{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:23:32Z","timestamp":1772828612264,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T00:00:00Z","timestamp":1528156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T00:00:00Z","timestamp":1528156800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11042-018-6230-z","type":"journal-article","created":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T12:20:10Z","timestamp":1528201210000},"page":"31239-31260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Digital image splicing detection based on Markov features in block DWT domain"],"prefix":"10.1007","volume":"77","author":[{"given":"Qingbo","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5977-4559","authenticated-orcid":false,"given":"Ruxin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guoqiang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,5]]},"reference":[{"issue":"3","key":"6230_CR1","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226\u2013245","journal-title":"Digit Investig"},{"key":"6230_CR2","unstructured":"Chang CC, Lin CJ (2010) LIBSVM \u2013 a library for support vector machines. http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm"},{"issue":"1","key":"6230_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.4018\/jdcf.2012010104","volume":"4","author":"L Chen","year":"2012","unstructured":"Chen L, Lu W, Ni J (2012) An image region description method based on step sector statistics and its application in image copy-rotate\/flip-move forgery detection. Int J Digit Crime and Forensics 4(1):49\u201362","journal-title":"Int J Digit Crime and Forensics"},{"issue":"3","key":"6230_CR4","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244\u2013254","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"6230_CR5","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1109\/30.920468","volume":"46","author":"C Christopoulos","year":"2000","unstructured":"Christopoulos C, Skodras A, Ebrahimi T (2000) The JPEG2000 still image coding system: An overview. IEEE Trans Consum Electron 46(4):1103\u20131127","journal-title":"IEEE Trans Consum Electron"},{"key":"6230_CR6","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Gragnaniello D, Verdoliva L (2014) Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques. In: IEEE international conference on image processing (ICIP), pp 5297\u20135301","DOI":"10.1109\/ICIP.2014.7026073"},{"key":"6230_CR7","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Gragnaniello D, Verdoliva L (2014) Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques. In: IEEE international conference on image processing (ICIP), pp 5302\u20135306","DOI":"10.1109\/ICIP.2014.7026073"},{"key":"6230_CR8","unstructured":"Elwin JGR, Aditya TS, Shankar SM (2010) Survey on passive methods of image tampering detection. In: International conference on communication and computational intelligence (INCOCCI), vol 7, pp 431\u2013436"},{"key":"6230_CR9","doi-asserted-by":"crossref","unstructured":"Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: Computer vision and pattern recognition workshop, pp 94\u201394","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"6230_CR10","doi-asserted-by":"crossref","unstructured":"Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: International conference on computer vision and pattern recognition workshop, pp 1\u20138. Madison, Wisconsin, USA","DOI":"10.1109\/CVPRW.2003.10093"},{"issue":"3","key":"6230_CR11","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1109\/TIP.2017.2652730","volume":"26","author":"Y Guo","year":"2017","unstructured":"Guo Y, Ding G, Liu L, Han J, Shao L (2017) Learning to hash with optimized anchor embedding for scalable retrieval. IEEE Trans Image Process 26 (3):1344\u20131354","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"6230_CR12","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/TIP.2017.2766445","volume":"27","author":"Y Guo","year":"2018","unstructured":"Guo Y, Ding G, Han J (2018) Robust quantization for general similarity search. IEEE Trans Image Process 27(2):949\u2013963","journal-title":"IEEE Trans Image Process"},{"key":"6230_CR13","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46:389\u2013422","journal-title":"Mach Learn"},{"key":"6230_CR14","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.eswa.2017.09.010","volume":"91","author":"KS Gyamfi","year":"2018","unstructured":"Gyamfi KS, Brusey J, Hunt A, Gaura E (2018) Linear dimensionality reduction for classification via a sequential bayes error minimisation with an application to flow meter diagnostics. Expert Syst Appl 91:252\u2013262","journal-title":"Expert Syst Appl"},{"issue":"12","key":"6230_CR15","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in DCT and DWT domain. Pattern Recogn 45(12):4292\u20134299","journal-title":"Pattern Recogn"},{"key":"6230_CR16","unstructured":"Hsu CW, Chang CC, Lin CJ (2010) A practical guide to support vector classification. Department of Computer Science, National Taiwan