{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1361699994091169920.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1109/tifs.2014.2381872"}},{"identifier":{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx7/10206/7019030/06987281.pdf?arnumber=6987281"}}],"dc:title":[{"@value":"Segmentation-Based Image Copy-Move Forgery Detection Scheme"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1381699994091169922","@type":"Researcher","foaf:name":[{"@value":"Jian Li"}]},{"@id":"https://cir.nii.ac.jp/crid/1381699994091169920","@type":"Researcher","foaf:name":[{"@value":"Xiaolong Li"}]},{"@id":"https://cir.nii.ac.jp/crid/1381699994091169923","@type":"Researcher","foaf:name":[{"@value":"Bin Yang"}]},{"@id":"https://cir.nii.ac.jp/crid/1381699994091169921","@type":"Researcher","foaf:name":[{"@value":"Xingming Sun"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"15566013"},{"@type":"EISSN","@value":"15566021"}],"prism:publicationName":[{"@value":"IEEE Transactions on Information Forensics and Security"}],"dc:publisher":[{"@value":"Institute of Electrical and Electronics Engineers (IEEE)"}],"prism:publicationDate":"2015-03","prism:volume":"10","prism:number":"3","prism:startingPage":"507","prism:endingPage":"518"},"reviewed":"false","dc:rights":["https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html"],"url":[{"@id":"http://xplorestaging.ieee.org/ielx7/10206/7019030/06987281.pdf?arnumber=6987281"}],"createdAt":"2014-12-19","modifiedAt":"2022-01-12","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1390282679354753280","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation"}]},{"@id":"https://cir.nii.ac.jp/crid/1390564238078540928","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Camera Selection in Far-Field Video Surveillance Networks"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/tifs.2014.2381872"},{"@type":"CROSSREF","@value":"10.1587/transinf.2015edp7341_references_DOI_MLWTFErdUtwKML4IDrW4YBnHFrE"},{"@type":"CROSSREF","@value":"10.1587/transcom.2018ebp3079_references_DOI_MLWTFErdUtwKML4IDrW4YBnHFrE"}]}