{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T17:31:35Z","timestamp":1709659895654},"reference-count":43,"publisher":"Institution of Engineering and Technology (IET)","issue":"17","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":86,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672273"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET image process"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1049\/iet-ipr.2020.0590","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T02:19:57Z","timestamp":1614305997000},"page":"4744-4755","source":"Crossref","is-referenced-by-count":6,"title":["Forged text detection in video, scene, and document images"],"prefix":"10.1049","volume":"14","author":[{"given":"Lokesh","family":"Nandanwar","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala LumpurMalaysia"}]},{"given":"Palaiahnakote","family":"Shivakumara","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala LumpurMalaysia"}]},{"given":"Prabir","family":"Mondal","sequence":"additional","affiliation":[{"name":"Indian Statistical InstituteKolkataIndia"}]},{"given":"Karpuravalli Srinivas","family":"Raghunandan","sequence":"additional","affiliation":[{"name":"Department of Studies in Computer ScienceUniversity of MysoreKarnatakaIndia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5426-2618","authenticated-orcid":false,"given":"Umapada","family":"Pal","sequence":"additional","affiliation":[{"name":"Indian Statistical InstituteKolkataIndia"}]},{"given":"Tong","family":"Lu","sequence":"additional","affiliation":[{"name":"National Key Lab for Novel Software TechnologyNanjing UniversityNanjingPeople's Republic of China"}]},{"given":"Daniel","family":"Lopresti","sequence":"additional","affiliation":[{"name":"Computer Science and EngineeringLehigh UniversityBethlehemPAUSA"}]}],"member":"265","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"issue":"11","key":"e_1_2_7_2_1","first-page":"2138","article-title":"Automatic detection of object based forgery in advanced video","volume":"26","author":"Chen S.","year":"2016","journal-title":"IEEE Trans. CSVT"},{"issue":"4","key":"e_1_2_7_3_1","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1109\/TMM.2017.2760098","article-title":"A fast forgery detection algorithm based on exponential Fourier moments for video region duplication","volume":"20","author":"Su L.","year":"2018","journal-title":"IEEE Trans. Multimed."},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1049\/iet-ipr.2019.0842","article-title":"Enhanced copy\u2010paste forgery detection in digital images using scale invariant feature transform","volume":"14","author":"Selvaraj P.","year":"2020","journal-title":"IET\u2010Image Process."},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","first-page":"2082","DOI":"10.1049\/iet-ipr.2018.5576","article-title":"Keypoints based enhanced multiple copy\u2010move forgeries detection system using density spatial clustering if application with noise clustering algorithm","volume":"12","author":"Soni B.","year":"2018","journal-title":"IET\u2010Image Process."},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1049\/iet-ipr.2018.5068","article-title":"Inter\u2010frame forgery detection based on differential energy of residue","volume":"13","author":"Fadi S.M.","year":"2019","journal-title":"IET\u2010Image Process."},{"issue":"3","key":"e_1_2_7_7_1","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TCSVT.2018.2804768","article-title":"A PatchMatch\u2010based dense\u2010field algorithm for video copy\u2010move detection and localization","volume":"29","author":"D'Amiano L.","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"e_1_2_7_8_1","first-page":"2543","article-title":"Motion adaptive frame deletion detection for digital video forensic","volume":"27","author":"Feng C.","year":"2017","journal-title":"IEEE Trans. CSVT"},{"issue":"8","key":"e_1_2_7_9_1","first-page":"1705","article-title":"Image forgery detection using adaptive over segmentation and feature point matching","volume":"10","author":"Pun C.M.","year":"2015","journal-title":"IEEE Trans. IFS"},{"key":"e_1_2_7_10_1","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.engappai.2016.12.022","article-title":"Copy\u2010move forgery detection based on hybrid features","volume":"59","author":"Yang F.","year":"2017","journal-title":"Eng. Appl. Artif. Intell."},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","first-page":"2092","DOI":"10.1049\/iet-ipr.2019.1145","article-title":"Image copy\u2010move forgery detection algorithm based on ORB and novel similarity metric","volume":"14","author":"Tian X.","year":"2020","journal-title":"IET\u2010 Image Process."},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","first-page":"2752","DOI":"10.1109\/TIP.2016.2554321","article-title":"Text detection, tracking and recognition in video: A comprehensive survey","volume":"25","author":"Yin X.\u2010C.","year":"2016","journal-title":"IEEE Trans. Image Process."},{"key":"e_1_2_7_13_1","first-page":"9365","volume-title":"Proc. Computer Vision and Pattern Recognition","author":"Baek Y.","year":"2019"},{"key":"e_1_2_7_14_1","first-page":"517","volume-title":"Proc. 14th Int. Conf. on Frontiers in Handwriting Recognition","author":"Barboza R.D.S.","year":"2014"},{"key":"e_1_2_7_15_1","first-page":"146","volume-title":"Proc. Document Analysis Systems","author":"Elkasrawi S.","year":"2014"},{"key":"e_1_2_7_16_1","first-page":"252","volume-title":"Proc. Document Analysis Systems","author":"Ahmed A.","year":"2014"},{"key":"e_1_2_7_17_1","doi-asserted-by":"crossref","first-page":"3615","DOI":"10.1016\/j.patcog.2015.04.008","article-title":"Automatic ink mismatch detection for forensic document analysis","volume":"48","author":"Shafait K.F.","year":"2015","journal-title":"Pattern Recognit."