{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T02:50:42Z","timestamp":1774839042570,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031213847","type":"print"},{"value":"9783031213854","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21385-4_8","type":"book-chapter","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T05:03:52Z","timestamp":1670907832000},"page":"89-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Local Binary Pattern Symmetric Centre Feature Extraction Method for Detection of Image Forgery"],"prefix":"10.1007","author":[{"given":"M. Pavan","family":"Kalyan","sequence":"first","affiliation":[]},{"given":"D.","family":"Kishore","sequence":"additional","affiliation":[]},{"given":"Mahesh K.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,14]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Uliyan, D.M., Jalab, H.A., Wahab, A.W.A.: Copy move image forgery detection using Hessian and center symmetric local binary pattern. In 2015 IEEE Conference on Open Systems (ICOS), pp. 7\u201311 (2015)","DOI":"10.1109\/ICOS.2015.7377269"},{"issue":"8","key":"8_CR2","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s11042-015-2496-6","volume":"75","author":"R Davarzani","year":"2015","unstructured":"Davarzani, R., Mozaffari, S., Yaghmaie, K.: Perceptual image hashing using center-symmetric local binary patterns. Multimedia Tools and Applications 75(8), 4639\u20134667 (2015). https:\/\/doi.org\/10.1007\/s11042-015-2496-6","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"8_CR3","doi-asserted-by":"publisher","first-page":"492","DOI":"10.3390\/sym12040492","volume":"12","author":"JY Park","year":"2020","unstructured":"Park, J.Y., Kang, T.A., Moon, Y.H., Eom, I.K.: Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry 12(4), 492 (2020)","journal-title":"Symmetry"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.ijleo.2019.04.038","volume":"185","author":"T Tuncer","year":"2019","unstructured":"Tuncer, T., Kaya, M.: A novel image watermarking method based on center symmetric local binary pattern with minimum distortion. Optik 185, 972\u2013984 (2019)","journal-title":"Optik"},{"issue":"20","key":"8_CR5","doi-asserted-by":"publisher","first-page":"29395","DOI":"10.1007\/s11042-018-6718-6","volume":"78","author":"MK Singh","year":"2018","unstructured":"Singh, M.K., Singh, A.K., Singh, N.: Multimedia analysis for disguised voice and classification efficiency. Multimedia Tools and Applications 78(20), 29395\u201329411 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6718-6","journal-title":"Multimedia Tools and Applications"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Soni, B., Das, P. K., Thounaojam, D. M.: Copy-move tampering detection based on local binary pattern histogram Fourier feature. In Proceedings of the 7th International Conference on Computer and Communication Technology, pp. 78\u201383 (2017)","DOI":"10.1145\/3154979.3155001"},{"issue":"14","key":"8_CR7","first-page":"241","volume":"11","author":"MK Singh","year":"2018","unstructured":"Singh, M.K., Singh, A.K., Singh, N.: Disguised voice with fast and slow speech and its acoustic analysis. Int. J. Pure Appl. Math 11(14), 241\u2013246 (2018)","journal-title":"Int. J. Pure Appl. Math"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Dey, A., Pal, P., Chowdhuri, P., Singh, P. K., Jana, B.: Center-symmetric local binary pattern-based image authentication using local and global features vector. In\u00a0Computational Intelligence in Pattern Recognition, pp. 489\u2013501. Springer, Singapore (2020)","DOI":"10.1007\/978-981-15-2449-3_41"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Singh, M. K., Singh, A. K., Singh, N.: Acoustic comparison of electronics disguised voice using different semitones.\u00a0Int. J. Eng. Technol. (2018).","DOI":"10.14419\/ijet.v7i2.16.11502"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Chalamalasetty, S. P., Giduturi, S. R.: Research perception towards copy-move image forgery detection: challenges and future directions.\u00a0Int. J. Image Grap. 2150054 (2021).","DOI":"10.1142\/S0219467821500546"},{"issue":"5","key":"8_CR11","first-page":"455","volume":"36","author":"M Singh","year":"2019","unstructured":"Singh, M., Nandan, D., Kumar, S.: Statistical analysis of lower and raised pitch voice signal and its efficiency calculation. Trait. Sig. 36(5), 455\u2013461 (2019)","journal-title":"Trait. Sig."