{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T02:04:03Z","timestamp":1775354643323,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T00:00:00Z","timestamp":1479254400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s00521-016-2663-3","type":"journal-article","created":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T15:00:24Z","timestamp":1479308424000},"page":"183-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":121,"title":["Detection of copy-move image forgery based on discrete cosine transform"],"prefix":"10.1007","volume":"30","author":[{"given":"Mohammed Hazim","family":"Alkawaz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ghazali","family":"Sulong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tanzila","family":"Saba","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amjad","family":"Rehman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,11,16]]},"reference":[{"key":"2663_CR1","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1046\/j.1525-1497.2000.05129.x","volume":"15","author":"LE Pinsky","year":"2000","unstructured":"Pinsky LE, Wipf JE (2000) A picture is worth a thousand words. J Gen Int Med 15:805\u2013810","journal-title":"J Gen Int Med"},{"issue":"3","key":"2663_CR2","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1080\/02564602.2014.906861","volume":"31","author":"A Norouzi","year":"2014","unstructured":"Norouzi A, Rahim MSM, Altameem A, Saba T, Rada AE, Rehman A, Uddin M (2014) Medical image segmentation methods, algorithms, and applications. IETE Tech Rev 31(3):199\u2013213. doi: 10.1080\/02564602.2014.906861","journal-title":"IETE Tech Rev"},{"issue":"6","key":"2663_CR3","doi-asserted-by":"publisher","first-page":"2823","DOI":"10.12785\/amis\/080618","volume":"8","author":"M Mundher","year":"2014","unstructured":"Mundher M, Muhamad D, Rehman A, Saba T, Kausar F (2014) Digital watermarking for images security using discrete slant let transform. Appl Math Inf Sci 8(6):2823\u20132830. doi: 10.12785\/amis\/080618","journal-title":"Appl Math Inf Sci"},{"key":"2663_CR4","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1086\/671052","volume":"40","author":"RW Belk","year":"2013","unstructured":"Belk RW (2013) Extended self in a digital world. J Consum Res 40:477\u2013500","journal-title":"J Consum Res"},{"issue":"7","key":"2663_CR5","first-page":"1","volume":"7","author":"T Saba","year":"2011","unstructured":"Saba T, Rehman A, Sulong G (2011) Cursive script segmentation with neural confidence. Int J Innov Comput Inf Control (IJICIC) 7(7):1\u201310","journal-title":"Int J Innov Comput Inf Control (IJICIC)"},{"issue":"3","key":"2663_CR6","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s10462-012-9319-1","volume":"41","author":"A Rehman","year":"2014","unstructured":"Rehman A, Saba T (2014) Features extraction for soccer video semantic analysis: current achievements and remaining issues. Artif Intell Rev 41(3):451\u2013461. doi: 10.1007\/s10462-012-9319-1","journal-title":"Artif Intell Rev"},{"key":"2663_CR7","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1111\/1556-4029.12511","volume":"59","author":"NM Karie","year":"2014","unstructured":"Karie NM, Venter HS (2014) Toward a general ontology for digital forensic disciplines. J Forensic Sci 59:1231\u20131241","journal-title":"J Forensic Sci"},{"key":"2663_CR8","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"231","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284\u2013295","journal-title":"Forensic Sci Int"},{"issue":"4","key":"2663_CR9","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10462-011-9229-7","volume":"37","author":"A Rehman","year":"2012","unstructured":"Rehman A, Saba T (2012) Off-line cursive script recognition: current advances, comparisons and remaining problems. Artif Intell Rev 37(4):261\u2013288. doi: 10.1007\/s10462-011-9229-7","journal-title":"Artif Intell Rev"},{"key":"2663_CR10","doi-asserted-by":"crossref","unstructured":"Anand V, Hashmi MF, Keskar AG (2014) A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and sift methods. In: Intelligent information and database systems. Lecture Notes in Computer Science, vol 8397. Springer, pp 530\u2013542","DOI":"10.1007\/978-3-319-05476-6_54"},{"issue":"1","key":"2663_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1179\/1743131X13Y.0000000063","volume":"62","author":"ZF Muhsin","year":"2014","unstructured":"Muhsin ZF, Rehman A, Altameem A, Saba T, Uddin M (2014) Improved quadtree image segmentation approach to region information. Imaging Sci J 62(1):56\u201362. doi: 10.1179\/1743131X13Y.0000000063","journal-title":"Imaging Sci J"},{"key":"2663_CR12","unstructured":"Zhao Y, Sutardja A, Ramadan O (2015) Digital image manipulation forensic. Technical Report No. UCB\/EECS-2015-125, Electrical Engineering and Computer Sciences, University of California at Berkeley"},{"key":"2663_CR13","unstructured":"Sutardja A, Ramadan O, Zhao Y (2015) Forensic methods for detecting image manipulation-copy move. Technical Report No. UCB\/EECS-2015-84, Electrical Engineering and Computer Sciences, University of California at Berkeley"},{"key":"2663_CR14","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1080\/02564602.2015.1027307","volume":"32","author":"S Yazdani","year":"2015","unstructured":"Yazdani S et al (2015) Image segmentation methods and applications in MRI brain images. IETE Tech Rev 32:413\u2013427","journal-title":"IETE Tech Rev"},{"key":"2663_CR15","unstructured":"Saba T, Rehman A (2012) Machine learning and script recognition. Lambert Academic publisher, pp 39\u201345. ISBN-13: 978-3659111709"},{"issue":"6","key":"2663_CR16","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1007\/s00521-014-1618-9","volume":"25","author":"T Saba","year":"2014","unstructured":"Saba T, Rehman A, Altameem A, Uddin M (2014) Annotated comparisons of proposed preprocessing techniques for script recognition. Neural Comput Appl 25(6):1337\u20131347. doi: 10.1007\/s00521-014-1618-9","journal-title":"Neural Comput Appl"},{"key":"2663_CR17","unstructured":"Granty REJ, Aditya T, Madhu SS (2010) Survey on passive methods of image tampering detection. In: Communication and computational intelligence (INCOCCI), 2010 international conference on, pp 431\u2013436"},{"key":"2663_CR18","doi-asserted-by":"crossref","unstructured":"Mire AV et al (2014) Digital forensic of JPEG images. In: Signal and image processing (ICSIP), 2014 fifth international conference on 2014, pp 131\u2013136","DOI":"10.1109\/ICSIP.2014.26"},{"key":"2663_CR19","doi-asserted-by":"publisher","unstructured":"Rehman A, Saba T (2014) Evaluation of artificial intelligent techniques to secure information in enterprises. Artif Intell Rev 42(4):1029\u20131044. doi: 10.1007\/s10462-012-9372-9","DOI":"10.1007\/s10462-012-9372-9"},{"key":"2663_CR20","doi-asserted-by":"publisher","unstructured":"Saba T, Rehman A, Al-Dhelaand A, Al-Rodhaand M (2014) Evaluation of current documents image denoising techniques: a comparative study. Appl Artif Intell 28(9):879\u2013887. doi: 10.1080\/08839514.2014.954344","DOI":"10.1080\/08839514.2014.954344"},{"issue":"5","key":"2663_CR21","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1080\/02564602.2014.961576","volume":"31","author":"S Joudaki","year":"2014","unstructured":"Joudaki S, Mohamad D, Saba T, Rehman A, Al-Rodhaan M, Al-Dhelaan A (2014) Vision-based sign language classification: a directional review. IETE Tech Rev 31(5):383\u2013391. doi: 10.1080\/02564602.2014.961576","journal-title":"IETE Tech Rev"},{"key":"2663_CR22","doi-asserted-by":"publisher","unstructured":"Fadhil MS, Alkawaz MH, Rehman A, Saba T (2016) Writers identification based on multiple windows features mining. 