{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:02:23Z","timestamp":1760709743271,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811318092"},{"type":"electronic","value":"9789811318108"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-1810-8_29","type":"book-chapter","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T12:04:59Z","timestamp":1540901099000},"page":"290-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Impact of Picture Splicing Operation for Picture Forgery Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8104-8994","authenticated-orcid":false,"given":"Rachna","family":"Mehta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4467-0503","authenticated-orcid":false,"given":"Navneet","family":"Agrawal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,31]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1016\/j.procs.2018.05.143","volume":"132","author":"R Mehta","year":"2018","unstructured":"Mehta, R., Agarwal, N.: Splicing\u00a0detection for combined DCT, DWT and spatial\u00a0markov-features using ensemble classifier. Procedia Comput. Sci. 132, 1695\u20131705 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid, H.: A survey of picture forgery detection. IEEE Signal Process. Mag. 26, 6\u201325 (2009)","journal-title":"IEEE Signal Process. Mag."},{"issue":"6","key":"29_CR3","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.image.2010.05.003","volume":"25","author":"B Mahdian","year":"2010","unstructured":"Mahdian, B., Saic, S.: A bibliography on blind methods for identifying Picture forgery. Signal Process. Picture Commun. 25(6), 389\u2013399 (2010)","journal-title":"Signal Process. Picture Commun."},{"key":"29_CR4","first-page":"38","volume":"2411","author":"H Farid","year":"2003","unstructured":"Farid, H.: A picture tells a thousand lies. New Sci. 2411, 38\u201341 (2003)","journal-title":"New Sci."},{"key":"29_CR5","unstructured":"Ng, T.T., Chang, S.F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS). pp. 688\u2013691 (2004)"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/11922841_15","volume-title":"Digital Watermarking","author":"D Fu","year":"2006","unstructured":"Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 177\u2013187. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11922841_15"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Chen, W., Shi, Y.Q., Su, W.: Picture splicing detection using 2-D phase congruency and statistical moments of characteristic function. In: SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents. pp. 65050R.1\u201365050R.8 (2007)","DOI":"10.1117\/12.704321"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A natural Picture model approach to splicing detection. In: Proceedings of ACM Multimedia and Security (MM&Sec), pp. 51\u201362 (2007)","DOI":"10.1145\/1288869.1288878"},{"issue":"12","key":"29_CR9","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/j.patrec.2011.05.013","volume":"32","author":"Z He","year":"2011","unstructured":"He, Z., Sun, W., Lu, W., Lu, H.: Digital picture splicing detection based on approximate run length. Pattern Recognit. Lett. 32(12), 591\u20131597 (2011)","journal-title":"Pattern Recognit. Lett."},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-32205-1_28","volume-title":"Digital Forensics and Watermarking","author":"Z He","year":"2012","unstructured":"He, Z., Lu, W., Sun, W.: Improved run length based detection of digital image splicing. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 349\u2013360. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32205-1_28"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/606570","volume":"2014","author":"Zahra Moghaddasi","year":"2014","unstructured":"Moghaddasi, Z., Jalab, H.A., Noor, R.: Improving RLRN picture splicing detection with the use of PCA and kernel PCA. Sci. World J. (2014). Article ID 606570, https:\/\/doi.org\/10.1155\/2014\/606570","journal-title":"The Scientific World Journal"},{"issue":"12","key":"29_CR12","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He, Z., Lu, W., Sun, W., Huang, J.: Digital Picture splicing detection based on Markov features in DCT and DWT domain. Pattern Recog. 45(12), 4292\u20134299 (2012)","journal-title":"Pattern Recog."},{"key":"29_CR13","unstructured":"Ng, T.T., Chang, S.F.: A data set of authentic and spliced Picture blocks. Technical report 203\u20132004, Columbia University (2004). http:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/"},{"issue":"7","key":"29_CR14","first-page":"1","volume":"2014","author":"B Su","year":"2014","unstructured":"Su, B., Yuan, Q., Wang, S., Zhao, C., Li, S.: Enhanced state selection Markov model for Picture splicing detection. Eurasip. J. Wirel. Comm. 2014(7), 1\u201310 (2014)","journal-title":"Eurasip. J. Wirel. Comm."},{"issue":"3","key":"29_CR15","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s10044-014-0396-4","volume":"18","author":"M El-Alfy","year":"2015","unstructured":"El-Alfy, M., Qureshi, M.A.: Combining spatial and DCT based Markov features for enhanced blind detection of Picture splicing. Pattern Anal. Appl. 18(3), 713\u2013723 (2015)","journal-title":"Pattern Anal. Appl."},{"issue":"2","key":"29_CR16","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TCSVT.2014.2347513","volume":"25","author":"X Zhao","year":"2015","unstructured":"Zhao, X., Wang, S., Li, S., Li, J.: Passive Picture-splicing detection by a 2-D noncausal Markov model. IEEE Trans. Circuits Syst. Video Technol. 