},{"issue":"47-48","key":"8_CR12","doi-asserted-by":"publisher","first-page":"35537","DOI":"10.1007\/s11042-019-08329-y","volume":"79","author":"MK Singh","year":"2019","unstructured":"Singh, M.K., Singh, A.K., Singh, N.: Multimedia utilization of non-computerized disguised voice and acoustic similarity measurement. Multimedia Tools and Applications 79(47\u201348), 35537\u201335552 (2019). https:\/\/doi.org\/10.1007\/s11042-019-08329-y","journal-title":"Multimedia Tools and Applications"},{"key":"8_CR13","volume-title":"Advancing Biometrics and Image Forensics Through Vision and Learning Systems","author":"J Brogan","year":"2019","unstructured":"Brogan, J.: Advancing Biometrics and Image Forensics Through Vision and Learning Systems. The University of Notre Dame, Dame (2019)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Kanchana, V., Nath, S., Singh, M. K. (2021). A study of internet of things oriented smart medical systems.\u00a0In: Materials Today: Proceedings","DOI":"10.1016\/j.matpr.2021.06.363"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Balaji, V.N., Srinivas, P.B., Singh, M.K.: Neuromorphic advancements architecture design and its implementations technique.\u00a0In: Materials Today: Proceedings (2021)","DOI":"10.1016\/j.matpr.2021.06.273"},{"key":"8_CR16","series-title":"Security, and Behavior Analysis (ISBA)","first-page":"1","volume-title":"2019 IEEE 5th International Conference on Identity","author":"E Jalilian","year":"2019","unstructured":"Jalilian, E., Uhl, A.: Enhanced segmentation-CNN-based finger-vein recognition by joint training with automatically generated and manual labels. In: 2019 IEEE 5th International Conference on Identity. Security, and Behavior Analysis (ISBA), pp. 1\u20138. IEEE, New York (2019)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Punyavathi, G., Neeladri, M., Singh, M.K.: Vehicle tracking and detection techniques using IoT. In: Materials Today: Proceedings (2021)","DOI":"10.1016\/j.matpr.2021.06.283"},{"issue":"3","key":"8_CR18","first-page":"22","volume":"9","author":"A Kumar","year":"2019","unstructured":"Kumar, A.: Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int. J. Cloud Appl. Comput. 9(3), 22\u201336 (2019)","journal-title":"Int. J. Cloud Appl. Comput."},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-020-01826-x","volume":"2020","author":"A Kumar","year":"2020","unstructured":"Kumar, A., Zhang, Z.J., Lyu, H.: Object detection in real time based on improved single shot multi-box detector algorithm. EURASIP J. Wirel. Commun. Netw. 2020(1), 1\u201318 (2020). https:\/\/doi.org\/10.1186\/s13638-020-01826-x","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"8_CR20","unstructured":"Kumar, A.: A review on implementation of digital image watermarking techniques using LSB and DWT. In: the Third International Conference on Information and Communication Technology for Sustainable Development (ICT4SD 2018), 30\u201331 Aug\u00a02018,\u00a0Hotel Vivanta by Taj, GOA, India"},{"key":"8_CR21","first-page":"2","volume":"1","author":"S Walia","year":"2018","unstructured":"Walia, S., Kumar, K.: Pragmatical investigation of frequency-domain and spatial-structure-based image forgery detection methods. Int. J. Comput. Intell. IoT 1, 2 (2018)","journal-title":"Int. J. Comput. Intell. IoT"}],"container-title":["Communications in Computer and Information Science","Artificial Intelligence and Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21385-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T15:25:23Z","timestamp":1691594723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21385-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031213847","9783031213854"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21385-4_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Data Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaids2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icaids.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"195","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}