{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:25:36Z","timestamp":1756635936018,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/tsp.2016.7760924","type":"proceedings-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T21:40:11Z","timestamp":1480628411000},"page":"474-477","source":"Crossref","is-referenced-by-count":4,"title":["Image forgery detection based on SIFT and k-means++"],"prefix":"10.1109","author":[{"given":"Elif","family":"Baykal","sequence":"first","affiliation":[]},{"given":"Beste","family":"Ustubioglu","sequence":"additional","affiliation":[]},{"given":"Guzin","family":"Ulutas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.061"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1150","DOI":"10.1109\/ICCV.1999.790410","article-title":"Object recognition from local scale-invariant features","volume":"2","author":"lowe","year":"1999","journal-title":"Computer Vision 1999 The Proceedings of the Seventh IEEE International Conference on"},{"key":"ref12","first-page":"1027","article-title":"k-means++:the advantages of careful seeding","author":"arthur","year":"2007","journal-title":"Proc of 18th SODA"},{"journal-title":"CoMoFoD Database","year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"key":"ref4","first-page":"746","article-title":"Robust detection of region-duplication forgery in digital images","volume":"4","author":"luo","year":"2006","journal-title":"Proceedings of the International Conference on Pattern Recognition"},{"journal-title":"ICME","article-title":"A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD","year":"2007","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PACIIA.2008.240"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495482"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref2","article-title":"Exposing digital forgeries by detecting duplicated image regions","author":"popescu","year":"0","journal-title":"Technical Report TR2004-515"},{"key":"ref1","first-page":"19","article-title":"Detection of copy-move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Digital Forensic Research Workshop"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.aasri.2014.09.015"}],"event":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","start":{"date-parts":[[2016,6,27]]},"location":"Vienna, Austria","end":{"date-parts":[[2016,6,29]]}},"container-title":["2016 39th International Conference on Telecommunications and Signal Processing (TSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7750937\/7760810\/07760924.pdf?arnumber=7760924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T05:04:22Z","timestamp":1498367062000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7760924\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/tsp.2016.7760924","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}