{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:00Z","timestamp":1750306500676,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T00:00:00Z","timestamp":1444348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,9]]},"DOI":"10.1145\/2811411.2811482","type":"proceedings-article","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T04:22:54Z","timestamp":1446006174000},"page":"125-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["On parameterization of block based copy-move forgery detection techniques"],"prefix":"10.1145","author":[{"given":"Jatin","family":"Wadhwa","sequence":"first","affiliation":[{"name":"National Institute Of Technology, Rourkela, Odisha"}]},{"given":"Talib","family":"Ahemad","sequence":"additional","affiliation":[{"name":"National Institute Of Technology, Rourkela, Odisha"}]},{"given":"Ruchira","family":"Naskar","sequence":"additional","affiliation":[{"name":"National Institute Of Technology, Rourkela, Odisha"}]},{"given":"Rahul","family":"Dixit","sequence":"additional","affiliation":[{"name":"National Institute Of Technology, Rourkela, Odisha"}]}],"member":"320","published-online":{"date-parts":[[2015,10,9]]},"reference":[{"volume-title":"Proceedings of Digital Forensic Research Workshop.","author":"Fridrich A. J.","key":"e_1_3_2_1_1_1","unstructured":"Fridrich , A. J. , Soukal , B. D. , and A. J. Luk\u00e1\u0161 . 1993. Detection of copy-move forgery in digital images . Proceedings of Digital Forensic Research Workshop. Fridrich, A. J., Soukal, B. D., and A. J. Luk\u00e1\u0161. 1993. Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop."},{"key":"e_1_3_2_1_2_1","first-page":"2004","article-title":"Exposing digital forgeries by detecting duplicated image regions. Computer Science, Dartmouth College","author":"Popescu A.","year":"2004","unstructured":"Popescu , A. , and Farid , H. 2004 . Exposing digital forgeries by detecting duplicated image regions. Computer Science, Dartmouth College , Tech. Rep. TR 2004 - 2515 . Popescu, A., and Farid, H. 2004. Exposing digital forgeries by detecting duplicated image regions. Computer Science, Dartmouth College, Tech. Rep. TR 2004-515.","journal-title":"Tech. Rep. TR"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-009-0053-5"},{"volume-title":"Digital Watermarking and Steganography: Fundamentals and Techniques. BocaRaton","author":"Shih A. J.","key":"e_1_3_2_1_4_1","unstructured":"Shih , A. J. 2007. Digital Watermarking and Steganography: Fundamentals and Techniques. BocaRaton , CRC Press . Shih, A. J. 2007. Digital Watermarking and Steganography: Fundamentals and Techniques. BocaRaton, CRC Press."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the German Association for Pattern Recognition (DAGM 2012","author":"Zach F.","year":"2012","unstructured":"Zach , F. , Riess , C. , and Angelopoulou , E . 2012. Automated Image Forgery Detection through Classification of JPEG Ghosts . Proceedings of the German Association for Pattern Recognition (DAGM 2012 ). ( Aug. 2012 ), 185--194. Zach, F., Riess, C., and Angelopoulou, E. 2012. Automated Image Forgery Detection through Classification of JPEG Ghosts. Proceedings of the German Association for Pattern Recognition (DAGM 2012). (Aug. 2012), 185--194."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"e_1_3_2_1_8_1","volume-title":"(eds.)","author":"Sencar H. T.","year":"2013","unstructured":"Sencar , H. T. , and Memon , N . (eds.) . 2013 . Digital Image Forensics: There is More to a Picture than Meets the Eye . New York, NY, USA : Springer . Sencar, H. T., and Memon, N. (eds.). 2013. Digital Image Forensics: There is More to a Picture than Meets the Eye. New York, NY, USA: Springer."},{"volume-title":"Proceedings of the International Conference on Computer Vision.","author":"Lalonde J. F.","key":"e_1_3_2_1_9_1","unstructured":"Lalonde , J. F. , and Efros , A. A . 2007. Using color compatibility for assessing image realism , Proceedings of the International Conference on Computer Vision. Lalonde, J. F., and Efros, A. A. 2007. Using color compatibility for assessing image realism, Proceedings of the International Conference on Computer Vision."},{"volume-title":"Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VIII, part of EI SPIE.","author":"Lukas J.","key":"e_1_3_2_1_10_1","unstructured":"Lukas , J. , Fridrich , J. , and Goljan , M . 