{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:53:41Z","timestamp":1775876021252,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T00:00:00Z","timestamp":1560384000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T00:00:00Z","timestamp":1560384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13640-019-0469-9","type":"journal-article","created":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T14:47:34Z","timestamp":1560437254000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation"],"prefix":"10.1186","volume":"2019","author":[{"given":"Hui-Yu","family":"Huang","sequence":"first","affiliation":[]},{"given":"Ai-Jhen","family":"Ciou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,13]]},"reference":[{"issue":"1","key":"469_CR1","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"23","author":"M Al-Qershi Osamah","year":"2013","unstructured":"M. Al-Qershi Osamah, B.E. Khoo, Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci. Int. 23(1), 284\u2013295 (2013)","journal-title":"Forensic Sci. Int."},{"issue":"12","key":"469_CR2","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.3724\/SP.J.1004.2009.01488","volume":"35","author":"JWG Wang","year":"2009","unstructured":"J.W.G. Wang, J. Liu, A. Zhang, Y.W. Dai, Z.Q. Wang, Fast and robust forensics or image region-duplication forgery. Acta Automat., Sinica 35(12), 1488\u20131495 (2009)","journal-title":"Acta Automat."},{"key":"469_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","volume-title":"Information Hiding","author":"SJ Ryu","year":"2010","unstructured":"S.J. Ryu, M.J. Lee, H.K. Lee, in Information Hiding. Detection of copy-rotate-move forgery using Zernike moments (Springer-Verlag, Berlin, 2010), pp. 51\u201365"},{"issue":"8","key":"469_CR4","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"S.J. Ryu, M. Kirchner, M.J. Lee, H.K. Lee, Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Inf. Forensics Secur. 8(8), 1355\u20131370 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"469_CR5","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Y. Huang, W. Lu, W. Sun, D. Long, Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 206(3), 178\u2013184 (2011)","journal-title":"Forensic Sci. Int."},{"key":"469_CR6","first-page":"304","volume-title":"3rd Int. Conf. on Multimedia Information Networking and Security","author":"X Wang","year":"2011","unstructured":"X. Wang, X. Zhang, Z. Li, S. Wang, in 3rd Int. Conf. on Multimedia Information Networking and Security. A DWT-DCT based passive forensics method for copy-move attacks (2011), pp. 304\u2013308"},{"issue":"8","key":"469_CR7","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1016\/j.sigpro.2011.01.022","volume":"91","author":"S Bravo-Solorio","year":"2011","unstructured":"S. Bravo-Solorio, A.K. Nandi, Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process. 91(8), 1759\u20131770 (2011)","journal-title":"Signal Process."},{"issue":"1","key":"469_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"R Davarazni","year":"2013","unstructured":"R. Davarazni, K. Yaghmaie, S. Mozaffari, Copy-move forgery detection using multiresolution location binary patterns. Forensic Sci. Int. 231(1), 61\u201372 (2013)","journal-title":"Forensic Sci. Int."},{"key":"469_CR9","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2015.03.009","volume":"321","author":"JC Lee","year":"2015","unstructured":"J.C. Lee, C.P. Chang, W.K. Chen, Detection of copy-move image forgery using histogram of orientated gradients. Inf. Sci. 321, 250\u2013262 (2015)","journal-title":"Inf. Sci."},{"issue":"6","key":"469_CR10","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1016\/j.compeleceng.2013.11.034","volume":"40","author":"L Li","year":"2014","unstructured":"L. Li, S. Li, H. Zhu, X. Wu, Detecting copy-move forgery under affine transforms for image forensics. Comput. Electr. Eng. 40(6), 1951\u20131962 (2014)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"469_CR11","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"X. Pan, S. Lyu, Region duplication detection using image feature matching. IEEE Trans. Inf. Forensics Secur. 5(4), 875\u2013867 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"469_CR12","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, G. Serra, A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"469_CR13","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, D. Tongo, G. Serra, Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process. Image Commun. 28(6), 659\u2013669 (2013)","journal-title":"Signal Process. Image Commun."},{"issue":"1","key":"469_CR14","first-page":"199","volume":"8","author":"BL Shivakumar","year":"2011","unstructured":"B.L. Shivakumar, S.S. Baboo, Detection of region duplication forgery in digital images using SURF. Int. J. Comput. Sci. 8(1), 199\u2013205 (2011)","journal-title":"Int. J. Comput. Sci."},{"key":"469_CR15","first-page":"1","volume":"2013","author":"P Mishra","year":"2013","unstructured":"P. Mishra, N. Mishra, S. Sharma, R. Patel, Region duplication forgery detection technique based on SURF and HAC. Sci. World J. 2013, 1\u20138 (2013)","journal-title":"Sci. World J."},{"key":"469_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"E. Silva, T. Carvalho, A. Ferreira, A. Rocha, Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J. Vis. Commun. Image Represent. 