{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:50Z","timestamp":1750306130206,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T00:00:00Z","timestamp":1500422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,19]]},"DOI":"10.1145\/3102304.3102310","type":"proceedings-article","created":{"date-parts":[[2017,9,8]],"date-time":"2017-09-08T19:50:15Z","timestamp":1504900215000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor"],"prefix":"10.1145","author":[{"given":"Diaa M.","family":"Uliyan","sequence":"first","affiliation":[{"name":"Middle East University, Jordan"}]},{"given":"Hamid A.","family":"Jalab","sequence":"additional","affiliation":[{"name":"University of Malaya, Malaysia"}]},{"given":"Abdelrahman","family":"Abuarqoub","sequence":"additional","affiliation":[{"name":"Middle East University, Jordan"}]},{"given":"Muhannad","family":"Abu-Hashem","sequence":"additional","affiliation":[{"name":"Middle East University, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Al-Qershi O.M. and Khoo B.E. 2013. Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic science international 231 1 284--295.  Al-Qershi O.M. and Khoo B.E. 2013. Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic science international 231 1 284--295.","DOI":"10.1016\/j.forsciint.2013.05.027"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.189"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Cao Y. Gao T. Fan L. and Yang Q. 2012. A robust detection algorithm for copy-move forgery in digital images. Forensic science international 214 1 33--43.  Cao Y. Gao T. Fan L. and Yang Q. 2012. A robust detection algorithm for copy-move forgery in digital images. Forensic science international 214 1 33--43.","DOI":"10.1016\/j.forsciint.2011.07.015"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.01.008"},{"volume-title":"Multimedia Signal Processing, 2008 IEEE 10th Workshop on IEEE, 322--325","author":"Chen T.-W.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.07.026"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0608-66"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"e_1_3_2_1_11_1","unstructured":"Farid H. 2011. Photo Tampering throughout History  Farid H. 2011. Photo Tampering throughout History"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Huang D.-Y. Lin T.-W. Hu W.-C. and Chou C.-H. 2014. Boosting Scheme for Detecting Region Duplication Forgery in Digital Images. In Genetic and Evolutionary Computing Springer 125--133.  Huang D.-Y. Lin T.-W. Hu W.-C. and Chou C.-H. 2014. Boosting Scheme for Detecting Region Duplication Forgery in Digital Images. In Genetic and Evolutionary Computing Springer 125--133.","DOI":"10.1007\/978-3-319-01796-9_13"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Huang Y. Lu W. Sun W. and Long D. 2011. Improved DCT-based detection of copy-move forgery in images. Forensic science international 206 1 178--184.  Huang Y. Lu W. Sun W. and Long D. 2011. Improved DCT-based detection of copy-move forgery in images. Forensic science international 206 1 178--184.","DOI":"10.1016\/j.forsciint.2010.08.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1317-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2188390"},{"key":"e_1_3_2_1_16_1","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"Li B.","year":"2011","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"volume-title":"Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on IEEE, II-217-II-220","author":"Luo W.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2004.924603"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000027790.02288.f2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/267691"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Moghaddasi Z. Jalab H.A. Md Noor R. and Aghabozorgi S. 2014. Improving RLRN image splicing detection with the use of PCA and kernel PCA. The Scientific World Journal 2014.  Moghaddasi Z. Jalab H.A. Md Noor R. and Aghabozorgi S. 2014. Improving RLRN image splicing detection with the use of PCA and kernel PCA. The Scientific World Journal 2014.","DOI":"10.1155\/2014\/606570"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.04.004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Nathalie Diane W.N. Xingming S. and Moise F.K. 2014. A Survey of Partition-Based Techniques for Copy-Move Forgery Detection. The Scientific World Journal 2014.  Nathalie Diane W.N. Xingming S. and Moise F.K. 2014. A Survey of Partition-Based Techniques for Copy-Move Forgery Detection. The Scientific World Journal 2014.","DOI":"10.1155\/2014\/975456"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460096.1460130"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.03.058"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2078506"},{"volume-title":"Tech. Rep. TR2004-515.","year":"2004","author":"Popescu A.C.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0620-1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2272377"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Sadeghi S H.A.J. Kok Sheik Wong Diaa Uliyan Sajjad Dadkhah 2016. Keypoint based authentication and localization of copy-move forgery in digital image. Malaysian Journal of Computer Science 2016.  Sadeghi S H.A.J. Kok Sheik Wong Diaa Uliyan Sajjad Dadkhah 2016. Keypoint based authentication and localization of copy-move forgery in digital image. Malaysian Journal of Computer Science 2016.","DOI":"10.22452\/mjcs.vol30no2.4"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Shao H. Yu T. Xu M. and Cui W. 2012. Image region duplication detection based on circular window expansion and phase correlation. Forensic science international 222 1 71--82.  Shao H. Yu T. Xu M. and Cui W. 2012. Image region duplication detection based on circular window expansion and phase correlation. Forensic science international 222 1 71--82.","DOI":"10.1016\/j.forsciint.2012.05.002"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33478-8_40"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.01.016"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2013.05.016"},{"volume-title":"ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II Springer, 577--583","author":"Sunil K.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym8070062"},{"volume-title":"Open Systems (ICOS)","year":"2015","author":"Uliyan D.M.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Zimba M. and Xingming S. 2011. DWT-PCA(EVD) Based Copy-move Image Forgery Detection. International Journal of Digital Content Technology and its Applications 5 1.  Zimba M. and Xingming S. 2011. DWT-PCA(EVD) Based Copy-move Image Forgery Detection. International Journal of Digital Content Technology and its Applications 5 1.","DOI":"10.4156\/jdcta.vol5.issue1.27"}],"event":{"name":"ICFNDS '17: International Conference on Future Networks and Distributed Systems","sponsor":["LABSTICC Labsticc"],"location":"Cambridge United Kingdom","acronym":"ICFNDS '17"},"container-title":["Proceedings of the International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3102310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3102304.3102310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:05Z","timestamp":1750217825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3102310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,19]]},"references-count":39,"alternative-id":["10.1145\/3102304.3102310","10.1145\/3102304"],"URL":"https:\/\/doi.org\/10.1145\/3102304.3102310","relation":{},"subject":[],"published":{"date-parts":[[2017,7,19]]},"assertion":[{"value":"2017-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}