2006. Detecting digital image forgeries using sensor pattern noise . Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VIII, part of EI SPIE. Lukas, J., Fridrich, J., and Goljan, M. 2006. Detecting digital image forgeries using sensor pattern noise. Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VIII, part of EI SPIE."},{"volume-title":"Proceedings of the 24th IASTED International conference on Signal Processing, Pattern Recognition, and Applications. 268--273","author":"Wu J.","key":"e_1_3_2_1_11_1","unstructured":"Wu , J. , Kamath , M. V. , and Poehlman , S . 2006. Detecting differences between photographs and computer generated images . Proceedings of the 24th IASTED International conference on Signal Processing, Pattern Recognition, and Applications. 268--273 . Wu, J., Kamath, M. V., and Poehlman, S. 2006. Detecting differences between photographs and computer generated images. Proceedings of the 24th IASTED International conference on Signal Processing, Pattern Recognition, and Applications. 268--273."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073170.1073171"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMSP.2011.172"},{"key":"e_1_3_2_1_14_1","first-page":"437","article-title":"Digital Forensic Technique for Double Compression based JPEG Image Forgery Detection, International Conference on Information Systems Security (ICISS)","volume":"8880","author":"Malviya P.","year":"2014","unstructured":"Malviya , P. , and Naskar , R. 2014 . Digital Forensic Technique for Double Compression based JPEG Image Forgery Detection, International Conference on Information Systems Security (ICISS) . LNCS 8880 , 437 -- 447 . Malviya, P., and Naskar, R. 2014. Digital Forensic Technique for Double Compression based JPEG Image Forgery Detection, International Conference on Information Systems Security (ICISS). LNCS 8880, 437--447.","journal-title":"LNCS"},{"key":"e_1_3_2_1_15_1","unstructured":"Ng T. T. and Chang S. F. 2004. Classifying photographic and photorealistic computer graphic images using natural image statistics. Technical report ADVENT Technical Report Columbia University.  Ng T. T. and Chang S. F. 2004. Classifying photographic and photorealistic computer graphic images using natural image statistics. Technical report ADVENT Technical Report Columbia University."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.1003"},{"volume-title":"IEEE International Conference on Multimedia and Expo. 1042--1045","author":"Zhan W.","key":"e_1_3_2_1_17_1","unstructured":"Zhan , W. , Cao , X. , Zhang , J. , Zhu , J. , and P. Wang . 2009. Detecting photographic composites using shadows . IEEE International Conference on Multimedia and Expo. 1042--1045 . Zhan, W., Cao, X., Zhang, J., Zhu, J., and P. Wang. 2009. Detecting photographic composites using shadows. IEEE International Conference on Multimedia and Expo. 1042--1045."},{"volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP).","author":"Pan X.","key":"e_1_3_2_1_18_1","unstructured":"Pan , X. , and Lyu , S . 2010. Detecting image duplication using SIFT features . Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Pan, X., and Lyu, S. 2010. Detecting image duplication using SIFT features. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2011.07.015"},{"key":"e_1_3_2_1_20_1","unstructured":"http:\/\/sipi.usc.edu\/database\/database.php?volume=misc.  http:\/\/sipi.usc.edu\/database\/database.php?volume=misc."}],"event":{"name":"RACS '15: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Prague Czech Republic","acronym":"RACS '15"},"container-title":["Proceedings of the 2015 Conference on research in adaptive and convergent systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811482","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2811411.2811482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:49Z","timestamp":1750225729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811482"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,9]]},"references-count":20,"alternative-id":["10.1145\/2811411.2811482","10.1145\/2811411"],"URL":"https:\/\/doi.org\/10.1145\/2811411.2811482","relation":{},"subject":[],"published":{"date-parts":[[2015,10,9]]},"assertion":[{"value":"2015-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}