{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T23:33:51Z","timestamp":1720136031043},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001868","name":"National Science Council of Taiwan","doi-asserted-by":"crossref","award":["NSC102-2221-E-346-007","MOST103-2221-E-346-007"],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1016\/j.dsp.2015.01.006","type":"journal-article","created":{"date-parts":[[2015,1,29]],"date-time":"2015-01-29T17:36:29Z","timestamp":1422552989000},"page":"50-62","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":13,"special_numbering":"C","title":["Effective composite image detection method based on feature inconsistency of image components"],"prefix":"10.1016","volume":"39","author":[{"given":"Wu-Chih","family":"Hu","sequence":"first","affiliation":[]},{"given":"Jing-Siou","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Jhih-Syuan","family":"Jian","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.dsp.2015.01.006_br0010","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/TCSVT.2011.2125370","article-title":"A passive-blind forgery detection scheme based on content-adaptive quantization table estimation","volume":"21","author":"Lin","year":"2011","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.dsp.2015.01.006_br0020","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","article-title":"Digital image forgery detection using passive techniques: a survey","volume":"10","author":"Birajdar","year":"2013","journal-title":"Digit. Investig."},{"key":"10.1016\/j.dsp.2015.01.006_br0030","series-title":"Proc. of the 2010 International Conference on Computer Application and System Modeling","first-page":"572","article-title":"Detection of composite forged image","volume":"vol. 7","author":"Zhang","year":"2010"},{"issue":"5","key":"10.1016\/j.dsp.2015.01.006_br0040","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1049\/iet-ipr.2011.0574","article-title":"Colour image watermarking for tamper proofing and pattern-based recovery","volume":"6","author":"Liu","year":"2012","journal-title":"IET Image Process."},{"issue":"4","key":"10.1016\/j.dsp.2015.01.006_br0050","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1504\/IJCSE.2013.057294","article-title":"Effective forgery detection using DCT+SVD-based watermarking for region of interest in key frames of vision-based surveillance","volume":"8","author":"Hu","year":"2013","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"10.1016\/j.dsp.2015.01.006_br0060","series-title":"Proc. of the 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing","first-page":"33","article-title":"Dual watermarking for image tamper detection and self-recovery","author":"Han","year":"2013"},{"key":"10.1016\/j.dsp.2015.01.006_br0070","doi-asserted-by":"crossref","DOI":"10.1007\/s11042-015-2449-0","article-title":"Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes","author":"Hu","year":"2015","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"10.1016\/j.dsp.2015.01.006_br0080","doi-asserted-by":"crossref","first-page":"033005","DOI":"10.1117\/1.JEI.21.3.033005","article-title":"Robust image watermarking based on discrete wavelet transform-discrete cosine transform-singular value decomposition","volume":"21","author":"Hu","year":"2012","journal-title":"J. Electron. Imaging"},{"issue":"4","key":"10.1016\/j.dsp.2015.01.006_br0090","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/j.jvcir.2012.03.003","article-title":"Unsupervised and reliable image matting based on modified spectral matting","volume":"23","author":"Hu","year":"2012","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"4","key":"10.1016\/j.dsp.2015.01.006_br0100","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1016\/j.patcog.2012.10.012","article-title":"Automatic spectral video matting","volume":"46","author":"Hu","year":"2013","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.dsp.2015.01.006_br0110","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.ins.2013.03.028","article-title":"An efficient expanding block algorithm for image copy\u2013move forgery detection","volume":"239","author":"Lynch","year":"2013","journal-title":"Inf. Sci."},{"issue":"1\u20133","key":"10.1016\/j.dsp.2015.01.006_br0120","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","article-title":"Improved DCT based detection of copy\u2013move forgery in images","volume":"206","author":"Huang","year":"2011","journal-title":"Forensic Sci. Int."},{"issue":"6","key":"10.1016\/j.dsp.2015.01.006_br0130","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","article-title":"An evaluation of popular copy\u2013move forgery detection approaches","volume":"7","author":"Christlein","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.dsp.2015.01.006_br0140","first-page":"46","article-title":"An efficient scheme for detecting copy\u2013move forged images by local binary patterns","volume":"4","author":"Li","year":"2013","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"issue":"10","key":"10.1016\/j.dsp.2015.01.006_br0150","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","article-title":"Using noise inconsistencies for blind image forensics","volume":"27","author":"Mahdian","year":"2009","journal-title":"Image Vis. Comput."},{"key":"10.1016\/j.dsp.2015.01.006_br0160","series-title":"Statistical tools for digital image forensics","author":"Popescu","year":"2005"},{"key":"10.1016\/j.dsp.2015.01.006_br0170","series-title":"Proc. of the First Asian Conference on Pattern Recognition","first-page":"169","article-title":"Tampering detection for composite images based on re-sampling and JPEG compression","author":"Zuo","year":"2011"},{"issue":"1","key":"10.1016\/j.dsp.2015.01.006_br0180","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","article-title":"Exposing digital forgeries from JPEG ghosts","volume":"4","author":"Farid","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.dsp.2015.01.006_br0190","doi-asserted-by":"crossref","first-page":"394","DOI":"10.3724\/SP.J.1146.2009.00115","article-title":"Passive-blind forensics for a class of JPEG image forgery","volume":"32","author":"Zheng","year":"2010","journal-title":"J. Electron. Inf. Technol."