25(2), 185\u2013199 (2015)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/606570","volume":"2014","author":"Zahra Moghaddasi","year":"2014","unstructured":"Moghaddasi, Z., Jalab, H.A., Md Noor, R.: Improving RLRN picture splicing detection with the use of PCA and kernel PCA, Sci. World J. (2014). Article ID 606570, https:\/\/doi.org\/10.1155\/2014\/606570","journal-title":"The Scientific World Journal"},{"issue":"4","key":"29_CR18","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","volume":"25","author":"G Muhammad","year":"2014","unstructured":"Muhammad, G., Al-Hammadi, M.H., Hussian, M., Bebis, G.: Picture forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 25(4), 985\u2013995 (2014)","journal-title":"Mach. Vis. Appl."},{"issue":"04","key":"29_CR19","doi-asserted-by":"publisher","first-page":"1540016","DOI":"10.1142\/s0218213015400163","volume":"24","author":"Muhammad Hussain","year":"2015","unstructured":"Hussain, M., Qasem, S., Bebis, G., Muhammad, G., Aboalsamh, H., Mathkour, H.: Evaluation of picture forgery detection using multi-scale weber local descriptors. Int. J. Artif. Intell. Tools 24(4), 1540016 (2015). https:\/\/doi.org\/10.1142\/s0218213015400163","journal-title":"International Journal on Artificial Intelligence Tools"},{"issue":"2","key":"29_CR20","doi-asserted-by":"publisher","first-page":"023031","DOI":"10.1117\/1.JEI.25.2.023031","volume":"25","author":"JG Han","year":"2016","unstructured":"Han, J.G., Park, T.H., Moon, Y.H., Eom, I.K.: Efficient Markov feature extraction method for Picture splicing detection using maximization and threshold expansion. J. Electron. Imaging 25(2), 023031 (2016)","journal-title":"J. Electron. Imaging"},{"key":"29_CR21","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.1016\/j.dsp.2010.02.003","volume":"20","author":"A Nissar","year":"2010","unstructured":"Nissar, A., Mir, A.H.: Classification of steganalysis techniques: a study. Digit. Signal Process. 20, 1758\u20131770 (2010)","journal-title":"Digit. Signal Process."},{"issue":"3","key":"29_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"Chih-Chung Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM\u2014a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2 (2011). https:\/\/doi.org\/10.1145\/1961189.1961199","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"issue":"7","key":"29_CR23","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1162\/neco.1997.9.7.1493","volume":"9","author":"N Kambhatla","year":"1997","unstructured":"Kambhatla, N., Leen, T.K.: Dimension reduction by local principal component analysis. Neural Comput. 9(7), 1493\u20131516 (1997)","journal-title":"Neural Comput."},{"key":"29_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45014-9_1","volume-title":"Multiple Classifier Systems","author":"TG Dietterich","year":"2000","unstructured":"Dietterich, T.G.: Ensemble methods in machine learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol. 1857, pp. 1\u201315. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45014-9_1"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Kodovsk\u00fd, J., Fridrich, J.: Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In: IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics, USA, California, pp. 78800L\u201378800L (2011)","DOI":"10.1117\/12.872279"},{"key":"29_CR26","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7, 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"29_CR27","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley (2012)"},{"key":"29_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7","volume-title":"Ensemble learning, Ensemble Machine Learning","author":"R Polikar","year":"2012","unstructured":"Polikar, R.: Ensemble learning, Ensemble Machine Learning. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4419-9326-7"},{"key":"29_CR29","first-page":"509","volume":"8","author":"H Tao","year":"2013","unstructured":"Tao, H., Ma, X., Qiao, M.: Subspace selective ensemble algorithm based on feature clustering. J. Comput. 8, 509\u2013516 (2013)","journal-title":"J. Comput."},{"key":"29_CR30","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital Pictures. Inf. Forensics Secur. 7, 868\u2013882 (2012)","journal-title":"Inf. Forensics Secur."},{"key":"29_CR31","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of the 9th Workshop on Multimedia and Security, pp 51\u201362 (2007)","DOI":"10.1145\/1288869.1288878"},{"key":"29_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-32205-1_20","volume-title":"Digital Forensics and Watermarking","author":"X Zhao","year":"2012","unstructured":"Zhao, X., Wang, S., Li, S., Li, J.: A comprehensive study on third order statistical features for image splicing detection. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 243\u2013256. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32205-1_20"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1810-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T17:32:20Z","timestamp":1572370340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1810-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811318092","9789811318108"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1810-8_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dehradun","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 April 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 April 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icacds.com","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}