{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T23:12:07Z","timestamp":1725145927183},"reference-count":33,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Image and Vision Computing"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1016\/j.imavis.2012.09.002","type":"journal-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T04:01:17Z","timestamp":1349928077000},"page":"57-71","source":"Crossref","is-referenced-by-count":65,"title":["A forgery detection algorithm for exemplar-based inpainting images using multi-region relation"],"prefix":"10.1016","volume":"31","author":[{"given":"I-Cheng","family":"Chang","sequence":"first","affiliation":[]},{"given":"J. Cloud","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Chih-Chuan","family":"Chang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.imavis.2012.09.002_bb0005","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.931079","article-title":"Image forgery detection","author":"Farid","year":"2009","journal-title":"IEEE Signal Process. Mag."},{"key":"10.1016\/j.imavis.2012.09.002_bb0010","series-title":"IEEE International Carnahan Conference on Security Technology","first-page":"280","article-title":"Blind methods for detecting image fakery","author":"Mahdian","year":"2008"},{"key":"10.1016\/j.imavis.2012.09.002_bb0015","series-title":"International Conference on Machine Learning and Cybernetics","first-page":"3463","article-title":"A survey on passive-blind image forgery by doctor method detection","author":"Zhang","year":"2008"},{"key":"10.1016\/j.imavis.2012.09.002_bb0020","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/s11704-007-0017-0","article-title":"A survey of passive technology for digital image forensics","author":"Luo","year":"2007","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.imavis.2012.09.002_bb0025","first-page":"613","article-title":"A survey of watermarking algorithms for image authentication","author":"Rey","year":"2002","journal-title":"EURASIP J. Appl. Signal Process."},{"key":"10.1016\/j.imavis.2012.09.002_bb0030","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/5.771066","article-title":"Multimedia watermarking techniques","author":"Hartung","year":"1999","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.imavis.2012.09.002_bb0035","first-page":"161","article-title":"Structural digital signature for image authentication: an incidental distortion resistant scheme","author":"Lu","year":"2003","journal-title":"IEEE Trans. Multimed."},{"key":"10.1016\/j.imavis.2012.09.002_bb0040","series-title":"Proceedings of Digital Forensic Research Workshop","first-page":"55","article-title":"Detection of copy-move forgery in digital images","author":"Fridrich","year":"2003"},{"key":"10.1016\/j.imavis.2012.09.002_bb0045","series-title":"Proceedings of the 3rd Canadian Conference on Computer and Robot Vision","first-page":"63","article-title":"An efficient match-based duplication detection algorithm","author":"Langille","year":"2006"},{"key":"10.1016\/j.imavis.2012.09.002_bb0050","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","article-title":"Detection of copy-move forgery using a method based on blur moment invariants","author":"Mahdian","year":"2007","journal-title":"Forensic Sci. Int."},{"key":"10.1016\/j.imavis.2012.09.002_bb0055","series-title":"IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application","first-page":"272","article-title":"Detection of copy-move forgery in digital images using SIFT algorithm","author":"Huang","year":"2008"},{"key":"10.1016\/j.imavis.2012.09.002_bb0060","series-title":"IEEE International Conference on Multimedia and Expo","first-page":"253","article-title":"Doctored JPEG image detection","author":"Li","year":"2008"},{"key":"10.1016\/j.imavis.2012.09.002_bb0065","series-title":"IEEE International Conference on Acoustics, Speech and Signal Processing","first-page":"1661","article-title":"A convolutive mixing model for shifted double JPEG compression with application to passive image authentication","author":"Qu","year":"2008"},{"key":"10.1016\/j.imavis.2012.09.002_bb0070","series-title":"International Workshop on Information Hiding","first-page":"311","article-title":"Exposing digital forgeries through \u201c\u201dspecular highlights on the eye","author":"Johnson","year":"2007"},{"key":"10.1016\/j.imavis.2012.09.002_bb0075","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/TIFS.2007.903848","article-title":"Exposing digital forgeries in complex lighting environments","author":"Johnson","year":"2007","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"10.1016\/j.imavis.2012.09.002_bb0080","series-title":"International Conference on Consumer Electronics","first-page":"1","article-title":"Detecting digital forgeries using