29, 16\u201332 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"10","key":"469_CR17","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"E. Ardizzone, A. Bruno, G. Mazzola, Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10(10), 2084\u20132094 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"469_CR18","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"C.M. Pun, X.C. Yuan, X.L. Bi, Image forgery detection using adaptive over-segmentation and feature points matching. IEEE Trans. Inf. Forensics Secur. 10(8), 1705\u20131716 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"469_CR19","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"J. Li, X. Li, B. Yang, X. Sun, Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"469_CR20","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"D. Cozzolino, G. Poggi, L. Verdoliva, Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284\u20132297 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"469_CR21","first-page":"206","volume-title":"Int. Conf. On computational modelling and security (CMS2016)","author":"D Chauhan","year":"2016","unstructured":"D. Chauhan, D. Kasat, S. Jain, V. Thakare, in Int. Conf. On computational modelling and security (CMS2016). Survey of keypoints based copy-move forgery detection methods on image (2016), pp. 206\u2013212"},{"issue":"2","key":"469_CR22","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"D.G. Lowe, Distinctive image features from scale-invariant keypoint. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"469_CR23","first-page":"404","volume-title":"Computer Vision-ECCV2006","author":"H Bay","year":"2006","unstructured":"H. Bay, T. Tuytelaars, L. Van Gool, in Computer Vision-ECCV2006. SURF: speeded up robust features (Springer-Verlag, Berlin, 2006), pp. 404\u2013417"},{"key":"469_CR24","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"75","author":"N Warif","year":"2016","unstructured":"N. Warif, A. Wahab, M. Idris, R. Ramli, R. Salleh, S. Shamshirband, K. Choo, Copy-move forgery detection: survey, challenges and future directions. J. Netw. Comput. Appl. 75, 259\u2013278 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"11","key":"469_CR25","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"M. Zandi, A. Mahmoudi-Aznaveh, A. Talebopur, Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans. Inf. Forensics Secur. 11(11), 2499\u20132512 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"469_CR26","first-page":"27","volume":"18","author":"M Ikhalyel","year":"2018","unstructured":"M. Ikhalyel, M. Hariadi, K.E. Pummama, A study of copy-move forgery detection based on segmentation. IJCSNS Int. J. Comp. Sci. Netw. Secur. 18(7), 27\u201332 (2018)","journal-title":"IJCSNS Int. J. Comp. Sci. Netw. Secur."},{"issue":"4","key":"469_CR27","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s11045-016-0416-1","volume":"24","author":"J Zheng","year":"2016","unstructured":"J. Zheng, Y. Liu, J. Ren, T. Zhu, Y. Yan, H. Yabf, Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidim. Syst. Sign. Process. 24(4), 989\u20131005 (2016)","journal-title":"Multidim. Syst. Sign. Process."},{"issue":"6","key":"469_CR28","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"V. Christlein, C. Riess, J. Jordan, C. Riess, E. Angelopoulou, An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"469_CR29","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TPAMI.2012.120","volume":"34","author":"R Achanta","year":"2012","unstructured":"R. Achanta, A. Shaji, K. Simth, A. Lucchi, P. Fua, S. S\u00fcsstrunk, SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 34(11), 2274\u20132282 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"469_CR30","unstructured":"R.E. Deakin, Coordinate transformations in surveying and mapping. Geospat. Sci. (2004) [Online]. available \n                    http:\/\/www.mygeodesy.id.au\/documents\/COTRAN_1.pdf"},{"issue":"10","key":"469_CR31","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPAMI.2005.188","volume":"27","author":"K Mikolajczyk","year":"2005","unstructured":"K. Mikolajczyk, C. Schmid, A performance evaluation of local descriptors. IEEE Trans. Pattern Anal. Mach. Intell. 27(10), 1615\u20131630 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"14","key":"469_CR32","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1016\/j.patrec.2005.03.022","volume":"26","author":"LD Stefano","year":"2005","unstructured":"L.D. Stefano, S. Mattoccia, F. Tombari, ZNCC-based template matching using bounded partial correlation. Pattern Recogn. Lett. 26(14), 2129\u20132134 (2005)","journal-title":"Pattern Recogn. Lett."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-019-0469-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-019-0469-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-019-0469-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T23:08:18Z","timestamp":1591916898000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-019-0469-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,13]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["469"],"URL":"https:\/\/doi.org\/10.1186\/s13640-019-0469-9","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,13]]},"assertion":[{"value":"11 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests in this work.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"68"}}