{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:22:32Z","timestamp":1772828552021,"version":"3.50.1"},"reference-count":92,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T00:00:00Z","timestamp":1551744000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-019-7342-9","type":"journal-article","created":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T16:31:12Z","timestamp":1551803472000},"page":"20739-20763","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Region duplication detection based on hybrid feature and evaluative clustering"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5667-5037","authenticated-orcid":false,"given":"Cong","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4068-1766","authenticated-orcid":false,"given":"Wei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xinchao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hanhui","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,5]]},"reference":[{"issue":"11","key":"7342_CR1","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TPAMI.2012.120","volume":"34","author":"R Achanta","year":"2012","unstructured":"Achanta R, Shaji A, Smith K, Lucchi A, Fua P, S\u00fcsstrunk S (2012) Slic superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274\u20132282","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7342_CR2","doi-asserted-by":"crossref","unstructured":"Alcantarilla PF, Bartoli A, Davison AJ (2012) Kaze features. In: European conference on computer Vision (ECCV), 214\u2013227, Florence, Italy","DOI":"10.1007\/978-3-642-33783-3_16"},{"issue":"3","key":"7342_CR3","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inform Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"6","key":"7342_CR4","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with j-Linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"10","key":"7342_CR5","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copycmove forgery detection by matching triangles of keypoints. IEEE Trans Inform Forensics Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"3","key":"7342_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1276377.1276390","volume":"26","author":"S Avidan","year":"2007","unstructured":"Avidan S, Shamir A (2007) Seam carving for content-aware image resizing. ACM Trans Graph 26(3):10","journal-title":"ACM Trans Graph"},{"issue":"3","key":"7342_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1531326.1531330","volume":"28","author":"C Barnes","year":"2009","unstructured":"Barnes C, Shechtman E, Finkelstein A, Dan BG (2009) Patchmatch:a randomized correspondence algorithm for structural image editing. Acm Trans Graph 28(3):1\u201311","journal-title":"Acm Trans Graph"},{"issue":"99","key":"7342_CR8","first-page":"1","volume":"PP","author":"M Bashar","year":"2010","unstructured":"Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Trans Image Process PP(99):1\u20131","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"7342_CR9","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded Up robust features. Comput Vis Image Underst 110(3):346\u2013359","journal-title":"Comput Vis Image Underst"},{"key":"7342_CR10","unstructured":"Beis JS, Lowe DG (1997) Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: Conference on computer vision and pattern recognition (CVPR), 1000\u20131006, San Juan, Puerto Rico"},{"key":"7342_CR11","doi-asserted-by":"crossref","unstructured":"Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: IEEE international conference on acoustics, speech and signal processing (ICASSP), 1880\u20131883, Prague, Czech Republic","DOI":"10.1109\/ICASSP.2011.5946873"},{"key":"7342_CR12","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.jvcir.2018.06.004","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen J, Lu W, Fang Y, Liu X, Yeung Y, Yingjie X (2018) Binary image steganalysis based on local texture pattern. J Vis Commun Image Represent 55:149\u2013156","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"7342_CR13","first-page":"201","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C, Zhang Y (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Continua 55(2):201\u2013211","journal-title":"Comput Mater Continua"},{"issue":"1","key":"7342_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.4018\/jdcf.2012010104","volume":"4","author":"L Chen","year":"2012","unstructured":"Chen L, Lu