{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:11:05Z","timestamp":1725909065649},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569901"},{"type":"electronic","value":"9783319569918"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56991-8_6","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T03:57:16Z","timestamp":1503374236000},"page":"59-66","source":"Crossref","is-referenced-by-count":0,"title":["Image Splicing Detection Using Electromagnetism-Like Based Descriptor"],"prefix":"10.1007","author":[{"given":"Hamid A.","family":"Jalab","sequence":"first","affiliation":[]},{"given":"Ali M.","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Moghaddasi","sequence":"additional","affiliation":[]},{"given":"Zouhir","family":"Wakaf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","first-page":"1591","DOI":"10.1016\/j.patrec.2011.05.013","volume":"32","author":"Z He","year":"2011","unstructured":"He, Z., Sun, W., Lu, W., Lu, H.: Digital image splicing detection based on approximate run length. Pattern Recogn. Lett. 32, 1591\u20131597 (2011)","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"6_CR2","doi-asserted-by":"crossref","first-page":"117","DOI":"10.22452\/mjcs.vol30no2.4","volume":"30","author":"S Sadeghi","year":"2017","unstructured":"Sadeghi, S., Jalab, H.A., Wong, K.S., Uliyan, D.M., Dadkhah, S.: Keypoint based authentication and localization of copy-move forgery in digital image. Malaysian J. Comput. Sci. 30(2), 117\u2013133 (2017)","journal-title":"Malaysian J. Comput. Sci."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 51\u201362 (2007)","DOI":"10.1145\/1288869.1288878"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zhao, Y., Su, Y.: A new approach merging Markov and DCT features for image splicing detection. In: IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2009, pp. 390\u2013394 (2009)","DOI":"10.1109\/ICICISYS.2009.5357642"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Moghaddasi, Z., Jalab, H.A., Md Noor, R., Aghabozorgi, S.: Improving RLRN image splicing detection with the use of PCA and Kernel PCA. Sci. World J. 1\u201310 (2014)","DOI":"10.1155\/2014\/606570"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Moghaddasi, Z., Jalab, H.A., Noor, R.M.: SVD-based image splicing detection. In: 2014 International Conference on Information Technology and Multimedia (ICIMU), pp. 27\u201330 (2014)","DOI":"10.1109\/ICIMU.2014.7066598"},{"key":"6_CR7","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1023\/A:1022452626305","volume":"25","author":"\u015e\u0130 Birbil","year":"2003","unstructured":"Birbil, \u015e.\u0130., Fang, S.-C.: An electromagnetism-like mechanism for global optimization. J. Global Optim. 25, 263\u2013282 (2003)","journal-title":"J. Global Optim."},{"key":"6_CR8","first-page":"59","volume":"21","author":"P Wu","year":"2004","unstructured":"Wu, P., Yang, W.-H., Wei, N.-C.: An electromagnetism algorithm of neural network analysis\u2014an application to textile retail operation. J. Chin. Inst. Indus. Eng. 21, 59\u201367 (2004)","journal-title":"J. Chin. Inst. Indus. Eng."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Dadkhah, S., Koppen, M., Jalab, H.A., Sadeghi, S., Manaf, A.A., Uliyan, D.: Electromagnetismlike mechanism descriptor with fourier transform for a passive copy-move forgery detection in digital image forensics. In: Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2017, Porto - Portugal, pp. 612\u2013619, 24 February 2017","DOI":"10.5220\/0006232206120619"},{"key":"6_CR10","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1016\/j.omega.2010.12.005","volume":"39","author":"H Turabieh","year":"2011","unstructured":"Turabieh, H., Abdullah, S.: An integrated hybrid approach to the examination timetabling problem. Omega 39, 598\u2013607 (2011)","journal-title":"Omega"},{"key":"6_CR11","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.aeue.2008.04.001","volume":"63","author":"J-Y Jhang","year":"2009","unstructured":"Jhang, J.-Y., Lee, K.-C.: Array pattern optimization using electromagnetism-like algorithm. AEU-Int. J. Electron. Commun. 63, 491\u2013496 (2009)","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Jalab, H.A., Abdullah, N.A.: Content-based image retrieval based on electromagnetism-like mechanism. Math. Probl. Eng. 1\u201310 (2013)","DOI":"10.1155\/2013\/782519"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Jalab, H.A., Shaker, K.: Training the neural networks by electromagnetism-like mechanism based algorithm. In: Proceedings of the 3rd International Conference on Quantitative Sciences and Its Applications (ICOQSIA 2014), pp. 582\u2013586 (2014)","DOI":"10.1063\/1.4903640"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Wang, X.-J., Gao, L., Zhang, C.-Y.: Electromagnetism-like mechanism based algorithm for neural network training. In: Advanced Intelligent Computing Theories and Applications: With Aspects of Artificial Intelligence. Springer, pp. 40\u201345 (2008)","DOI":"10.1007\/978-3-540-85984-0_5"},{"key":"6_CR15","first-page":"9","volume":"1","author":"K Anusudha","year":"2010","unstructured":"Anusudha, K., Koshie, S.A., Ganesh, S.S., Mohanaprasad, K.: Image splicing detection involving moment-based feature extraction and classification using artificial neural networks. ACEEE Int. J. Signal Image Process. 1, 9 (2010)","journal-title":"ACEEE Int. J. Signal Image Process."},{"key":"6_CR16","unstructured":"Ng, T.-T., Chang, S.-F., Sun, Q.: A data set of authentic and spliced image blocks, Columbia University, ADVENT Technical report, pp. 203\u20132004 (2004)"},{"key":"6_CR17","doi-asserted-by":"crossref","first-page":"27:1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1\u201327:27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"6_CR18","doi-asserted-by":"crossref","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45, 4292\u20134299 (2012)","journal-title":"Pattern Recogn."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition. In: Digital Watermarking, pp. 177\u2013187. Springer (2006)","DOI":"10.1007\/11922841_15"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-length and edge statistics based approach for image splicing detection. In: Digital Watermarking, pp. 76\u201387. Springer (2009)","DOI":"10.1007\/978-3-642-04438-0_7"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56991-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T17:02:46Z","timestamp":1570035766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56991-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319569901","9783319569918"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56991-8_6","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}