{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q337947","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q337947","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q337947","kernelVersion":"v1","immutable":true,"modified":"2025-07-02T09:16:21Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q337947","name":"Fusion of block and keypoints based approaches for effective copy-move image forgery detection","headline":"Fusion of block and keypoints based approaches for effective copy-move image forgery detection","description":"scientific article; zbMATH DE number 6647412","url":"https://portal.mardi4nfdi.de/entity/Q337947","datePublished":"2016-11-03","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q337944"},{"@id":"https://portal.mardi4nfdi.de/entity/Q337898"},{"@id":"https://portal.mardi4nfdi.de/entity/Q337945"},{"@id":"https://portal.mardi4nfdi.de/entity/Q337933"},{"@id":"https://portal.mardi4nfdi.de/entity/Q337946"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1723419"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q180576"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1007/S11045-016-0416-1","url":"https://doi.org/10.1007/S11045-016-0416-1"},"sameAs":["https://doi.org/10.1007/S11045-016-0416-1"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q4031505"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5366361"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3495109"}]},"provenance":{"prov:generatedAtTime":"2025-07-02T09:16:21Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}