University. http:\/\/www.csie.ntu.edu.tw\/cjlin\/papers\/guide\/guide.pdf"},{"issue":"2","key":"6230_CR17","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital. IEEE Trans Inf Forensics Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6230_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.neucom.2016.04.068","volume":"228","author":"C Li","year":"2017","unstructured":"Li C, Ma Q, Xiao L, Li M, Zhang A (2017) Image splicing detection based on markov features in qdct domain. Neurocomputing 228:29\u201336","journal-title":"Neurocomputing"},{"key":"6230_CR19","unstructured":"Li J, Najmi A, Gray R (2000) Image classification by a two dimensional hidden markov model. In: IEEE transactions on signal processing, pp 517\u2013533"},{"key":"6230_CR20","unstructured":"Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimedia Tools and Applications, pp 1\u201315"},{"issue":"1","key":"6230_CR21","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11390-017-1764-5","volume":"33","author":"K Li","year":"2018","unstructured":"Li K, He F, Yu H (2018) Robust visual tracking based on convolutional features with illumination and occlusion handing. J Comput Sci Technol 33(1):223\u2013236","journal-title":"J Comput Sci Technol"},{"issue":"3","key":"6230_CR22","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/s11766-017-3466-8","volume":"32","author":"K Li","year":"2017","unstructured":"Li K, He F, Yu H, Chen X (2017) A correlative classifiers approach based on particle filter and sample set for tracking occluded target. Appl Math-A J Chin Univ 32(3):294\u2013312","journal-title":"Appl Math-A J Chin Univ"},{"key":"6230_CR23","doi-asserted-by":"publisher","unstructured":"Li K, He F, YU H, Chen X (2017) A parallel and robust object tracking approach synthesizing adaptive bayesian learning and improved incremental subspace learning. Frontiers of Computer Science. https:\/\/doi.org\/10.1007\/s11704-018-6442-4","DOI":"10.1007\/s11704-018-6442-4"},{"issue":"4","key":"6230_CR24","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1016\/j.engappai.2011.01.002","volume":"24","author":"W Lu","year":"2011","unstructured":"Lu W, Sun W, Chung FL, Lu H (2011) Revealing digital fakery using multiresolution decomposition and higher order statistics. Eng Appl Artif Intel 24 (4):666\u2013672","journal-title":"Eng Appl Artif Intel"},{"issue":"2","key":"6230_CR25","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/s11704-007-0017-0","volume":"1","author":"W Luo","year":"2007","unstructured":"Luo W, Qu Z, Pan F, Huang J (2007) A survey of passive technology for digital image forensics. Front Comput Sci Chin 1(2):166\u2013179","journal-title":"Front Comput Sci Chin"},{"key":"6230_CR26","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.image.2010.05.003","volume":"25","author":"B Mahdian","year":"2010","unstructured":"Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25:389\u2013399","journal-title":"Signal Process Image Commun"},{"key":"6230_CR27","unstructured":"Ng TT, Chang SF (2004) A data set of authentic and spliced image blocks. Tech. Rep. 203-2004-3, Columbia University"},{"issue":"2","key":"6230_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2180868.2180875","volume":"30","author":"L Nie","year":"2012","unstructured":"Nie L, Wang M, Zha ZJ, Chua TS (2012) Oracle in image search: a content-based approach to performance prediction. ACM Trans Inf Syst 30(2):1\u201323","journal-title":"ACM Trans Inf Syst"},{"key":"6230_CR29","unstructured":"Panchal UH, Srivastava R (2015) A comprehensive survey on digital image watermarking techniques. In: International conference on communication systems and network technologies (CSNT), pp 591\u2013595"},{"key":"6230_CR30","doi-asserted-by":"crossref","unstructured":"Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: 3rd IEEE international conference on industrial informatics (INDIN), pp 709\u2013716. Perth, Western Australia","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"6230_CR31","doi-asserted-by":"crossref","unstructured":"Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: The 9th ACM workshop on multimedia and security, pp 51\u201362. ACM, Dallas, Texas, USA","DOI":"10.1145\/1288869.1288878"},{"issue":"1","key":"6230_CR32","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1023\/A:1021889010444","volume":"18","author":"A Srivastava","year":"2003","unstructured":"Srivastava A, Lee A, Simoncelli E, Zhu SC (2003) On advances in statistical modeling of natural images. J Math Imaging Vision 18(1):17\u201333","journal-title":"J Math Imaging Vision"},{"issue":"2","key":"6230_CR33","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11766-016-3378-z","volume":"31","author":"J Sun","year":"2016","unstructured":"Sun J, He F, Chen Y, Chen X (2016) A multiple template approach for robust tracking of fast motion target. Appl Math-A J Chin Univ 31(2):177\u2013197","journal-title":"Appl Math-A J Chin Univ"},{"key":"6230_CR34","doi-asserted-by":"crossref","unstructured":"Sutthiwan P, Shi YQ, Su W, Ng TT (2010) Rake transform and edge statistics for image forgery detection. In: IEEE international conference on multimedia and expo (ICME), pp 1463\u20131468","DOI":"10.1109\/ICME.2010.5583264"},{"key":"6230_CR35","unstructured":"The dresden image database. http:\/\/forensics.inf.tu-dresden.de\/ddimgdb\/locations. [Online; accessed 6-July-2016]"},{"key":"6230_CR36","doi-asserted-by":"crossref","unstructured":"Verdoliva L, Cozzolino D, Poggi G (2014) A feature-based approach for image tampering detection and localization. In: IEEE international workshop on information forensics and security (WIFS), pp 149\u2013154","DOI":"10.1109\/WIFS.2014.7084319"},{"key":"6230_CR37","doi-asserted-by":"crossref","unstructured":"Vyas C, Lunagaria M (2014) A review on methods for image authentication and visual cryptography in digital image watermarking. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 1\u20136","DOI":"10.1109\/ICCIC.2014.7238504"},{"issue":"11","key":"6230_CR38","doi-asserted-by":"publisher","first-page":"4649","DOI":"10.1109\/TIP.2012.2207397","volume":"21","author":"M Wang","year":"2012","unstructured":"Wang M, Li H, Tao D, Lu K, Wu X (2012) Multimodal graph-based reranking for web image search. IEEE Trans Image Process 21(11):4649\u20134661","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"6230_CR39","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/TMM.2010.2055045","volume":"12","author":"M Wang","year":"2010","unstructured":"Wang M, Yang K, Hua XS, Zhang HJ (2010) Towards a relevant and diverse search of social images. IEEE Trans Multimed 12(8):829\u2013842","journal-title":"IEEE Trans Multimed"},{"key":"6230_CR40","doi-asserted-by":"crossref","unstructured":"Wang W, Dong J, Tan T (2010) Image tampering detection based on stationary distribution of markov chain. In: IEEE international conference on image processing (ICIP), pp 2101\u20132104","DOI":"10.1109\/ICIP.2010.5652660"},{"issue":"2","key":"6230_CR41","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/s11390-017-1714-2","volume":"32","author":"X Yan","year":"2017","unstructured":"Yan X, He F, Chen Y (2017) A novel hardware\/software partitioning method based on position disturbed particle swarm optimization with invasive weed optimization. J Comput Sci Technol 32(2):340\u2013355","journal-title":"J Comput Sci Technol"},{"issue":"1","key":"6230_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218843017410015","volume":"27","author":"X Yan","year":"2018","unstructured":"Yan X, He F, Hou N, Ai H (2018) An efficient particle swarm optimization for large-scale hardware\/software co-design system. Int J Cooperative Inf Syst 27(1):1\u201328","journal-title":"Int J Cooperative Inf Syst"},{"key":"6230_CR43","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.engappai.2016.12.022","volume":"59","author":"F Yang","year":"2017","unstructured":"Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intel 59:73\u201383","journal-title":"Eng Appl Artif Intel"},{"key":"6230_CR44","doi-asserted-by":"crossref","unstructured":"Yu H, He F, Pan Y (2018) A novel region-based active contour model via local patch similarity measure for image segmentation. Multimedia Tools and Applications, pp 1\u201323","DOI":"10.1007\/s11042-018-5697-y"},{"key":"6230_CR45","unstructured":"Zhang Z, Qiu G, Sun Q, Lin X (2004) A unified authentication framework for jpeg2000. In: IEEE international conference on multimedia and expo (ICME), pp 915\u2013918"},{"issue":"12","key":"6230_CR46","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.jvcir.2016.07.013","volume":"40","author":"Q Zhang","year":"2016","unstructured":"Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in DCT and Contourlet transform domain. J Vis Commun Image Represent 40(12):449\u2013458","journal-title":"J Vis Commun Image Represent"},{"issue":"6","key":"6230_CR47","doi-asserted-by":"publisher","first-page":"068,102:1C068,1","DOI":"10.1007\/s11432-015-0594-2","volume":"60","author":"Y Zhou","year":"2017","unstructured":"Zhou Y, He F, Qiu Y (2017) Dynamic strategy based parallel ant colony optimization on gpus for tsps. SCIENCE CHINA Inf Sci 60(6):068,102:1C068,102:3","journal-title":"SCIENCE CHINA Inf Sci"},{"key":"6230_CR48","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.future.2017.09.073","volume":"79","author":"Y Zhou","year":"2018","unstructured":"Zhou Y, He F, Hou N, Qiu Y (2018) Parallel ant colony optimization on multi-core simd cpus. Futur Gener Comput Syst 79:473\u2013487","journal-title":"Futur Gener Comput Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6230-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6230-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6230-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T23:59:25Z","timestamp":1751673565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6230-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,5]]},"references-count":48,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["6230"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6230-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,5]]},"assertion":[{"value":"5 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}