W, Ni J (2012) An image region description method based on step sector statistics and its application in image copy-rotate\/flip-move forgery detection. Int J Digital Crime Forensics 4(1):49\u201362","journal-title":"Int J Digital Crime Forensics"},{"issue":"3","key":"7342_CR15","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.jvcir.2013.01.008","volume":"24","author":"L Chen","year":"2013","unstructured":"Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244\u2013254","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"7342_CR16","doi-asserted-by":"publisher","first-page":"1697","DOI":"10.1109\/TPAMI.2017.2726061","volume":"40","author":"X Chen","year":"2018","unstructured":"Chen X, Jian W, Wei L, Jiaming X (2018) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell 40(7):1697\u20131710","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7342_CR17","doi-asserted-by":"crossref","unstructured":"Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. In: IEEE international workshop on information forensics and security (WIFS), 1-6, Seattle, WA, USA","DOI":"10.1109\/WIFS.2010.5711472"},{"issue":"6","key":"7342_CR18","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inform Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"7342_CR19","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Copy-move forgery detection based on patchmatch. In: IEEE International conference on image processing, 5312\u20135316, Quebec City, Canada","DOI":"10.1109\/ICIP.2014.7026075"},{"issue":"11","key":"7342_CR20","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copycmove forgery detection. IEEE Trans Inform Forensics Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"2","key":"7342_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid H (2009) Image forgery detection. Signal Process Magazine IEEE 26 (2):16\u201325","journal-title":"Signal Process Magazine IEEE"},{"key":"7342_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0065-2458(09)01201-7","volume":"77","author":"H Farid","year":"2009","unstructured":"Farid H (2009) Photo fakery and forensics. Adv Comput 77:1\u201355","journal-title":"Adv Comput"},{"issue":"2","key":"7342_CR23","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TIFS.2014.2368364","volume":"10","author":"B Feng","year":"2014","unstructured":"Feng B, Lu W, Sun W (2014) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inform Forensics Secur 10 (2):243\u2013255","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"7342_CR24","doi-asserted-by":"crossref","unstructured":"Feng B, Weng J, Lu W, Pei B (2017) Multiple watermarking using multilevel quantization index modulation. In: International workshop on digital watermarking, 312\u2013326, Beijing, China","DOI":"10.1007\/978-3-319-53465-7_23"},{"key":"7342_CR25","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.jvcir.2017.01.008","volume":"46","author":"B Feng","year":"2017","unstructured":"Feng B, Weng J, Lu W, Pei B (2017) Steganalysis of content-adaptive binary image data hiding. J Vis Commun Image Represent 46:119\u2013127","journal-title":"J Vis Commun Image Represent"},{"issue":"10","key":"7342_CR26","doi-asserted-by":"publisher","first-page":"4729","DOI":"10.1109\/TIP.2016.2593583","volume":"25","author":"A Ferreira","year":"2016","unstructured":"Ferreira A, Felipussi SC, Alfaro C, Fonseca P, Vargas-Munoz JE, Dos Santos JA, Rocha A (2016) Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans Image Process 25(10):4729\u20134742","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"7342_CR27","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381\u2013395","journal-title":"Commun ACM"},{"key":"7342_CR28","doi-asserted-by":"crossref","unstructured":"Forssen PE (2007) Maximally stable colour regions for recognition and matching. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 1\u20138, Minneapolis, Minnesota, USA","DOI":"10.1109\/CVPR.2007.383120"},{"key":"7342_CR29","unstructured":"Fridrich J, Soukal D, Luk\u00e1\u0161 J (2003) Detection of copy-move forgery in digital images. In: Proceeding of digital forensic research workshop, 19-23, Cleveland, OH, USA"},{"key":"7342_CR30","doi-asserted-by":"crossref","unstructured":"Hamdi D, Iqbal F, Baker T, Shah B (2016) Multimedia file signature analysis for smartphone forensics. In: International conference on developments in esystems engineering. Liverpool, UK","DOI":"10.1109\/DeSE.2016.22"},{"key":"7342_CR31","unstructured":"Harris CG, Stephens MJ (1988) A combined corner and edge detector. In: Alvey vision conference, 147\u2013151"},{"key":"7342_CR32","volume-title":"The elements of statistical learning","author":"T Hastie","year":"2003","unstructured":"Hastie T, Tibshirani R, Friedman J (2003) The elements of statistical learning. Springer, Berlin"},{"issue":"12","key":"7342_CR33","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recogn 45(12):4292\u20134299","journal-title":"Pattern Recogn"},{"issue":"22","key":"7342_CR34","doi-asserted-by":"publisher","first-page":"4012","DOI":"10.1364\/AO.21.004012","volume":"21","author":"YN Hsu","year":"1982","unstructured":"Hsu YN, Arsenault HH, April G (1982) Rotation-invariant digital pattern recognition using circular harmonic expansion. Appl Opt 21(22):4012\u20134015","journal-title":"Appl Opt"},{"issue":"1-3","key":"7342_CR35","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1-3):178\u2013184","journal-title":"Forensic Sci Int"},{"key":"7342_CR36","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.image.2017.05.010","volume":"57","author":"G Jin","year":"2017","unstructured":"Jin G, Wan X (2017) An improved method for sift-based copycmove forgery detection using non-maximum value suppression and optimized j-Linkage. Signal Process Image Commun 57:113\u2013125","journal-title":"Signal Process Image Commun"},{"issue":"12","key":"7342_CR37","doi-asserted-by":"publisher","first-page":"15,093","DOI":"10.1007\/s11042-017-5094-y","volume":"77","author":"Y Lai","year":"2018","unstructured":"Lai Y, Huang T, Jing L, Lu H (2018) An improved block-based matching algorithm of copy-move forgery detection. Multimed Tool Appl 77(12):15,093\u201315,110","journal-title":"Multimed Tool Appl"},{"issue":"3","key":"7342_CR38","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inform Forensics Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"7342_CR39","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jvcir.2016.06.003","volume":"40","author":"J Li","year":"2016","unstructured":"Li J, Lu W (2016) Blind image motion deblurring with L0-regularized priors. J Vis Commun Image Represent 40:14\u201323","journal-title":"J Vis Commun Image Represent"},{"issue":"24","key":"7342_CR40","doi-asserted-by":"publisher","first-page":"31,895","DOI":"10.1007\/s11042-018-6175-2","volume":"77","author":"J Li","year":"2018","unstructured":"Li J, Lu W, Weng J, Mao Y, Li G (2018) Double jpeg compression detection based on block statistics. Multimed Tool and Appl 77(24):31,895\u201331,910","journal-title":"Multimed Tool and Appl"},{"issue":"20","key":"7342_CR41","first-page":"1","volume":"76","author":"J Li","year":"2016","unstructured":"Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed Tool Appl 76 (20):1\u201315","journal-title":"Multimed Tool Appl"},{"issue":"1-3","key":"7342_CR42","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Y Li","year":"2013","unstructured":"Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1-3):59","journal-title":"Forensic Sci Int"},{"issue":"99","key":"7342_CR43","first-page":"1","volume":"PP","author":"Y Li","year":"2018","unstructured":"Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inform Forensics Secur PP(99):1\u20131","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"7342_CR44","doi-asserted-by":"publisher","unstructured":"Lin C, Lu W, Huang X, Liu K, Sun W, Lin H, Tan Z (2018) Copy-move forgery detection using combined features and transitive matching, Multimed Tool Appl, pp 1\u201316. \n                    https:\/\/doi.org\/10.1007\/s11042-018-6922-4","DOI":"10.1007\/s11042-018-6922-4"},{"issue":"11","key":"7342_CR45","doi-asserted-by":"publisher","first-page":"14,241","DOI":"10.1007\/s11042-017-5027-9","volume":"77","author":"C Lin","year":"2018","unstructured":"Lin C, Lu W, Sun W, Zeng J, Xu T, Lai JH (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimed Tool Appl 77 (11):14,241\u201314,258","journal-title":"Multimed Tool Appl"},{"issue":"5","key":"7342_CR46","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1016\/j.jnca.2010.09.001","volume":"34","author":"G Liu","year":"2011","unstructured":"Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34 (5):1557\u20131565","journal-title":"J Netw Comput Appl"},{"key":"7342_CR47","doi-asserted-by":"publisher","unstructured":"Liu X, Lu W, Huang