{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T09:18:43Z","timestamp":1775380723864,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,8,6]],"date-time":"2014-08-06T00:00:00Z","timestamp":1407283200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s10044-014-0396-4","type":"journal-article","created":{"date-parts":[[2014,8,5]],"date-time":"2014-08-05T16:01:38Z","timestamp":1407254498000},"page":"713-723","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Combining spatial and DCT based Markov features for enhanced blind detection of image splicing"],"prefix":"10.1007","volume":"18","author":[{"given":"E-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[]},{"given":"Muhammad Ali","family":"Qureshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,6]]},"reference":[{"issue":"3","key":"396_CR1","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Invest 10(3):226\u2013245","journal-title":"Digit Invest"},{"issue":"1","key":"396_CR2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/s10044-006-0026-x","volume":"9","author":"PVK Borges","year":"2006","unstructured":"Borges PVK, Mayer J (2006) Analysis of position based watermarking. Pattern Anal Appl 9(1):70\u201382","journal-title":"Pattern Anal Appl"},{"issue":"2","key":"396_CR3","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJ Burges","year":"1998","unstructured":"Burges CJ (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Discov 2(2):121\u2013167","journal-title":"Data Min Knowl Discov"},{"key":"396_CR4","unstructured":"Change CC, Lin CJ (2010) Libsvm a library for support vector machines. http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm . Accessed May 2013"},{"key":"396_CR5","doi-asserted-by":"crossref","unstructured":"Chen C, Shi YQ (2008) Jpeg image steganalysis utilizing both intrablock and interblock correlations. In: IEEE international symposium on circuits and systems (ISCAS), pp 3029\u20133032","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"396_CR6","doi-asserted-by":"crossref","DOI":"10.1117\/12.704321","volume-title":"Image splicing detection using 2-d phase congruency and statistical moments of characteristic function","author":"W Chen","year":"2007","unstructured":"Chen W, Shi YQ, Su W (2007) Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. Proceeding of SPIE, San Jose"},{"key":"396_CR7","doi-asserted-by":"crossref","unstructured":"Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan Kaufmann Publishers Inc. San Francisco, CA","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"396_CR8","doi-asserted-by":"crossref","unstructured":"Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other kernel-based learning methods. Cambridge university press, Cambridge","DOI":"10.1017\/CBO9780511801389"},{"key":"396_CR9","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T, Shi YQ (2009) Run-length and edge statistics based approach for image splicing detection. In: Kim H-J, Katzenbeisser S, Ho ATS (eds) Digital watermarking. Springer, Berlin, pp 76\u201387","DOI":"10.1007\/978-3-642-04438-0_7"},{"key":"396_CR10","unstructured":"Farid H (1999) Detecting digital forgeries using bispectral analysis. In: Technical report. ftp:\/\/publications.ai.mit.edu\/ai-publications\/pdf\/AIM-1657.pdf"},{"key":"396_CR11","doi-asserted-by":"crossref","unstructured":"Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: Computer vision and pattern recognition workshop (CVPRW03), vol 8, pp 94\u201394","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"396_CR12","doi-asserted-by":"crossref","unstructured":"Fu D, Shi YQ, Su W (2006) Detection of image splicing based on Hilbert\u2013Huang transform and moments of characteristic functions with wavelet decomposition. In: Shi YQ, Jeon B (eds) Digital watermarking. Springer, Berlin, pp 177\u2013187","DOI":"10.1007\/11922841_15"},{"issue":"1\u20133","key":"396_CR13","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46(1\u20133):389\u2013422","journal-title":"Mach Learn"},{"issue":"12","key":"396_CR14","doi-asserted-by":"crossref","first-page":"1591","DOI":"10.1016\/j.patrec.2011.05.013","volume":"32","author":"Z He","year":"2011","unstructured":"He Z, Sun W, Lu W, Lu H (2011) Digital image splicing detection based on approximate run length. Pattern Recogn Lett 32(12):1591\u20131597","journal-title":"Pattern Recogn Lett"},{"key":"396_CR15","doi-asserted-by":"crossref","unstructured":"He Z, Lu W, Sun W (2012) Improved run length based detection of digital image splicing. In: Digital forensics and watermarking, pp 349\u2013360","DOI":"10.1007\/978-3-642-32205-1_28"},{"issue":"4","key":"396_CR16","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst MA, Dumais S, Osman E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intell Syst Appl 13(4):18\u201328","journal-title":"IEEE Intell Syst Appl"},{"key":"396_CR17","unstructured":"Li L, Xue J, Wang X, Tian L (2013) A robust approach to detect digital forgeries by exploring correlation patterns. Pattern Anal Appl 1\u201315"},{"key":"396_CR18","first-page":"1169","volume":"2","author":"TT Ng","year":"2004","unstructured":"Ng TT, Chang SF (2004) A model for image splicing. Proc IEEE Int Conf Image Process 2:1169\u20131172","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"396_CR19","unstructured":"Ng TT, Chang SF, Sun Q (2004) Blind detection of photomontage using higher order statistics. In: Proceedings of international symposium on circuits and systems (ISCAS), vol 5, pp 688\u2013691"},{"key":"396_CR20","unstructured":"Ng TT, Chang SF, Sun Q (2004) A data set of authentic and spliced image blocks. In: ADVENT technical report, Columbia University, pp 203\u2013204"},{"key":"396_CR21","doi-asserted-by":"crossref","unstructured":"Qazi T, Hayat K, Khan S, Madani S, Khan I, Koodziej J, Li H, Lin W, Yow KC, Xu CZ (2013) Survey on blind image forgery detection. Image processing. IET 7(7):660\u2013670","DOI":"10.1049\/iet-ipr.2012.0388"},{"issue":"1","key":"396_CR22","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51(1):133\u2013162","journal-title":"Multimed Tools Appl"},{"key":"396_CR23","doi-asserted-by":"crossref","unstructured":"Shi YQ, Xuan G, Zou D, Gao J, Yang C, Zhang Z, Chai P, Chen W, Chen C (2005) Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In: IEEE international conference on multimedia and expo ICME","DOI":"10.1109\/ICME.2005.1521412"},{"key":"396_CR24","doi-asserted-by":"crossref","unstructured":"Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on multimedia and security, pp 51\u201362","DOI":"10.1145\/1288869.1288878"},{"key":"396_CR25","doi-asserted-by":"crossref","unstructured":"Zhao X, Wang S, Li S, Li J (2012) A comprehensive study on third order statistical features for image splicing detection. Digit Forensics Watermarking 243\u2013256","DOI":"10.1007\/978-3-642-32205-1_20"},{"issue":"12","key":"396_CR26","doi-asserted-by":"crossref","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"H Zhongwei","year":"2012","unstructured":"Zhongwei H, Lu Wei Sun W (2012) Digital image splicing detection based on markov features in DCT and DWT domain. Pattern Recogn 45(12):4292\u20134299","journal-title":"Pattern Recogn"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-014-0396-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-014-0396-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-014-0396-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T15:47:08Z","timestamp":1565711228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-014-0396-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,6]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["396"],"URL":"https:\/\/doi.org\/10.1007\/s10044-014-0396-4","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,6]]}}}