{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T19:57:36Z","timestamp":1771012656908,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1587\/transinf.2015edp7341","type":"journal-article","created":{"date-parts":[[2016,5,31]],"date-time":"2016-05-31T22:12:36Z","timestamp":1464732756000},"page":"1531-1540","source":"Crossref","is-referenced-by-count":102,"title":["Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation"],"prefix":"10.1587","volume":"E99.D","author":[{"given":"Zhili","family":"ZHOU","sequence":"first","affiliation":[{"name":"School of Computer and Software & Jiangsu Engineering Centre of Network Monitoring, Nanjing University of Information Science and Technology"}]},{"given":"Ching-Nung","family":"YANG","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Dong Hwa University"}]},{"given":"Beijing","family":"CHEN","sequence":"additional","affiliation":[{"name":"School of Computer and Software & Jiangsu Engineering Centre of Network Monitoring, Nanjing University of Information Science and Technology"}]},{"given":"Xingming","family":"SUN","sequence":"additional","affiliation":[{"name":"School of Computer and Software & Jiangsu Engineering Centre of Network Monitoring, Nanjing University of Information Science and Technology"}]},{"given":"Qi","family":"LIU","sequence":"additional","affiliation":[{"name":"School of Computer and Software & Jiangsu Engineering Centre of Network Monitoring, Nanjing University of Information Science and Technology"}]},{"given":"Q.M. Jonathan","family":"WU","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Windsor"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] Z.H. Xia, X.H. Wang, X.M. Sun, and B.W. Wang, \u201cSteganalysis of least significant bit matching using multi-order differences,\u201d Security and Communication Networks, vol.7, no.8, pp.1283-1291, Aug. 2014.","DOI":"10.1002\/sec.864"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] J. Li, X.L. Li, B. Yang, and X.M. Sun, \u201cSegmentation-based image copy-move forgery detection scheme,\u201d IEEE Trans. Information Forensics and Security, vol.10, no.3, pp.507-518, March 2015.","DOI":"10.1109\/TIFS.2014.2381872"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] C. Kim, \u201cContent-based image copy detection,\u201d Signal Processing: Image Communication, vol.18, no.3, pp.169-184, 2003.","DOI":"10.1016\/S0923-5965(02)00130-3"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M.-N. Wu, C.-C. Lin, and C.-C. Chang, \u201cNovel image copy detection with rotating tolerance,\u201d J. Systems and Software, vol.80, no.7, pp.1057-1069, 2007.","DOI":"10.1016\/j.jss.2006.12.001"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] Y.H. Wan, Q.L. Yuan, S.M. Ji, L.M. He, and Y.L. Wang, \u201cA survey of the image copy detection,\u201d Proc. IEEE International Conference on Cybernetics and Intelligent Systems, pp.738-743, Chengdu, China, 2008.","DOI":"10.1109\/ICCIS.2008.4670942"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] Z.C. Ni, Y.Q. Shi, N. Ansari, and W. Su, \u201cReversible data hiding,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.16, no.3, pp.354-362, March 2006.","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] M. Qi, B.-Z. Li, and H. Sun, \u201cImage watermarking via fractional polar harmonic transforms,\u201d J. Electronic Imaging, vol.24, no.1, Jan. 2015.","DOI":"10.1117\/1.JEI.24.1.013004"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] J.-H. Hsiao, C.-S. Chen, L.-F. Chien, and M.-S. Chen, \u201cA new approach to image copy detection based on extended feature sets,\u201d IEEE Trans. Image Process., vol.16, no.8, pp.2069-2079, 2007.","DOI":"10.1109\/TIP.2007.900099"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] A. Joly, O. Buisson, and C. Frelicot, \u201cContent-based copy retrieval using distortion-based probabilistic similarity search,\u201d IEEE Trans. Multimedia, vol.9, no.2, pp.293-305, 2007.","DOI":"10.1109\/TMM.2006.886278"},{"key":"10","unstructured":"[10] L. Li, H. Xu, and C.-C. Chang, \u201cRotation invariant image copy detection using DCT domain,\u201d Int. J. Innovative Computing, Information and Control, vol.7, no.7, pp.3633-3644, 2011."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] E.Y. Chang, J.Z. Wang, C. Li, and G. Wiederhold, \u201cRIME: A replicated image detector for the world-wide web,\u201d Proc. SPIE Multimedia Storage and Archiving Systems, pp.58-67, Boston, MA, United states, 1998.","DOI":"10.1117\/12.325852"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M.-N. Wu, C.-C. Lin, and C.-C. Chang, \u201cA robust content-based copy detection scheme,\u201d Fundamenta Informaticae, vol.71, no.2-3, pp.351-366, 2006.","DOI":"10.3233\/FUN-2006-712-311"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] C.-C. Lin and S.