T, Liu H, Xue Y, Yuileong Y (2018) Scaling factor estimation on jpeg compressed images by cyclostationarity analysis, Multimed Tool Appl, pp 1\u201318. \n                    https:\/\/doi.org\/10.1007\/s11042-018-6411-9","DOI":"10.1007\/s11042-018-6411-9"},{"key":"7342_CR48","doi-asserted-by":"publisher","unstructured":"Liu X, Lu W, Zhang Q, Huang J, Shi YQ (2019) Downscaling factor estimation on pre-jpeg compressed images, IEEE Trans Circuit Syst Video Technol, pp 1\u20131. \n                    https:\/\/doi.org\/10.1109\/TCSVT.2019.2893353","DOI":"10.1109\/TCSVT.2019.2893353"},{"issue":"2","key":"7342_CR49","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91\u2013110","journal-title":"Int J Comput Vis"},{"issue":"99","key":"7342_CR50","first-page":"1","volume":"PP","author":"W Lu","year":"2019","unstructured":"Lu W, He L, Yeung Y, Xue Y, Liu H, Feng B (2019) Secure binary image steganography based on fused distortion measurement. IEEE Trans Circuit Syst Video Technol PP(99):1\u20131","journal-title":"IEEE Trans Circuit Syst Video Technol"},{"issue":"4","key":"7342_CR51","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1016\/j.engappai.2011.01.002","volume":"24","author":"W Lu","year":"2011","unstructured":"Lu W, Sun W, Chung FL, Lu H (2011) Revealing digital fakery using multiresolution decomposition and higher order statistics. Eng Appl Artif Intell 24 (4):666\u2013672","journal-title":"Eng Appl Artif Intell"},{"issue":"21","key":"7342_CR52","doi-asserted-by":"publisher","first-page":"13,557","DOI":"10.1007\/s11042-015-2759-2","volume":"75","author":"X Luo","year":"2016","unstructured":"Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tool Appl 75(21):13,557\u2013 13,583","journal-title":"Multimed Tool Appl"},{"issue":"99","key":"7342_CR53","first-page":"1","volume":"PP","author":"Y Ma","year":"2018","unstructured":"Ma Y, Luo X, Li X, Bao Z, Yi Z (2018) Selection of rich model steganalysis features based on decision rough set \u03b1-positive region reduction. IEEE Trans Circuit Syst Video Technol PP(99):1\u20131","journal-title":"IEEE Trans Circuit Syst Video Technol"},{"key":"7342_CR54","doi-asserted-by":"crossref","unstructured":"Macdermott A, Baker T, Shi Q (2018) Iot forensics: challenges for the ioa era. In: 9th IFIP international conference on new technologies, mobility and security (NTMS), Paris, France","DOI":"10.1109\/NTMS.2018.8328748"},{"key":"7342_CR55","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171:180\u2013189","journal-title":"Forensic Sci Int"},{"issue":"1","key":"7342_CR56","first-page":"154","volume":"382","author":"GJ Mclachlan","year":"1997","unstructured":"Mclachlan GJ, Krishnan T (1997) The em algorithm and extensions. Biometrics 382(1):154\u2013156","journal-title":"Biometrics"},{"key":"7342_CR57","unstructured":"Mikolajczyk K, Schmid C (2002) Indexing based on scale invariant interest points. In: IEEE International Conference on Computer Vision (ICCV), 525\u2013531, Vancouver, BC, Canada"},{"issue":"1","key":"7342_CR58","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/B:VISI.0000027790.02288.f2","volume":"60","author":"K Mikolajczyk","year":"2004","unstructured":"Mikolajczyk K, Schmid C (2004) Scale and affine invariant interest point detectors. Int J Comput Vis 60(1):63\u201386","journal-title":"Int J Comput Vis"},{"issue":"10","key":"7342_CR59","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPAMI.2005.188","volume":"27","author":"K Mikolajczyk","year":"2005","unstructured":"Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1615\u20131630","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"7342_CR60","first-page":"1938","volume":"9","author":"K Muhammad","year":"2015","unstructured":"Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. Ksii Trans Internet Inform Syst 9(5):1938\u20131962","journal-title":"Ksii Trans Internet Inform Syst"},{"issue":"6","key":"7342_CR61","doi-asserted-by":"publisher","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tool Appl 76(6):8597\u2013 8626","journal-title":"Multimed Tool Appl"},{"issue":"5","key":"7342_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0473-x","volume":"40","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40(5):1\u201316","journal-title":"J Med Syst"},{"key":"7342_CR63","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.future.2016.11.029","volume":"86","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst 