117\/12.2197146","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T19:32:38Z","timestamp":1436211158000},"page":"96310B","source":"Crossref","is-referenced-by-count":1,"title":["Detecting of copy-move forgery in digital images using fractional Fourier transform"],"prefix":"10.1117","volume":"9631","author":[{"given":"Renqing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhengyao","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Liguo","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Gao","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","first-page":"188","article-title":"Fast copy-move forgery detection","author":"Lin","year":"2009"},{"article-title":"Detection of copy-move forgery in digital images","year":"2003","author":"Fridrich","key":"c2"},{"article-title":"Exposing digital forgeries by detecting duplicated image regions","year":"2004","author":"Popescu","key":"c3"},{"key":"c4","article-title":"Detection of copy-move forgery in digital images using SIFT algorithm","volume":"2","author":"Huang","year":"2008"},{"key":"c5","doi-asserted-by":"crossref","DOI":"10.1109\/MINES.2011.104","article-title":"Detecting copy-move forgery using non-negative matrix factorization","author":"Yao","year":"2011"},{"key":"c6","first-page":"167","article-title":"Detection of Duplicated Image Regions using Cellular Automata","author":"Tralic","year":"2014"},{"key":"c7","doi-asserted-by":"publisher","DOI":"10.1016\/S0141-9331(03)00113-3"},{"issue":"1","key":"c8","first-page":"1","article-title":"Research progress of the fractional Fourier transform in signal processing","volume":"49","author":"Ran","year":"2006"},{"key":"c9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2004.1359360"},{"key":"c10","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2002.1145767"},{"key":"c11","doi-asserted-by":"crossref","DOI":"10.1109\/ISPACS.2005.1595366","article-title":"Multiple-chirp typed blind watermarking algorithm based on fractional Fourier transform","author":"Zhang","year":"2005"},{"article-title":"CoMoFoD\u2014New database for copy-move forgery detection","year":"2013","author":"Dijana","key":"c12"}],"event":{"name":"Seventh International Conference on Digital Image Processing (ICDIP15)","location":"Los Angeles, United States"},"container-title":["SPIE Proceedings","Seventh International Conference on Digital Image Processing (ICDIP 2015)"],"original-title":[],"deposited":{"date-parts":[[2018,9,29]],"date-time":"2018-09-29T02:30:20Z","timestamp":1538188220000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2197146"}},"subtitle":[],"editor":[{"given":"Charles M.","family":"Falco","sequence":"first","affiliation":[]},{"given":"Xudong","family":"Jiang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2015,7,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1117\/12.2197146","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2015,7,6]]}}}