{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T21:16:43Z","timestamp":1766351803694,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Brazilian National Council for Scientific and Technological Development","doi-asserted-by":"publisher","award":["#304472\/2015-8","#477662\/2013-7","#449638\/2014-6","#304352\/2012-8"],"award-info":[{"award-number":["#304472\/2015-8","#477662\/2013-7","#449638\/2014-6","#304352\/2012-8"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004901","name":"Minas Gerais Research Foundation\u2013 FAPEMIG","doi-asserted-by":"publisher","award":["APQ-00768-14"],"award-info":[{"award-number":["APQ-00768-14"]}],"id":[{"id":"10.13039\/501100004901","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Brazilian Coordination for the Improvement of Higher Level Education Personnel \u2013 CAPES","doi-asserted-by":"publisher","award":["Deep-Eyes","#99999.002341\/2015-08"],"award-info":[{"award-number":["Deep-Eyes","#99999.002341\/2015-08"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"S\u00e3o Paulo Research Foundation D\u00e9j\u00e0Vu Project","doi-asserted-by":"publisher","award":["#2015\/19222-9"],"award-info":[{"award-number":["#2015\/19222-9"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/tip.2016.2593583","type":"journal-article","created":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T18:22:16Z","timestamp":1469038936000},"page":"4729-4742","source":"Crossref","is-referenced-by-count":53,"title":["Behavior Knowledge Space-Based Fusion for Copy\u2013Move Forgery Detection"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2196-7232","authenticated-orcid":false,"given":"Anselmo","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Siovani C.","family":"Felipussi","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Alfaro","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Fonseca","sequence":"additional","affiliation":[]},{"given":"John E.","family":"Vargas-Munoz","sequence":"additional","affiliation":[]},{"given":"Jefersson A.","family":"dos Santos","sequence":"additional","affiliation":[]},{"given":"Anderson","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A tutorial on support vector regression","year":"2015","author":"smola","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref33","first-page":"199","article-title":"Detection of region duplication forgery in digital images using SURF","volume":"8","author":"shivakumar","year":"2011","journal-title":"Int J Comput Sci Issues"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.189"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2078506"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","article-title":"Segmentation-based image copy-move forgery detection scheme","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2445742"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","article-title":"Image forgery detection using adaptive oversegmentation and feature point matching","volume":"10","author":"pun","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.01.016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PACIIA.2008.240"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495482"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790410"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04146-4_95"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15558-1_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1576246.1531330"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VCIP.2014.7051552"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.16"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026075"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2014.7030944"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4285009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.876"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1162\/089976698300017197"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946873"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2046599"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959768"},{"journal-title":"Learning OpenCV","year":"2008","author":"bradski","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.142"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1004.2009.01488"},{"key":"ref19","first-page":"188","article-title":"Fast copy-move forgery detection","volume":"5","author":"lin","year":"2009","journal-title":"WSEAS Trans Signal Process"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/21.155943"},{"key":"ref3","first-page":"404","article-title":"SURF: Speeded up robust features","author":"bay","year":"2006","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref6","first-page":"134","article-title":"Detection of copy-move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Proc Digital Forensic Res Workshop"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/34.368145"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","article-title":"Detection of copy&#x2013;move forgery using a method based on blur moment invariants","volume":"171","author":"mahdian","year":"2006","journal-title":"Forensic Sci Int"},{"article-title":"Exposing digital forgeries by detecting duplicated image regions","year":"2004","author":"popescu","key":"ref7"},{"key":"ref49","first-page":"3133","article-title":"Do we need hundreds of classifiers to solve real world classification problems?","volume":"15","author":"fern\u00e1ndez-delgado","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref9","first-page":"362","article-title":"A new approach for detecting copy-move forgery in digital images","author":"zhang","year":"2010","journal-title":"Proc IEEE Int Conf Commun Syst (ICCS)"},{"key":"ref46","first-page":"65","article-title":"A simple sequentially rejective multiple test procedure","volume":"6","author":"holm","year":"1979","journal-title":"Scandin J Statist"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706374"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","article-title":"Rotation invariant localization of duplicated image regions based on Zernike moments","volume":"8","author":"ryu","year":"2013","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","article-title":"A threshold selection method from gray-level histograms","volume":"9","author":"otsu","year":"1979","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2307\/2279372"},{"journal-title":"IEEE IFS Image Forensic Challenge","year":"2015","key":"ref41"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1214\/aos\/1013699998","article-title":"The control of the false discovery rate in multiple testing under dependency","volume":"29","author":"benjamini","year":"2001","journal-title":"Ann Statist"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/83\/7529254\/07517389.pdf?arnumber=7517389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T13:56:38Z","timestamp":1656856598000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7517389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":49,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tip.2016.2593583","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"type":"print","value":"1057-7149"},{"type":"electronic","value":"1941-0042"}],"subject":[],"published":{"date-parts":[[2016,10]]}}}