},{"key":"e_1_2_7_18_1","first-page":"496","volume-title":"Proc. 13th Int. Conf. on Document Analysis and Recognition (ICDAR)","author":"Luo Z.","year":"2015"},{"key":"e_1_2_7_19_1","first-page":"106","volume-title":"Proc. 13th Int. Conf. on Document Analysis and Recognition (ICDAR)","author":"Bertrand R.","year":"2013"},{"key":"e_1_2_7_20_1","first-page":"1350","volume-title":"Proc. 13th Int. Conf. on Document Analysis and Recognition (ICDAR)","author":"Barboza R.D. S.","year":"2013"},{"key":"e_1_2_7_21_1","first-page":"3212","volume-title":"Proc. 20th Int. Conf. on Pattern Recognition","author":"Halder B.","year":"2010"},{"issue":"2","key":"e_1_2_7_22_1","first-page":"809","article-title":"Forensic detection of fraudulent alterations in ball point pen strokes","volume":"7","author":"Kumar R.","year":"2012","journal-title":"IEEE Trans. IFS"},{"key":"e_1_2_7_23_1","first-page":"25","volume-title":"Proc. 15th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR)","author":"Raghunandan K. S.","year":"2016"},{"key":"e_1_2_7_24_1","first-page":"1114","volume-title":"Proc. Int. Conf. on Document Analysis and Recognition (ICDAR)","author":"Wang Z.","year":"2017"},{"key":"e_1_2_7_25_1","first-page":"386","volume-title":"Proc. Int. Conf. on Frontiers in Handwriting Recognition (ICFHR)","author":"Shivakumara P.","year":"2018"},{"key":"e_1_2_7_26_1","first-page":"7","volume-title":"Proc. Int. Conf. on Document Analysis and Recognition Workshops (ICDARW)","author":"Bibi M.","year":"2019"},{"key":"e_1_2_7_27_1","volume-title":"Proc. EUSIPCO","author":"Kalbitz M.","year":"2019"},{"key":"e_1_2_7_28_1","first-page":"1103","volume-title":"Proc. ICSSIT","author":"Mukhtar M.","year":"2020"},{"key":"e_1_2_7_29_1","first-page":"2823","volume-title":"Proc. CVPRW","author":"Rahiche A.","year":"2020"},{"key":"e_1_2_7_30_1","first-page":"201","volume-title":"Proc. ITOEC","author":"Chen Y.","year":"2020"},{"key":"e_1_2_7_31_1","volume-title":"Proc. Int. Conf. on Pattern Recognition and Artificial Intelligence","author":"Nandanwar L.","year":"2020"},{"key":"e_1_2_7_32_1","first-page":"344","volume-title":"Proc. Document Analysis Systems","author":"Shivakumara P.","year":"2014"},{"key":"e_1_2_7_33_1","first-page":"4714","volume-title":"Proc. Int. Conf. on Pattern Recognition","author":"Xu J.","year":"2014"},{"key":"e_1_2_7_34_1","first-page":"36","volume-title":"Proc. Int. Conf. on Frontiers in Handwriting Recognition (ICFHR)","author":"Roy S.","year":"2016"},{"issue":"8","key":"e_1_2_7_35_1","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1109\/LSP.2016.2581311","article-title":"Image overlay text detection based on JPEG truncation error analysis","volume":"23","author":"Bhardwaj D.","year":"2016","journal-title":"IEEE Signal Process. Lett."},{"key":"e_1_2_7_36_1","first-page":"1605","volume-title":"Proc. 11th Int. Conf. on Advanced Communication Technology","author":"Ko J.","year":"2009"},{"key":"e_1_2_7_37_1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/S0020-0255(96)00200-9","article-title":"The generalized sigmoid activation function: competitive supervised learning","volume":"99","author":"Narayan S.","year":"1997","journal-title":"Inf. Sci."},{"key":"e_1_2_7_38_1","first-page":"1","volume-title":"Proc. ICLR","author":"Kingma P. D.","year":"2015"},{"key":"e_1_2_7_39_1","first-page":"381","volume-title":"Proc. of the Fifteenth Int. Florida Artificial Intelligence Research Society Conf.","author":"Nasr G.E.","year":"2002"},{"key":"e_1_2_7_40_1","first-page":"13","volume-title":"Proc. 24th Int. Conf. on Pattern Recognition (ICPR)","author":"Artaud C.","year":"2018"},{"key":"e_1_2_7_41_1","doi-asserted-by":"crossref","first-page":"184332","DOI":"10.1109\/ACCESS.2019.2960097","article-title":"Anti\u2010forensics of audio source identification using generative adversarial network","volume":"7","author":"Li X.","year":"2019","journal-title":"IEEE Access"},{"key":"e_1_2_7_42_1","first-page":"1303","volume-title":"Proc. Asia\u2010Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA ASC)","author":"Wu J.","year":"2019"},{"key":"e_1_2_7_43_1","first-page":"1194","article-title":"Counter JPEG anti\u2010forensics approach based on the second\u2010order statistical analysis","volume":"14","author":"Singh G.","year":"2019","journal-title":"IEEE Trans. IFS"},{"key":"e_1_2_7_44_1","first-page":"2947","volume-title":"Proc. Computer Vision and Pattern Recognition","author":"Chen C.","year":"2020"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2020.0590","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ipr.2020.0590","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2020.0590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T04:02:49Z","timestamp":1618459369000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ipr.2020.0590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":43,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["10.1049\/iet-ipr.2020.0590"],"URL":"https:\/\/doi.org\/10.1049\/iet-ipr.2020.0590","archive":["Portico"],"relation":{},"ISSN":["1751-9659","1751-9667"],"issn-type":[{"value":"1751-9659","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]}}}