3D Res 7(1):1\u20136. doi: 10.1007\/s13319-016-0087-6","DOI":"10.1007\/s13319-016-0087-6"},{"key":"2663_CR23","doi-asserted-by":"crossref","unstructured":"Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: Acoustics, speech and signal processing, 2009. ICASSP 2009. IEEE international conference on 2009, pp 1053\u20131056","DOI":"10.1109\/ICASSP.2009.4959768"},{"issue":"2","key":"2663_CR24","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1515\/jisys-2013-0010","volume":"22","author":"K Meethongjan","year":"2013","unstructured":"Meethongjan K, Dzulkifli M, Rehman A, Altameem A, Saba T (2013) An intelligent fused approach for face recognition. J Intell Syst 22(2):197\u2013212. doi: 10.1515\/jisys-2013-0010","journal-title":"J Intell Syst"},{"key":"2663_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13634-015-0214-1","volume":"32","author":"Z Al-Ameen","year":"2015","unstructured":"Al-Ameen Z, Sulong G, Rehman A, Al-Dhelaan A, Saba T, Al-Rodhaan M (2015) An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization. EURASIP J Adv Signal Process 32:1\u201312. doi: 10.1186\/s13634-015-0214-1","journal-title":"EURASIP J Adv Signal Process"},{"key":"2663_CR26","doi-asserted-by":"publisher","DOI":"10.1080\/21681163.2016.1178600","author":"AH Basori","year":"2016","unstructured":"Basori AH, Alkawaz MH, Saba T, Rehman A (2016) An overview of interactive wet cloth simulation in virtual reality and serious games. Comput Methods Biomech Biomed Eng Imaging Vis. doi: 10.1080\/21681163.2016.1178600","journal-title":"Comput Methods Biomech Biomed Eng Imaging Vis"},{"key":"2663_CR27","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.image.2010.05.003","volume":"25","author":"B Mahdian","year":"2010","unstructured":"Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25:389\u2013399","journal-title":"Signal Process Image Commun"},{"issue":"9","key":"2663_CR28","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1080\/08839514.2014.954344","volume":"28","author":"T Saba","year":"2014","unstructured":"Saba T, Rehman A, Al-Dhelaan A, Al-Rodhaan M (2014) Evaluation of current documents image denoising techniques: a comparative study. Appl Artif Intell 28(9):879\u2013887. doi: 10.1080\/08839514.2014.954344","journal-title":"Appl Artif Intell"},{"key":"2663_CR29","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching. Inf Forensics Secur IEEE Trans 5:857\u2013867","journal-title":"Inf Forensics Secur IEEE Trans"},{"issue":"4","key":"2663_CR30","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1515\/jisys-2014-0007","volume":"23","author":"AM Ahmad","year":"2014","unstructured":"Ahmad AM, Sulong G, Rehman A, Alkawaz MH, Saba T (2014) Data hiding based on improved exploiting modification direction method and Huffman coding. J Intell Syst 23(4):451\u2013459. doi: 10.1515\/jisys-2014-0007","journal-title":"J Intell Syst"},{"key":"2663_CR31","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I et al (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. Inf Forensics Secur IEEE Trans 6:1099\u20131110","journal-title":"Inf Forensics Secur IEEE Trans"},{"key":"2663_CR32","unstructured":"Boato G, Natale F, Zontone P (2010) How digital forensics may help assessing the perceptual impact of image formation and manipulation. In: Proceedings of fifth international workshop on video processing and quality metrics for consumer electronics\u2013VPQM, 2010"},{"key":"2663_CR33","doi-asserted-by":"publisher","unstructured":"Nodehi A, Sulong G, Al-Rodhaan M, Al-Dhelaan A, Rehman A, Saba T (2014) Intelligent fuzzy approach for fast fractal image compression. EURASIP J Adv Signal Process. doi: 10.1186\/1687-6180-2014-112","DOI":"10.1186\/1687-6180-2014-112"},{"key":"2663_CR34","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding\u2014a survey. Proc IEEE 87:1062\u20131078","journal-title":"Proc IEEE"},{"key":"2663_CR35","first-page":"105","volume":"2010","author":"V Christlein","year":"2010","unstructured":"Christlein V, Riess C, Angelopoulou E (2010) A study on features for the detection of copy-move forgeries. Sicherheit 2010:105\u2013116","journal-title":"Sicherheit"},{"key":"2663_CR36","doi-asserted-by":"crossref","unstructured":"Lu W, Wu M (2010) Multimedia forensic hash based on visual words. In: Image processing (ICIP), 2010 17th IEEE international conference