{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:17:22Z","timestamp":1769858242556,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T00:00:00Z","timestamp":1599782400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T00:00:00Z","timestamp":1599782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09707-7","type":"journal-article","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T22:02:42Z","timestamp":1599861762000},"page":"2161-2175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Image splicing detection technique based on Illumination-Reflectance model and LBP"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4200-335X","authenticated-orcid":false,"given":"Patrick","family":"Niyishaka","sequence":"first","affiliation":[]},{"given":"Chakravarthy","family":"Bhagvati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,11]]},"reference":[{"key":"9707_CR1","doi-asserted-by":"publisher","unstructured":"Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G (2013) Splicing image forgery detection based on dct and local binary pattern, 253\u2013256 https:\/\/doi.org\/10.1109\/GlobalSIP.2013.6736863","DOI":"10.1109\/GlobalSIP.2013.6736863"},{"key":"9707_CR2","doi-asserted-by":"publisher","unstructured":"Bayar B, C. Stamm M (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer, 5\u201310, https:\/\/doi.org\/10.1145\/2909827.2930786","DOI":"10.1145\/2909827.2930786"},{"key":"9707_CR3","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/TIFS.2016.2561898","volume":"11","author":"A Bharati","year":"2016","unstructured":"Bharati A, Singh R, Vatsa M, Bowyer KW (2016) Detecting facial retouching using supervised deep learning. IEEE Transactions on Information Forensics and Security 11:1903\u20131913. https:\/\/doi.org\/10.1109\/TIFS.2016.2561898","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9707_CR4","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"AP Bradley","year":"1997","unstructured":"Bradley AP (1997) The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recogn 30:1145\u20131159. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320396001422","journal-title":"Pattern Recogn"},{"key":"9707_CR5","doi-asserted-by":"crossref","unstructured":"Chen D, Lan S, Xu P, Zhang Y (2016) \u201cIllumination-Reflectance Based Image Enhancement Method for Character Recognition.\u201d 2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI) (2016): 207\u2013211.","DOI":"10.1109\/CISP-BMEI.2016.7852709"},{"key":"9707_CR6","doi-asserted-by":"publisher","first-page":"12405","DOI":"10.1007\/s11042-018-6792-9","volume":"78","author":"T Nam","year":"2019","unstructured":"Chun-su, Nam T, Jong-weon L, Goo-Rak K (2019) Efficient image splicing detection algorithm based on markov features. Multimedia Tools and Applications 78:12405\u201312419. https:\/\/doi.org\/10.1007\/s11042-018-6792-9","journal-title":"Multimedia Tools and Applications"},{"key":"9707_CR7","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database, pp 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"9707_CR8","doi-asserted-by":"publisher","unstructured":"Drira F, Denis F, Baskurt A (2004) Image watermarking technique based on the steerable pyramid transform, 165\u2013176, https:\/\/doi.org\/10.1117\/12.578741","DOI":"10.1117\/12.578741"},{"key":"9707_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5815\/ijcnis.2019.05.04","volume":"5","author":"IAE-L Eman","year":"2019","unstructured":"Eman IA E-L, Ahmed T, Hala H Z (2019) A passive approach for detecting image splicing using deep learning and haar wavelet transform. I. J. Computer Network and Information Security 5:28\u201335. https:\/\/doi.org\/10.5815\/ijcnis.2019.05.04","journal-title":"I. J. Computer Network and Information Security"},{"key":"9707_CR10","doi-asserted-by":"publisher","unstructured":"Evgeniou T, Pontil M (2001) Support vector machines: Theory and applications. In: Paliouras G, Karkaletsis V, Spyropoulos CD (eds) Machine Learning and Its Applications. ACAI 1999. Lecture Notes in Computer Science, vol 2049. Springer, Berlin, Heidelberg, pp 249\u2013257. https:\/\/doi.org\/10.1007\/3-540-44673-7_12","DOI":"10.1007\/3-540-44673-7_12"},{"key":"9707_CR11","unstructured":"Fahime H, Mahdi H, Farhad G (2015) Image splicing forgery detection using local binary pattern and discrete wavelet transform. In: 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp 