{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:17:46Z","timestamp":1743002266970,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319571409"},{"type":"electronic","value":"9783319571416"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57141-6_10","type":"book-chapter","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T06:14:00Z","timestamp":1491545640000},"page":"87-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ASRD: Algorithm for Spliced Region Detection in Digital Image Forensics"],"prefix":"10.1007","author":[{"given":"A.","family":"Meenakshi Sundaram","sequence":"first","affiliation":[]},{"given":"C.","family":"Nandini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,8]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b12697","volume-title":"Multimedia Security: Watermarking, Steganography, and Forensics","author":"FY Shih","year":"2012","unstructured":"Shih, F.Y.: Multimedia Security: Watermarking, Steganography, and Forensics. CRC Press, Boca Raton (2012)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-31960-5_1","volume-title":"Digital-Forensics and Watermarking","author":"T Julliand","year":"2016","unstructured":"Julliand, T., Nozick, V., Talbot, H.: Image noise and digital image forensics. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 3\u201317. Springer, Cham (2016). doi:\n                  10.1007\/978-3-319-31960-5_1"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-319-31960-5_7","volume-title":"Digital-Forensics and Watermarking","author":"F Ding","year":"2016","unstructured":"Ding, F., Dong, W., Zhu, G., Shi, Y.-Q.: An advanced texture analysis method for image sharpening detection. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 72\u201382. Springer, Cham (2016). doi:\n                  10.1007\/978-3-319-31960-5_7"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/978-94-007-2792-2_67","volume":"114","author":"C-H Choi","year":"2011","unstructured":"Choi, C.-H., Lee, M.-J., Hyun, D.-K., Lee, H.-K.: Forged region detection for scanned images. Springer-Comput. Sci. Converg. 114, 687\u2013694 (2011)","journal-title":"Springer-Comput. Sci. Converg."},{"key":"10_CR5","first-page":"437","volume":"8880","author":"P Malviya","year":"2014","unstructured":"Malviya, P., Naskar, R.: Digital forensic technique for double compression based JPEG image forgery detection. Springer-Inf. Syst. Secur. 8880, 437\u2013447 (2014)","journal-title":"Springer-Inf. Syst. Secur."},{"key":"10_CR6","unstructured":"Smith, S.: iMediaEthics\u2019 Top 10 Fake and Doctored Photo Stories. An online article of iMediaEthics 2016. \n                  http:\/\/www.imediaethics.org\/imediaethics-top-10-fake-and-doctored-photo-stories\/\n                  \n                . Accessed 20 Oct"},{"key":"10_CR7","unstructured":"Vamosi, R.: Researcher: Bin Laden\u2019s beard is real, video is not. An online article of CNET. \n                  https:\/\/www.cnet.com\/news\/researcher-bin-ladens-beard-is-real-video-is-not\/\n                  \n                . Accessed 20 Oct 2016"},{"key":"10_CR8","volume-title":"Understanding Forensic Digital Imaging","author":"HL Blitzer","year":"2010","unstructured":"Blitzer, H.L., Stein-Ferguson, K., Huang, J.: Understanding Forensic Digital Imaging. Academic Press, Cambridge (2010)"},{"issue":"3","key":"10_CR9","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","volume":"5","author":"MC Stamm","year":"2010","unstructured":"Stamm, M.C., Liu, K.J.R.: Forensic detection image manipulation using statistical intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 5(3), 492\u2013506 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR10","volume-title":"Haohong Wang, Multimedia Analysis, Processing and Communications","author":"L Weisi","year":"2011","unstructured":"Weisi, L., Tao, D., Kacprzyk, J., Li, Z., Izquierdo, E.: Haohong Wang, Multimedia Analysis, Processing and Communications. Springer Science & Business Media, New York (2011)"},{"key":"10_CR11","unstructured":"Sundarm, A.M., Nandini, C.: Copy-move forgery detection- a survey. In: ICACCN-International Conference on Advanced Computing, Communication Networks, Chandigarh, 02\u201303 June 2011"},{"issue":"8","key":"10_CR12","first-page":"1","volume":"4","author":"AM Sundarm","year":"2014","unstructured":"Sundarm, A.M., Nandini, C.: Investigational study of image forensic applications, techniques and research directions. Int. J. Emerg. Technol. Adv. Eng. Certif. J. 4(8), 1\u20139 (2014). \n                  https:\/\/www.ijetae.com\n                  \n                . ISSN 2250-2459, ISO 9001:2008","journal-title":"Int. J. Emerg. Technol. Adv. Eng. Certif. J."