<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="style/detail_T.xsl"?>
<bibitem type="C">   <ARLID>0355073</ARLID> <utime>20240103194713.4</utime><mtime>20110218235959.9</mtime>         <title language="eng" primary="1">Detection of Near-Duplicated Image Regions</title>  <specification> <page_count>9 s.</page_count> </specification>   <serial><ARLID>cav_un_epca*0356678</ARLID><ISBN>978-3-540-75175-5</ISBN><title>Computer Recognition Systems 2</title><part_num/><part_title/><page_num>187-195</page_num><publisher><place>Berlin</place><name>Springer Verlag</name><year>2007</year></publisher><editor><name1>Kurzynski</name1><name2>Marek </name2></editor><editor><name1>Puchala</name1><name2>Edward </name2></editor></serial>    <keyword>Image forensics</keyword>   <keyword>Blind forgery detection</keyword>   <keyword>Image tampering</keyword>    <author primary="1"> <ARLID>cav_un_auth*0206076</ARLID> <name1>Mahdian</name1> <name2>Babak</name2> <full_dept language="cz">Zpracování obrazové informace</full_dept> <full_dept language="eng">Department of Image Processing</full_dept> <department language="cz">ZOI</department> <department language="eng">ZOI</department> <institution>UTIA-B</institution> <full_dept>Department of Image Processing</full_dept>  <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author> <author primary="0"> <ARLID>cav_un_auth*0101189</ARLID> <name1>Saic</name1> <name2>Stanislav</name2> <full_dept language="cz">Zpracování obrazové informace</full_dept> <full_dept>Department of Image Processing</full_dept> <department language="cz">ZOI</department> <department>ZOI</department> <institution>UTIA-B</institution> <full_dept>Department of Image Processing</full_dept>  <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author>   <source> <url>http://library.utia.cas.cz/separaty/2011/ZOI/mahdian-detection of near-duplicated image regions.pdf</url> </source>        <cas_special> <research> <research_id>CEZ:AV0Z10750506</research_id> </research>  <abstract language="eng" primary="1">The method is based on blur moment invariants, which allows successful  detection of copy—move forgery, even when blur degradation, additional noise, or arbitrary  contrast changes are present in the duplicated regions. These modifications are  commonly used techniques to conceal traces of copy—move forgery. Our method works  equally well for lossy format such as JPEG.</abstract>  <action target="WRD"> <ARLID>cav_un_auth*0268868</ARLID> <name>Fifth International Conference on Computer Recognition Systems</name>  <place>Wroclaw</place> <dates>22.10.2007-25.10.2007</dates>  <country>PL</country> </action>    <reportyear>2011</reportyear>  <RIV>IN</RIV>      <permalink>http://hdl.handle.net/11104/0193922</permalink>        <arlyear>2007</arlyear>       <unknown tag="mrcbU63"> cav_un_epca*0356678 Computer Recognition Systems 2 978-3-540-75175-5 187 195 Berlin Springer Verlag 2007 Advanes in Soft Computing 45 </unknown> <unknown tag="mrcbU67"> Kurzynski Marek  340 </unknown> <unknown tag="mrcbU67"> Puchala Edward  340 </unknown> </cas_special> </bibitem>