of a lighting direction","author":"Lee","year":"2007"},{"key":"10.1016\/j.imavis.2012.09.002_bb0085","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TSP.2004.839932","article-title":"Exposing digital forgeries by detecting traces of re-sampling","author":"Popescu","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/j.imavis.2012.09.002_bb0090","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","article-title":"Blind authentication using periodic properties of interpolation","author":"Mahdian","year":"2008","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"10.1016\/j.imavis.2012.09.002_bb0095","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","article-title":"Digital camera identification from sensor pattern noise","author":"Lukas","year":"2006","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"10.1016\/j.imavis.2012.09.002_bb0100","series-title":"IEEE Computer Society Conference on Computer Vision and Pattern Recognition","first-page":"1087","article-title":"Detecting doctored images using camera response normality and consistency","author":"Lin","year":"2005"},{"key":"10.1016\/j.imavis.2012.09.002_bb0105","series-title":"ACM Multimedia and Security Workshop","first-page":"48","article-title":"Exposing digital forgeries through chromatic aberration","author":"Johnson","year":"2006"},{"key":"10.1016\/j.imavis.2012.09.002_bb0110","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","article-title":"Exposing digital forgeries in color filter array interpolated images","author":"Popescu","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/j.imavis.2012.09.002_bb0115","series-title":"International Conference on Machine Learning and Cybernetics","first-page":"1222","article-title":"Detection of digital doctoring in exemplar-based inpainted images","author":"Wu","year":"2008"},{"issue":"11","key":"10.1016\/j.imavis.2012.09.002_bb0120","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","article-title":"Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis","volume":"42","author":"Lin","year":"2009","journal-title":"Pattern Recogn."},{"key":"10.1016\/j.imavis.2012.09.002_bb0125","series-title":"IEEE Computer Society Conference on Computer Vision and Pattern Recognition","first-page":"264","article-title":"A Bayesian approach to digital matting","author":"Chuang","year":"2001"},{"key":"10.1016\/j.imavis.2012.09.002_bb0130","series-title":"Proc. ACM Conf. Comp. Graphics (SIGGRAPH)","first-page":"417","article-title":"Image inpainting","author":"Bertalmio","year":"2000"},{"key":"10.1016\/j.imavis.2012.09.002_bb0135","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TIP.2004.833105","article-title":"Region filling and object removal by exemplar-based image inpainting","author":"Criminisi","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.imavis.2012.09.002_bb0140","series-title":"Proc. of 9th Asian Computing Science Conference","first-page":"248","article-title":"A novel texture synthesis based algorithm for object removal in photographs","author":"Tang","year":"2004"},{"key":"10.1016\/j.imavis.2012.09.002_bb0145","series-title":"International Conference on Computer Graphics, Imaging and Vision","first-page":"26","article-title":"Robust algorithm for exemplar-based image inpainting","author":"Cheng","year":"2005"},{"key":"10.1016\/j.imavis.2012.09.002_bb0150","first-page":"372","article-title":"An image inpainting approach based on possion equation","volume":"5","author":"Shao","year":"2006"},{"key":"10.1016\/j.imavis.2012.09.002_bb0155","first-page":"810","article-title":"Object removal by cross isophotes exemplar-based inpainting","volume":"Vol. 3","author":"Wu","year":"2006"},{"key":"10.1016\/j.imavis.2012.09.002_bb0160","series-title":"15th IEEE International Conference on Image Processing","first-page":"2600","article-title":"A nonlocal-means approach to exemplar-based inpainting","author":"Wong","year":"2008"},{"key":"10.1016\/j.imavis.2012.09.002_bb0165","series-title":"Proc. ACM Conf. Comp. Graphics (SIGGRAPH)","article-title":"PatchMatch: a randomized correspondence algorithm for structural image editing","author":"Barnes","year":"2009"}],"container-title":["Image and Vision Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0262885612001722?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0262885612001722?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T14:03:56Z","timestamp":1584021836000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0262885612001722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["S0262885612001722"],"URL":"https:\/\/doi.org\/10.1016\/j.imavis.2012.09.002","relation":{},"ISSN":["0262-8856"],"issn-type":[{"value":"0262-8856","type":"print"}],"subject":[],"published":{"date-parts":[[2013,1]]}}}