{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:02:55Z","timestamp":1762002175028,"version":"build-2065373602"},"reference-count":19,"publisher":"The Scientific and Technological Research Council of Turkey (TUBITAK-ULAKBIM) - DIGITAL COMMONS JOURNALS","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Turk J Elec Eng &amp; Comp Sci"],"published-print":{"date-parts":[[2017]]},"DOI":"10.3906\/elk-1703-125","type":"journal-article","created":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T10:39:55Z","timestamp":1512470395000},"page":"4558-4574","source":"Crossref","is-referenced-by-count":16,"title":["A new video forgery detection approach based on forgery line"],"prefix":"10.55730","volume":"25","author":[{"given":"I\u015f\u0131lay","family":"BOZKURT","sequence":"first","affiliation":[]},{"given":"Mustafa Hakan","family":"BOZKURT","sequence":"additional","affiliation":[]},{"given":"G\u00fczin","family":"ULUTA\u015e","sequence":"additional","affiliation":[]}],"member":"34691","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288876"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001412500176"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2374-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0321"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.06.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161375"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597826"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288150"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412641"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2251632"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"Huan Z, Huang F, Huang J. Detection of double compression with the same bit rate in MPEG-2 videos. In: IEEE 2014 International Conference on Signal and Information Processing; 9--13 July 2014; Xi'an, China. New York, NY, USA: IEEE. pp. 306-309.","DOI":"10.1109\/ChinaSIP.2014.6889253"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902661"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40099-5_20"},{"key":"ref14","doi-asserted-by":"crossref","unstructured":"Hsu CC, Hung TY, Lin CW. Video forgery detection using correlation of noise residue. In: IEEE 2008 Workshop on Multimedia Signal Processing; 8--10 October 2008; Brisbane, QLD, Australia. New York, NY, USA: IEEE. pp. 170-174.","DOI":"10.1109\/MMSP.2008.4665069"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1915-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AISP.2015.7123529"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40099-5_22"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25512-5_3"},{"key":"ref19","doi-asserted-by":"crossref","unstructured":"Qadir G, Yahaya S, Ho AT. Surrey University Library for Forensic Analysis (SULFA) of Video Content. Surrey, UK: University of Surrey, 2012. \\end{reference} \\end{document}","DOI":"10.1049\/cp.2012.0422"}],"container-title":["TURKISH JOURNAL OF ELECTRICAL ENGINEERING &amp; COMPUTER SCIENCES"],"original-title":[],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T02:46:26Z","timestamp":1751078786000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.tubitak.gov.tr\/elektrik\/vol25\/iss6\/10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":19,"URL":"https:\/\/doi.org\/10.3906\/elk-1703-125","relation":{},"ISSN":["1300-0632","1303-6203"],"issn-type":[{"type":"print","value":"1300-0632"},{"type":"electronic","value":"1303-6203"}],"subject":[],"published":{"date-parts":[[2017]]}}}