{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T13:33:06Z","timestamp":1751376786813,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T00:00:00Z","timestamp":1471824000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004055","name":"King Fahd University of Petroleum and Minerals","doi-asserted-by":"publisher","award":["RG1113-1&2"],"award-info":[{"award-number":["RG1113-1&2"]}],"id":[{"id":"10.13039\/501100004055","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11042-016-3855-7","type":"journal-article","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T03:42:13Z","timestamp":1471837333000},"page":"14535-14556","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Robust content authentication of gray and color images using lbp-dct markov-based features"],"prefix":"10.1007","volume":"76","author":[{"given":"El-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[]},{"given":"Muhammad A.","family":"Qureshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,22]]},"reference":[{"issue":"9","key":"3855_CR1","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1016\/j.image.2012.07.006","volume":"27","author":"M Barni","year":"2012","unstructured":"Barni M, Costanzo A (2012) A fuzzy approach to deal with uncertainty in image forensics. Signal Process Image Commun 27(9):998\u20131010","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"3855_CR2","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226\u2013245","journal-title":"Digit Investig"},{"issue":"2","key":"3855_CR3","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJ Burges","year":"1998","unstructured":"Burges CJ (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Disc 2(2):121\u2013167","journal-title":"Data Min Knowl Disc"},{"issue":"3","key":"3855_CR4","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.compeleceng.2009.12.003","volume":"36","author":"R Chamlawi","year":"2010","unstructured":"Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36(3):578\u2013584","journal-title":"Comput Electr Eng"},{"key":"3855_CR5","unstructured":"Change CC, Lin CJ (2010) Libsvm a library for support vector machines. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"3855_CR6","doi-asserted-by":"crossref","unstructured":"Chen C, Shi YQ (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. In: IEEE International Symposium on Circuits and Systems (ISCAS), pp 3029\u20133032","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"3855_CR7","doi-asserted-by":"crossref","unstructured":"Chen W, Shi YQ, Su W (2007) Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. In: Proceeding of SPIE San Jose, CA, USA","DOI":"10.1117\/12.704321"},{"key":"3855_CR8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801389","volume-title":"An introduction to support vector machines and other kernel-based learning methods","author":"N Cristianini","year":"2000","unstructured":"Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other kernel-based learning methods. Cambridge University Press, Cambridge"},{"key":"3855_CR9","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T, Shi YQ (2009). In: Kim H-J, Katzenbeisser S, Ho ATS (eds) Run-length and edge statistics based approach for image splicing detection. Digital Watermarking. Springer, Berlin, pp 76\u201387","DOI":"10.1007\/978-3-642-04438-0_7"},{"key":"3855_CR10","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) CASIA image tampering detection evaluation database. In: IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), pp 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"issue":"3","key":"3855_CR11","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1007\/s10044-014-0396-4","volume":"18","author":"ESM El-Alfy","year":"2015","unstructured":"El-Alfy ESM, Qureshi MA (2015) Combining spatial and dct based markov features for enhanced blind detection of image splicing. Pattern Anal Applic 18(3):713\u2013723","journal-title":"Pattern Anal Applic"},{"key":"3855_CR12","volume-title":"Detecting digital forgeries using bispectral analysis","author":"H Farid","year":"1999","unstructured":"Farid H (1999) Detecting digital forgeries using bispectral analysis. Technical report, Cambridge"},{"key":"3855_CR13","doi-asserted-by":"crossref","unstructured":"Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: Computer vision and pattern recognition workshop (CVPRW03), vol 8, pp 94\u201394","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"3855_CR14","unstructured":"Fu D, Shi YQ, Su W (2006). In: Shi YQ, Jeon B (eds) Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition Digital Watermarking. Springer, Berlin, pp 177\u2013187"},{"key":"3855_CR15","volume-title":"Digital image processing","author":"RC Gonzalez","year":"2008","unstructured":"Gonzalez RC, Woods RE (2008) Digital image processing, 3rd. Prentice-Hall, USA","edition":"3rd"},{"issue":"1-3","key":"3855_CR16","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46(1\u20133):389\u2013422","journal-title":"Mach Learn"},{"key":"3855_CR17","volume-title":"Data mining: Practical machine learning tools and techniques","author":"M Hall","year":"2011","unstructured":"Hall M, Witten I, Frank E (2011) Data mining: Practical machine learning tools and techniques. Kaufmann, Burlington"},{"issue":"12","key":"3855_CR18","doi-asserted-by":"crossref","first-page":"1591","DOI":"10.1016\/j.patrec.2011.05.013","volume":"32","author":"Z He","year":"2011","unstructured":"He Z, Sun W, Lu W, Lu H (2011) Digital image splicing detection based on approximate run length. Pattern Recogn Lett 32(12):1591\u20131597","journal-title":"Pattern Recogn Lett"},{"key":"3855_CR19","doi-asserted-by":"crossref","unstructured":"He Z, Lu W, Sun W (2012a) Improved run length based detection of digital image splicing. Digital Forensics and Watermarking 349\u2013360","DOI":"10.1007\/978-3-642-32205-1_28"},{"issue":"12","key":"3855_CR20","doi-asserted-by":"crossref","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He Z, Lu W, Sun W, Huang J (2012b) Digital image splicing detection based on markov features in DCT and DWT domain. Pattern Recogn 45(12):4292\u20134299","journal-title":"Pattern Recogn"},{"issue":"4","key":"3855_CR21","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst MA, Dumais S, Osman E, Platt J, Scholkopf B (1998) Support vector machines. IEEE Intelligent Syst Appl 13(4):18\u201328","journal-title":"IEEE Intelligent Syst Appl"},{"issue":"11","key":"3855_CR22","doi-asserted-by":"crossref","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"TY Lee","year":"2008","unstructured":"Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497\u20133506","journal-title":"Pattern Recogn"},{"issue":"6","key":"3855_CR23","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1016\/j.compeleceng.2013.11.034","volume":"40","author":"L Li","year":"2014","unstructured":"Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951\u20131962","journal-title":"Comput Electr Eng"},{"issue":"34","key":"3855_CR24","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.diin.2011.06.004","volume":"8","author":"SD Mahalakshmi","year":"2012","unstructured":"Mahalakshmi SD, Vijayalakshmi K, Priyadharsini S (2012) Digital image forgery detection and estimation by exploring basic image manipulations. Digit Investig 8(34):215\u2013225","journal-title":"Digit Investig"},{"issue":"6","key":"3855_CR25","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.image.2010.05.003","volume":"25","author":"B Mahdian","year":"2010","unstructured":"Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25(6):389\u2013399","journal-title":"Signal Process Image Commun"},{"key":"3855_CR26","unstructured":"Meeker M (2014) Internet trends. http:\/\/www.kpcb.com\/internet-trends"},{"key":"3855_CR27","unstructured":"Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2013) Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications 1\u201311"},{"key":"3855_CR28","unstructured":"Ng TT, Chang SF (2004) A model for image splicing. In: Proceedings of IEEE international conference on image processing, vol 2, pp 1169\u20131172"},{"key":"3855_CR29","unstructured":"Ng TT, Chang SF, Sun Q (2004a) Blind detection of photomontage using higher order statistics. In: Proceedings of International Symposium on Circuits and Systems (ISCAS), vol 5, pp 688\u2013691"},{"key":"3855_CR30","unstructured":"Ng TT, Chang SF, Sun Q (2004b) A data set of authentic and spliced image blocks. Columbia University, ADVENT Technical Report 203\u2013204"},{"issue":"7","key":"3855_CR31","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971\u2013987","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3855_CR32","volume-title":"A technical introduction to digital video","author":"CA Poynton","year":"1996","unstructured":"Poynton CA (1996) A technical introduction to digital video. John Wiley & Sons, New Jersey"},{"issue":"3","key":"3855_CR33","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1016\/j.compeleceng.2014.01.006","volume":"40","author":"I Prathap","year":"2014","unstructured":"Prathap I, Natarajan V, Anitha R (2014) Hybrid robust watermarking for color images. Comput Electr Eng 40(3):920\u2013930","journal-title":"Comput Electr Eng"},{"issue":"7","key":"3855_CR34","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1049\/iet-ipr.2012.0388","volume":"7","author":"T Qazi","year":"2013","unstructured":"Qazi T, Hayat K, Khan S, Madani S, Khan I, Kolodziej J, Li H, Lin W, Yow KC, Xu CZ (2013) Survey on blind image forgery detection. IET Image Process 7(7):660\u2013670","journal-title":"IET Image Process"},{"issue":"1","key":"3855_CR35","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimedia Tools Appl 51(1):133\u2013162","journal-title":"Multimedia Tools Appl"},{"key":"3855_CR36","doi-asserted-by":"crossref","unstructured":"Shi YQ, Xuan G, Zou D, Gao J, Yang C, Zhang Z, Chai P, Chen W, Chen C (2005) Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image and neural network. In: IEEE International Conference on Multimedia and Expo ICME","DOI":"10.1109\/ICME.2005.1521412"},{"key":"3855_CR37","doi-asserted-by":"crossref","unstructured":"Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th Workshop on Multimedia and Security, pp 51\u201362","DOI":"10.1145\/1288869.1288878"},{"key":"3855_CR38","doi-asserted-by":"crossref","unstructured":"Wang W, Dong J, Tan T (2009) Effective image splicing detection based on image chroma. In: 16th IEEE International Conference on Image Processing (ICIP), pp 1257\u20131260","DOI":"10.1109\/ICIP.2009.5413549"},{"key":"3855_CR39","doi-asserted-by":"crossref","unstructured":"Wang W, Dong J, Tan T (2010) Image tampering detection based on stationary distribution of Markov chain. In: 17th IEEE International Conference on Image Processing (ICIP), pp 2101\u20132104","DOI":"10.1109\/ICIP.2010.5652660"},{"key":"3855_CR40","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhao C, Pi Y, Li S (2012) Revealing image splicing forgery using local binary patterns of DCT coefficients. In: Communications, Signal Processing, and Systems. Springer, pp 181\u2013189","DOI":"10.1007\/978-1-4614-5803-6_19"},{"key":"3855_CR41","doi-asserted-by":"crossref","unstructured":"Zhao X, Li J, Li S, Wang S (2011) Detecting digital image splicing in chroma spaces. In: Digital Watermarking. Springer, pp 12\u201322","DOI":"10.1007\/978-3-642-18405-5_2"},{"key":"3855_CR42","doi-asserted-by":"crossref","unstructured":"Zhao X, Wang S, Li S, Li J (2012) A comprehensive study on third order statistical features for image splicing detection. Digital Forensics and Watermarking 243\u2013256","DOI":"10.1007\/978-3-642-32205-1_20"},{"key":"3855_CR43","unstructured":"Zhu Y, Shen X, Chen H (2015) Copy-move forgery detection based on scaled orb. Multimedia Tools and Applications 1\u201313"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3855-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3855-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3855-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3855-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,6]],"date-time":"2017-06-06T16:00:35Z","timestamp":1496764835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3855-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,22]]},"references-count":43,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3855"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3855-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,8,22]]}}}