},{"key":"10_CR13","unstructured":"Sundarm, A.M., Nandini, C.: Image retouching and it\u2019s detection-a survey. In: NCGCT-First National Conference on Green Computing Technologies, DSATM, Bangalore, 07 March 2015"},{"issue":"13","key":"10_CR14","first-page":"1","volume":"104","author":"AM Sundarm","year":"2014","unstructured":"Sundarm, A.M., Nandini, C.: Feature based image authentication using symmetric surround saliency mapping in image forensics. Int. J. Comput. Appl. 104(13), 1\u20139 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"10_CR15","unstructured":"Sundarm, A.M., Nandini, C.: CBFD: coherence based forgery detection technique in image forensics analysis. In: IEEE-ICERECT-2015-International Conference on Emerging Research in Electronics, Computer Science and Technology, 17\u201319 December 2015"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Splicebuster: a new blind image splicing detector. In: IEEE International Workshop on Information Forensics and Security (2015)","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Detecting image splicing in the wild (web). In: IEEE International Conference on Multimedia and Expo Workshop, pp. 1\u20136 (2015)","DOI":"10.1109\/ICMEW.2015.7169839"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Amerini, I., Becarelli, R., Caldelli, R., Mastio, A.D.: Splicing forgeries localization through the use of first digit features. In: IEEE International Workshop on Information Forensics and Security (2014)","DOI":"10.1109\/WIFS.2014.7084318"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Moghaddasi, Z., Jalab, H.A., Md Noor, R.: SVD-based image splicing detection. In: International Conference on Information Technology and Multimedia (2014)","DOI":"10.1109\/ICIMU.2014.7066598"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2014-1","volume":"2014","author":"B Su","year":"2014","unstructured":"Su, B., Yuan, Q., Wang, S., Zhao, C., Li, S.: Enhanced state selection Markov model for image splicing detection. Springer-EURASIP J. Wirel. Commun. Netw. 2014, 1\u201310 (2014)","journal-title":"Springer-EURASIP J. Wirel. Commun. Netw."},{"issue":"2","key":"10_CR21","doi-asserted-by":"publisher","first-page":"023031","DOI":"10.1117\/1.JEI.25.2.023031","volume":"25","author":"JG Han","year":"2016","unstructured":"Han, J.G., Park, T.H., Moon, Y.H., Eom, K.: Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion. J. Electron. Imaging 25(2), 023031 (2016)","journal-title":"J. Electron. Imaging"},{"key":"10_CR22","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-1-4614-5803-6_19","volume-title":"Springer Journals of Communications, Signal Processing, and Systems","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Zhao, C., Pi, Y., Li, S.: Revealing image splicing forgery using local binary patterns of DCT coefficients. In: Liang, Q., et al. (eds.) Springer Journals of Communications, Signal Processing, and Systems. LNEE, pp. 181\u2013189. Springer, New York (2012). doi:\n                  10.1007\/978-1-4614-5803-6_19"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-642-41939-3_40","volume-title":"Advances in Visual Computing","author":"SQ Saleh","year":"2013","unstructured":"Saleh, S.Q., Hussain, M., Muhammad, G., Bebis, G.: Evaluation of image forgery detection using multi-scale weber local descriptors. In: Bebis, G., et al. (eds.) ISVC 2013. LNCS, vol. 8034, pp. 416\u2013424. Springer, Heidelberg (2013). doi:\n                  10.1007\/978-3-642-41939-3_40"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1186\/1687-6180-2012-240","volume":"2012","author":"X Zhao","year":"2012","unstructured":"Zhao, X., Li, S., Wang, S., Li, J., Yang, K.: Optimal chroma-like channel design for passive color image splicing detection. Springer-EURASIP J. Adv. Signal Process. 2012, 240 (2012)","journal-title":"Springer-EURASIP J. Adv. Signal Process."},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Pan, X., Zhang, X., Lyu, S.: Exposing image splicing with inconsistent local noise variances. In: IEEE International Conference on Computational Photography, pp. 1\u201310 (2012)","DOI":"10.1109\/ICCPhot.2012.6215223"},{"issue":"2","key":"10_CR26","first-page":"78","volume":"67","author":"H Niu","year":"2016","unstructured":"Niu, H., Zhou, C., Wang, B., Zheng, X., Zhou, S.: Splicing model and hyper-chaotic system for image encryption. J. Electr. Eng. 67(2), 78\u201386 (2016)","journal-title":"J. Electr. Eng."},{"key":"10_CR27","unstructured":"Columbia Image Splicing Detection Evaluation Dataset. \n                  http:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/AuthSplicedDataSet\/AuthSplicedDataSet.htm\n                  \n                , Retrieved 06th February 2017"},{"issue":"5","key":"10_CR28","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara, P., Bianchi, T., De Rosa, A., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7(5), 1566\u20131577 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Trends and Techniques in Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57141-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T14:03:22Z","timestamp":1558447402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57141-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319571409","9783319571416"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57141-6_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"8 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 April 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.openpublish.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}