86:951\u2013960","journal-title":"Futur Gener Comput Syst"},{"issue":"22","key":"7342_CR64","doi-asserted-by":"publisher","first-page":"14,867","DOI":"10.1007\/s11042-015-2671-9","volume":"75","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic lsb substitution method (m-lsb-sm) using multi-level encryption and achromatic component of an image. Multimed Tool Appl 75(22):14,867\u201314,893","journal-title":"Multimed Tool Appl"},{"issue":"4","key":"7342_CR65","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inform Forensics Secur 5(4):857\u2013867","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"8","key":"7342_CR66","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive over-segmentation and feature points matching. IEEE Trans Inform Forensics Secur 10 (8):1705\u20131716","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"1","key":"7342_CR67","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tool Appl 51(1):133\u2013162","journal-title":"Multimed Tool Appl"},{"issue":"3","key":"7342_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1360612.1360615","volume":"27","author":"M Rubinstein","year":"2008","unstructured":"Rubinstein M, Shamir A, Avidan S (2008) Improved seam carving for video retargeting. ACM Trans Graph 27(3):1\u20139","journal-title":"ACM Trans Graph"},{"issue":"8","key":"7342_CR69","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inform Forensics Secur 8(8):1355\u20131370","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"7342_CR70","doi-asserted-by":"crossref","unstructured":"Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. In: IEEE International workshop on Information Hiding (IH). Springer, Berlin, pp 51\u201365","DOI":"10.1007\/978-3-642-16435-4_5"},{"key":"7342_CR71","doi-asserted-by":"crossref","unstructured":"Sencar HT, Memon N (2008) Overview of State-of-the-Art in Digital Image Forensics. Algorithms, Architectures And Information Systems Security","DOI":"10.1142\/9789812836243_0015"},{"key":"7342_CR72","unstructured":"Sharif SA, Ali MA, Reqabi NA, Iqbal F, Baker T, Marrington A (2016) Magec: an image searching tool for detecting forged images in forensic investigation. In: 8th IFIP international conference on new technologies, mobility and security (NTMS), 1\u20136, Larnaca, Cyprus"},{"issue":"4","key":"7342_CR73","first-page":"199","volume":"8","author":"BL Shivakumar","year":"2011","unstructured":"Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues 8(4):199\u2013205","journal-title":"Int J Comput Sci Issues"},{"issue":"C","key":"7342_CR74","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29(C):16\u201332","journal-title":"J Vis Commun Image Represent"},{"issue":"11","key":"7342_CR75","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1049\/iet-ipr.2018.5576","volume":"12","author":"B Soni","year":"2018","unstructured":"Soni B, Das PK, Thounaojam DM (2018) Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm. IET Image Process 12(11):2092\u20132099","journal-title":"IET Image Process"},{"key":"7342_CR76","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"MC Stamm","year":"2013","unstructured":"Stamm MC, Min W, Liu KJR (2013) Information forensics: an overview of the first decade. IEEE Access 1:167\u2013200","journal-title":"IEEE Access"},{"issue":"8","key":"7342_CR77","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1364\/JOSA.70.000920","volume":"70","author":"MR Teague","year":"1980","unstructured":"Teague MR (1980) Image analysis via the general theory of moments. J Opt Soc Am 70(8):920\u2013930","journal-title":"J Opt Soc Am"},{"key":"7342_CR78","doi-asserted-by":"crossref","unstructured":"Toldo R, Fusiello A (2008) Robust multiple structures estimation with j-Linkage. In: European conference on computer vision (ECCV), 537\u2013547, Marseille, France","DOI":"10.1007\/978-3-540-88682-2_41"},{"key":"7342_CR79","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.jvcir.2017.04.004","volume":"46","author":"NBA Warif","year":"2017","unstructured":"Warif NBA, Wahab AWA, Idris MYI, Salleh R, Othman F (2017) Sift-symmetry: a robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46:219\u2013 232","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"7342_CR80","first-page":"1","volume":"77","author":"L Xin","year":"2017","unstructured":"Xin L, Guo S, Yin J, Wang H, Xiong L, Sangaiah AK (2017) New