},{"issue":"3","key":"10.1016\/j.dsp.2015.01.006_br0200","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","article-title":"Image forgery localization via block-grained analysis of JPEG artifacts","volume":"7","author":"Bianchi","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.dsp.2015.01.006_br0210","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1109\/TIFS.2011.2139209","article-title":"Identifying image composites through shadow matte consistency","volume":"6","author":"Liu","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.dsp.2015.01.006_br0220","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.imavis.2012.09.002","article-title":"A forgery detection algorithm for exemplar-based inpainting images using multi-region relation","volume":"31","author":"Chang","year":"2013","journal-title":"Image Vis. Comput."},{"issue":"2","key":"10.1016\/j.dsp.2015.01.006_br0230","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","article-title":"Digital camera identification from sensor pattern noise","volume":"1","author":"Luk\u00e1\u0161","year":"2006","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10.1016\/j.dsp.2015.01.006_br0240","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/34.1000236","article-title":"Mean shift: a robust approach toward feature space analysis","volume":"24","author":"Comaniciu","year":"2002","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"10","key":"10.1016\/j.dsp.2015.01.006_br0250","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1109\/TPAMI.2008.168","article-title":"Spectral matting","volume":"30","author":"Levin","year":"2008","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"10.1016\/j.dsp.2015.01.006_br0260","doi-asserted-by":"crossref","first-page":"1061","DOI":"10.1109\/78.205713","article-title":"LUM filters: a class of rank-order-based filters for smoothing and sharpening","volume":"41","author":"Hardie","year":"1993","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"10.1016\/j.dsp.2015.01.006_br0270","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/j.jvcir.2011.03.009","article-title":"Robust real-time ship detection and tracking for visual surveillance of cage aquaculture","volume":"22","author":"Hu","year":"2011","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"10.1016\/j.dsp.2015.01.006_br0280","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.patrec.2007.10.007","article-title":"A new video segmentation method of moving objects based on blob-level knowledge","volume":"29","author":"Carmona","year":"2008","journal-title":"Pattern Recognit. Lett."},{"issue":"4","key":"10.1016\/j.dsp.2015.01.006_br0290","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1109\/TIFS.2013.2249064","article-title":"Estimating EXIF parameters based on noise features for image manipulation detection","volume":"8","author":"Fan","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.dsp.2015.01.006_br0300","unstructured":"CASIA image tampering detection evaluation database, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science [Online]. Available: http:\/\/forensics.idealtest.org."},{"issue":"11","key":"10.1016\/j.dsp.2015.01.006_br0310","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","article-title":"Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis","volume":"42","author":"Lin","year":"2009","journal-title":"Pattern Recognit."},{"issue":"6","key":"10.1016\/j.dsp.2015.01.006_br0320","doi-asserted-by":"crossref","first-page":"1924","DOI":"10.1016\/j.patcog.2007.09.009","article-title":"Mean shift spectral clustering","volume":"41","author":"Ozertem","year":"2008","journal-title":"Pattern Recognit."},{"issue":"1","key":"10.1016\/j.dsp.2015.01.006_br0330","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1137\/0912004","article-title":"The fast Gauss transform","volume":"12","author":"Greengard","year":"1991","journal-title":"SIAM J. Sci. Stat. Comput."},{"key":"10.1016\/j.dsp.2015.01.006_br0340","series-title":"Proc. of 2003 Conference on Computer Vision and Pattern Recognition","first-page":"68","article-title":"Information force clustering using directed trees","author":"Jenssen","year":"2003"},{"issue":"1","key":"10.1016\/j.dsp.2015.01.006_br0350","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","article-title":"Determining image origin and integrity using sensor noise","volume":"3","author":"Chen","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200415000263?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200415000263?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T23:23:33Z","timestamp":1537917813000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1051200415000263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":35,"alternative-id":["S1051200415000263"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2015.01.006","relation":{},"ISSN":["1051-2004"],"issn-type":[{"value":"1051-2004","type":"print"}],"subject":[],"published":{"date-parts":[[2015,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Effective composite image detection method based on feature inconsistency of image components","name":"articletitle","label":"Article Title"},{"value":"Digital Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dsp.2015.01.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}