{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:02Z","timestamp":1750220822905,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T00:00:00Z","timestamp":1547856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen Science and Technology Innovation Committee","award":["JCYJ20170306170559215"],"award-info":[{"award-number":["JCYJ20170306170559215"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,19]]},"DOI":"10.1145\/3309074.3309128","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T13:29:18Z","timestamp":1555075758000},"page":"216-219","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection and localization of image tamper with scalable granularity"],"prefix":"10.1145","author":[{"given":"Yi","family":"Xie","sequence":"first","affiliation":[{"name":"Wuhan University, Shenzhen, China"}]},{"given":"Wenjia","family":"Ding","sequence":"additional","affiliation":[{"name":"Wuhan University, Shenzhen, China"}]},{"given":"Yulin","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2019,1,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"B. Lampson and R. Rivest \"Cryptography and information security group research project: a simple distributed security infrastructure \" Technical report 1997 MIT.  B. Lampson and R. Rivest \"Cryptography and information security group research project: a simple distributed security infrastructure \" Technical report 1997 MIT."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1276112"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2001.959096"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2028251"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863505"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE Int. Conf. on Image Processing","volume":"1","author":"Wong P. W.","year":"1998"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2002.802018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560425"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2194285"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMCS.1999.778274"},{"key":"e_1_3_2_1_11_1","first-page":"320","article-title":"A Novel Image Encryption and Authentication Scheme Using Chaotic Maps","volume":"320","author":"Rajput A.S.","year":"2015","journal-title":"Springer: Advances in Intelligent Systems and Computing"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.959338"},{"key":"e_1_3_2_1_13_1","first-page":"438","volume-title":"SPIE","volume":"3971","author":"Toyokawa K.","year":"2000"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1276112"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2012.0109"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0059"},{"key":"e_1_3_2_1_17_1","first-page":"881","volume-title":"Computer and Communication Engineering","author":"Sikder I.","year":"2017"},{"key":"e_1_3_2_1_18_1","unstructured":"CASIA accessed on June 10 2017. {Online}. Available: http:\/\/forensics.idealtest.org\/  CASIA accessed on June 10 2017. {Online}. Available: http:\/\/forensics.idealtest.org\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3010-x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2014.123"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0229"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223680"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2249064"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407698"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594136"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190594"}],"event":{"name":"ICCSP 2019: 2019 the 3rd International Conference on Cryptography, Security and Privacy","acronym":"ICCSP 2019","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 3rd International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309074.3309128","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3309074.3309128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:16Z","timestamp":1750201996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3309074.3309128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,19]]},"references-count":26,"alternative-id":["10.1145\/3309074.3309128","10.1145\/3309074"],"URL":"https:\/\/doi.org\/10.1145\/3309074.3309128","relation":{},"subject":[],"published":{"date-parts":[[2019,1,19]]},"assertion":[{"value":"2019-01-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}