cubic reference table based image steganography. Multimed Tool Appl 77(4):1\u201318","journal-title":"Multimed Tool Appl"},{"issue":"20","key":"7342_CR81","first-page":"1","volume":"76","author":"L Xin","year":"2016","unstructured":"Xin L, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tool Appl 76(20):1\u201315","journal-title":"Multimed Tool Appl"},{"key":"7342_CR82","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"L Xin","year":"2017","unstructured":"Xin L, Zheng Q, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146\u2013156","journal-title":"Signal Process Image Commun"},{"key":"7342_CR83","unstructured":"Xu B, Wang J, Liu G, Dai Y (2010) Image copy-move forgery detection based on SURF. In: International conference on multimedia information networking and security (MINES), 889\u2013892, Nanjing, China"},{"key":"7342_CR84","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.image.2017.05.008","volume":"57","author":"F Xue","year":"2017","unstructured":"Xue F, Ye Z, Lu W, Liu H, Li B (2017) Mse period based estimation of first quantization step in double compressed jpeg images. Signal Process Image Commun 57:76\u201383","journal-title":"Signal Process Image Commun"},{"key":"7342_CR85","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.engappai.2016.12.022","volume":"59","author":"F Yang","year":"2017","unstructured":"Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73\u201383","journal-title":"Eng Appl Artif Intell"},{"issue":"11","key":"7342_CR86","doi-asserted-by":"publisher","first-page":"13,615","DOI":"10.1007\/s11042-017-4978-1","volume":"77","author":"H Yang","year":"2018","unstructured":"Yang H, Niu Y, Jiao L, Liu Y, Wang XY, Zhou Z (2018) Robust copy-move forgery detection based on multi-granularity superpixels matching. Multimed Tool Appl 77(11):13,615\u201313,641","journal-title":"Multimed Tool Appl"},{"issue":"7","key":"7342_CR87","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1109\/TPAMI.2009.119","volume":"32","author":"PT Yap","year":"2010","unstructured":"Yap PT, Jiang X, Kot AC (2010) Two-dimensional polar harmonic transforms for invariant image representation. IEEE Trans Pattern Anal Mach Intell 32(7):1259\u201370","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7342_CR88","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Z Yi","year":"2018","unstructured":"Yi Z, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99\u2013111","journal-title":"Signal Process"},{"issue":"20","key":"7342_CR89","doi-asserted-by":"publisher","first-page":"26,239","DOI":"10.1007\/s11042-018-5847-2","volume":"77","author":"F Zhang","year":"2018","unstructured":"Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on L0-regularization and kernel shape optimization. Multimed Tool Appl 77 (20):26,239\u201326,257","journal-title":"Multimed Tool Appl"},{"issue":"23","key":"7342_CR90","doi-asserted-by":"publisher","first-page":"31,239","DOI":"10.1007\/s11042-018-6230-z","volume":"77","author":"Q Zhang","year":"2018","unstructured":"Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimed Tool Appl 77(23):31,239\u2013312,601","journal-title":"Multimed Tool Appl"},{"key":"7342_CR91","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.jvcir.2016.07.013","volume":"40","author":"Q Zhang","year":"2016","unstructured":"Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449\u2013458","journal-title":"J Vis Commun Image Represent"},{"issue":"6","key":"7342_CR92","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s11042-014-2431-2","volume":"75","author":"Y Zhu","year":"2016","unstructured":"Zhu Y, Shen X, Chen H (2016) Copy-move forgery detection based on scaled orb. Multimed Tool Appl 75(6):3221\u20133233","journal-title":"Multimed Tool Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7342-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7342-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7342-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T19:12:23Z","timestamp":1583262743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7342-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,5]]},"references-count":92,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7342"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7342-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,5]]},"assertion":[{"value":"14 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}