on 2010, pp 989\u2013992","DOI":"10.1109\/ICIP.2010.5650613"},{"key":"2663_CR37","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1080\/02564602.2015.1042927","volume":"32","author":"VS Verma","year":"2015","unstructured":"Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32:479\u2013496","journal-title":"IETE Tech Rev"},{"key":"2663_CR38","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V et al (2012) An evaluation of popular copy-move forgery detection approaches. Inf Forensics Secur IEEE Trans 7:1841\u20131854","journal-title":"Inf Forensics Secur IEEE Trans"},{"key":"2663_CR39","doi-asserted-by":"crossref","unstructured":"Sunil K, Jagan D, Shaktidev M (2014) DCT-PCA based method for copy-move forgery detection. In: ICT and critical infrastructure: proceedings of the 48th annual convention of computer society of India, vol II, pp 577\u2013583","DOI":"10.1007\/978-3-319-03095-1_62"},{"key":"2663_CR40","doi-asserted-by":"crossref","unstructured":"Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction with CVPR), 2003","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"2663_CR41","doi-asserted-by":"crossref","unstructured":"Khan S, Kulkarni A (2010) Robust method for detection of copy-move forgery in digital images. In: Signal and image processing (ICSIP), 2010 international conference on 2010, pp 69\u201373","DOI":"10.1109\/ICSIP.2010.5697444"},{"key":"2663_CR42","doi-asserted-by":"crossref","unstructured":"Sridevi M, Mala C, Sanyam S (2012) Comparative study of image forgery and copy-move techniques. In: Advances in computer science, engineering and applications. Advances in Intelligent and Soft Computing, vol 166. Springer, pp 715\u2013723","DOI":"10.1007\/978-3-642-30157-5_71"},{"key":"2663_CR43","unstructured":"Fridrich AJ, Soukal BD, Luk\u00e1\u0161 AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, 2003"},{"key":"2663_CR44","doi-asserted-by":"publisher","unstructured":"Mahmood T, Nawaz T, Irtaza A, Ashraf R, Shah M, Mahmood MT (2016) Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images. Math Probl Eng 2016(2016) ID 8713202, doi: 10.1155\/2016\/8713202","DOI":"10.1155\/2016\/8713202"},{"key":"2663_CR45","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan X-C, Bi X-L (2015) Image forgery detection using adaptive over segmentation and feature point matching. Inf Forensics Secur IEEE Trans 10:1705\u20131716","journal-title":"Inf Forensics Secur IEEE Trans"},{"key":"2663_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sigpro.2015.10.027","volume":"121","author":"CP Yan","year":"2016","unstructured":"Yan CP, Pun C-M, Yuan X-C (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1\u201316","journal-title":"Signal Process"},{"key":"2663_CR47","doi-asserted-by":"crossref","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1-3):33\u201334","DOI":"10.1016\/j.forsciint.2011.07.015"},{"key":"2663_CR48","doi-asserted-by":"publisher","unstructured":"Yavuz F, Bal A, Cukur H (2016) An effective detection algorithm for region duplication forgery in digital images. Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O. doi: 10.1117\/12.2223732","DOI":"10.1117\/12.2223732"},{"key":"2663_CR49","doi-asserted-by":"crossref","unstructured":"Zampoglou M, Papadopoulos S, Kompatsiaris Y (2015) Detecting image splicing in the wild (WEB). In: Multimedia and expo workshops (ICMEW), 2015 IEEE international conference on 2015, pp 1\u20136","DOI":"10.1109\/ICMEW.2015.7169839"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-016-2663-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2663-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2663-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T16:47:05Z","timestamp":1568566025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-016-2663-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,16]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["2663"],"URL":"https:\/\/doi.org\/10.1007\/s00521-016-2663-3","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,16]]}}}