{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T07:55:59Z","timestamp":1709452559934},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T00:00:00Z","timestamp":1481587200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11042-016-4179-3","type":"journal-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T03:13:08Z","timestamp":1481598788000},"page":"26503-26522","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection"],"prefix":"10.1007","volume":"76","author":[{"given":"Chien-Chang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Han","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Cheng-Shian","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,13]]},"reference":[{"key":"4179_CR1","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"231","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284\u2013295","journal-title":"Forensic Sci Int"},{"key":"4179_CR2","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy\u2013move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6:1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4179_CR3","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28:659\u2013669","journal-title":"Signal Process Image Commun"},{"key":"4179_CR4","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.ins.2016.01.061","volume":"345","author":"X Bi","year":"2016","unstructured":"Bi X, Pun C, Yuan X (2016) Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf Sci 345:226\u2013242","journal-title":"Inf Sci"},{"key":"4179_CR5","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1016\/j.sigpro.2011.01.022","volume":"91","author":"S Bravo-Solorio","year":"2011","unstructured":"Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91:1759\u20131770","journal-title":"Signal Process"},{"key":"4179_CR6","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital image. Forensic Sci Int 214:33\u201343","journal-title":"Forensic Sci Int"},{"key":"4179_CR7","doi-asserted-by":"publisher","unstructured":"Chen CC, Tsai YH, Yeh HC (2016) Difference-expansion based reversible and visible image watermarking scheme. Multimed Tools Appl. doi: 10.1007\/s11042-016-3452-9","DOI":"10.1007\/s11042-016-3452-9"},{"key":"4179_CR8","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7:1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4179_CR9","doi-asserted-by":"crossref","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann, San Francisco","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"4179_CR10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"R Davarzani","year":"2013","unstructured":"Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231:61\u201372","journal-title":"Forensic Sci Int"},{"key":"4179_CR11","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"2","author":"H Farid","year":"2009","unstructured":"Farid H (2009) A survey of image forgery detection. IEEE Signal Process Mag 2:16\u201325","journal-title":"IEEE Signal Process Mag"},{"key":"4179_CR12","unstructured":"Fridrich J, Soukal D, Luk\u00e1s J (2003) Detection of copy move forgery in digital images. In Proc. of conf. on digital forensic research workshop 55\u201361"},{"key":"4179_CR13","unstructured":"Hsu CC, Hung TY, Lin CW, Hsu CT (2007) Video forgery detection using correlation of noise residue. In Proc. of IEEE int. conf. on multimedia signal processing 170\u2013174"},{"issue":"2","key":"4179_CR14","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/TIT.1962.1057692","volume":"8","author":"MK Hu","year":"1962","unstructured":"Hu MK (1962) Visual pattern recognition by moment invariants. IRE Trans Inf Theory 8(2):179\u2013187","journal-title":"IRE Trans Inf Theory"},{"issue":"4","key":"4179_CR15","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TIFS.2010.2074194","volume":"5","author":"M Kobayashi","year":"2010","unstructured":"Kobayashi M, Okabe T, Sato Y (2010) Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans Inf Forensics Secur 5(4):883\u2013892","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1\u20133","key":"4179_CR16","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Y Li","year":"2013","unstructured":"Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1\u20133):59\u201367","journal-title":"Forensic Sci Int"},{"key":"4179_CR17","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li XL, Yang B, Sun XM (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10:507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4179_CR18","doi-asserted-by":"crossref","unstructured":"Liao SY, Huang TQ (2013) Video copy-move forgery detection and localization based on tamura texture features. In Proc. of IEEE int. conf. on image and signal processing 864\u2013868","DOI":"10.1109\/CISP.2013.6745286"},{"issue":"2","key":"4179_CR19","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.diin.2014.03.016","volume":"11","author":"C Lin","year":"2014","unstructured":"Lin C, Tsay J (2014) A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit Investig 11(2):120\u2013140","journal-title":"Digit Investig"},{"key":"4179_CR20","doi-asserted-by":"crossref","unstructured":"Lin CS, Chen CC, Chang YC (2015) An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. IEEE International Conference on Intelligent Networking and Collaborative Systems (INCOS)","DOI":"10.1109\/INCoS.2015.90"},{"key":"4179_CR21","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.ins.2013.03.028","volume":"239","author":"G Lynch","year":"2013","unstructured":"Lynch G, Shih FY, Liao HM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253\u2013265","journal-title":"Inf Sci"},{"key":"4179_CR22","doi-asserted-by":"crossref","unstructured":"Muhammad G, Hussain M, Bebis G Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9:49\u201357","DOI":"10.1016\/j.diin.2012.04.004"},{"key":"4179_CR23","unstructured":"Popescu AC, Huang HF (2004) Exposing Digital Forgeries bydetecting duplicated image regions. Department of Computer Science TR2004\u2013515"},{"key":"4179_CR24","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8:1355\u20131370","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4179_CR25","doi-asserted-by":"crossref","unstructured":"Subramanyam AV, Emmanuel S (2013) Pixel estimation based video forgery detection. In Proc. of IEEE int. conf. on acoustics, speech and signal processing 3038\u20133042","DOI":"10.1109\/ICASSP.2013.6638216"},{"key":"4179_CR26","unstructured":"Tralic D, Zupansis I, Grgic S, Grgic M (2013) CoMoFoD-New Database for copy-move forgery detection. The 55th internationsl symposium on ELMAR 49\u201354"},{"key":"4179_CR27","unstructured":"Tu, HK, Thuong LT, Synh HVU, Khoa HV (2015) The efficiency of applying DWT and feature extraction into copy-move images detection. IEEE international conference on Advanced Technologies for Communications (ATC)"},{"key":"4179_CR28","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233:158\u2013166","journal-title":"Forensic Sci Int"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-4179-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4179-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4179-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T09:05:03Z","timestamp":1568624703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-4179-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,13]]},"references-count":28,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["4179"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-4179-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,13]]}}}