-S. Wang, \u201cAn edge-based image copy detection scheme,\u201d Fundamenta Informaticae, vol.83, no.3, pp.299-318, 2008.","DOI":"10.3233\/FUN-2008-83304"},{"key":"14","unstructured":"[14] F. Zou, X. Li, Z. Xu, H. Ling, and P. Li, \u201cImage copy detection with rotation and scaling tolerance,\u201d Jisuanji Yanjiu yu Fazhan\/Computer Research and Development, vol.46, no.8, pp.1349-1356, 2009."},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] Y. Kumagai and G. Ohashi, \u201cQuery-by-Sketch image retrieval using edge relation histogram,\u201d IEICE Trans. Inf. &amp; Syst., vol.E96-D, no.2, pp.340-348, Feb. 2013.","DOI":"10.1587\/transinf.E96.D.340"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] K. Konstantinidis, A. Gasteratos, and I. Andreadis, \u201cImage retrieval based on fuzzy color histogram processing,\u201d Optics Communications, vol.248, no.4-6, pp.375-386, April 2005.","DOI":"10.1016\/j.optcom.2004.12.029"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] C.-S. Lu and C.-Y. Hsu, \u201cGeometric distortion-resilient image hashing scheme and its applications on copy detection and authentication,\u201d Multimedia Systems, vol.11, no.2, pp.159-173, 2005.","DOI":"10.1007\/s00530-005-0199-y"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] L.-W. Kang, C.-Y. Hsu, H.-W. Chen, and C.-S. Lu, \u201cSecure sift-based sparse representation for image copy detection and recognition,\u201d Proc. 2010 IEEE International Conference on Multimedia and Expo, Singapore, Singapore, pp.1248-1253, 2010.","DOI":"10.1109\/ICME.2010.5582615"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] H.-F. Ling, L.-Y. Wang, L.-Y. Yan, F.-H. Zou, and Z.-D. Lu, \u201cPM-DFT: A new local invariant descriptor towards image copy detection,\u201d J. Computer Science and Technology, vol.26, no.3, pp.558-567, 2011.","DOI":"10.1007\/s11390-011-1155-2"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] Z. Xu, H. Ling, F. Zou, Z. Lu, and P. Li, \u201cA novel image copy detection scheme based on the local multi-resolution histogram descriptor,\u201d Multimedia Tools and Applications, vol.52, no.2-3, pp.445-463, 2011.","DOI":"10.1007\/s11042-009-0438-x"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] H.-F. Ling, H. Cheng, Q. Ma, F. Zou, and W. Yan, \u201cEfficient image copy detection using multiscale fingerprints,\u201d IEEE Multimedia Mag., vol.19, no.1, pp.60-69, 2012.","DOI":"10.1109\/MMUL.2011.75"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] H. Ling, L. Yan, F. Zou, C. Liu, and H. Feng, \u201cFast image copy detection approach based on local fingerprint defined visual words,\u201d Signal Process., vol.93, no.8, pp.2328-2338, 2013.","DOI":"10.1016\/j.sigpro.2012.08.011"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] D.G. Lowe, \u201cDistinctive image features from scale-invariant keypoints,\u201d Int. J. Comput. Vis., vol.60, no.2, pp.91-110, 2004.","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] K. Yan and R. Sukthankar, \u201cPCA-sift: A more distinctive representation for local image descriptors,\u201d Proc. 2004 IEEE Computer Society Conference on Comput. Vis. Pattern Recognit., pp.506-513, Los Alamitos, CA, USA, 2004.","DOI":"10.1109\/CVPR.2004.1315206"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, \u201cSpeeded-up robust features (SURF),\u201d Computer Vision and Image Understanding, vol.110, no.3, pp.346-359, 2008.","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] M.M. Esmaeili, M. Fatourechi, and R.K. Ward, \u201cA robust and fast video copy detection system using content-based fingerprinting,\u201d IEEE Trans. Information Forensics and Security, vol.6, no.1, pp.213-226, 2011.","DOI":"10.1109\/TIFS.2010.2097593"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] B. Fan, F. Wu, and Z. Hu, \u201cRotationally invariant descriptors using intensity order pooling,\u201d IEEE Trans. Pattern Anal. Mach. Intell., vol.34, no.10, pp.2031-2045, 2012.","DOI":"10.1109\/TPAMI.2011.277"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] Y. Lei, W. Luo, Y. Wang, and J. Huang, \u201cVideo sequence matching based on the invariance of color correlation,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.22, no.9, pp.1332-1343, 2012.","DOI":"10.1109\/TCSVT.2012.2201670"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] A. Sarkar, V. Singh, P. Ghosh, B.S. Manjunath, and A. Singh, \u201cEfficient and robust detection of duplicate videos in a large database,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.20, no.6, pp.870-885, 2010.","DOI":"10.1109\/TCSVT.2010.2046056"},{"key":"30","unstructured":"[30] \u201cContent based image retrieval,\u201d http:\/\/wang.ist.psu.edu\/docs\/related\/ 2003."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/6\/E99.D_2015EDP7341\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T20:08:09Z","timestamp":1748981289000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/6\/E99.D_2015EDP7341\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":30,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2015edp7341","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}