1074\u2013107"},{"key":"9707_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.5120\/ijca2017913660","volume":"163","author":"B Gupta","year":"2017","unstructured":"Gupta B, Rawat A, Jain A, Arora A, Dhami N (2017) Analysis of various decision tree algorithms for classification in data mining. International Journal of Computer Applications 163:15\u201319. https:\/\/doi.org\/10.5120\/ijca2017913660","journal-title":"International Journal of Computer Applications"},{"issue":"6","key":"9707_CR13","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1109\/TPAMI.2012.213","volume":"35","author":"K He","year":"2013","unstructured":"He K, Sun J, Tang X (2013) Guided image filtering. IEEE Transactions on Pattern Analysis and Machine Intelligence 35(6):1397\u20131409. https:\/\/doi.org\/10.1109\/TPAMI.2012.213","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"9707_CR14","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.3233\/JIFS-169461","volume":"34","author":"M Isaac","year":"2018","unstructured":"Isaac M, Wilscy M (2018) Image forgery detection using region-based rotation invariant co-occurrences among adjacent lbps. Journal of Intelligent and Fuzzy Systems 34:1679\u20131690. https:\/\/doi.org\/10.3233\/JIFS-169461","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"9707_CR15","unstructured":"Jawadul HB, Amit KR-C, Jason B, Lakshmanan N, BS M (2017) Exploiting spatial structure for localizing manipulated image regions. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp 4970\u20134979"},{"key":"9707_CR16","doi-asserted-by":"crossref","unstructured":"Laaksonen J, Oja E (1996) Classification with learning k-nearest neighbors. In: Proceedings of International Conference on Neural Networks (ICNN\u201996), vol 3, pp 1480\u20131483","DOI":"10.1109\/ICNN.1996.549118"},{"key":"9707_CR17","unstructured":"Mandeep K, Savita G (2016) A passive blind approach for image splicing detection based on dwt and lbp histograms, in the proceedings of international symposium on security in computing and communication, chandigarh, india"},{"key":"9707_CR18","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","volume":"25","author":"G Muhammad","year":"2014","unstructured":"Muhammad G, Al-Hammadi M, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25:985\u2013995. https:\/\/doi.org\/10.1007\/s00138-013-0547-4","journal-title":"Mach Vis Appl"},{"key":"9707_CR19","doi-asserted-by":"publisher","unstructured":"Niyishaka P, Bhagvati C (2018) Digital image forensics technique for copy-move forgery detection using dog and orb. In: Chmielewski L, Kozera R, Or??owski A, Wojciechowski K, Bruckstein A, Petkov N (eds) Computer Vision and Graphics. ICCVG 2018. Lecture Notes in Computer Science, vol 11114. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-00692-1_41","DOI":"10.1007\/978-3-030-00692-1_41"},{"key":"9707_CR20","doi-asserted-by":"publisher","first-page":"26045","DOI":"10.1007\/s11042-020-09225-6","volume":"79","author":"P Niyishaka","year":"2020","unstructured":"Niyishaka P, Bhagvati C (2020) Copy-move forgery detection using image blobs and brsik feature. Multimed Tools Appl 79:26045-26059. https:\/\/doi.org\/10.1007\/s11042-020-09225-6","journal-title":"Multimed Tools Appl"},{"key":"9707_CR21","doi-asserted-by":"crossref","unstructured":"Parihar A S, Singh K (2018) A study on retinex based method for image enhancement. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp 619\u2013624","DOI":"10.1109\/ICISC.2018.8398874"},{"key":"9707_CR22","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V (2011) Scikit-learn: Machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"9707_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/00220670209598786","volume":"96","author":"J Peng","year":"2002","unstructured":"Peng J, Lee K, Ingersoll G (2002) An introduction to logistic regression analysis and reporting. Journal of Educational Research - J EDUC RES 96:3\u201314. https:\/\/doi.org\/10.1080\/00220670209598786","journal-title":"Journal of Educational Research - J EDUC RES"},{"key":"9707_CR24","unstructured":"Peng Z, Xintong H, Morariu V I, Larry S. D (2018) Learning rich features for image manipulation detection. arXiv:1805.04953"},{"key":"9707_CR25","unstructured":"Rachna M, Navneet A (2019) Image splicing detection with markov features and pca, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering. IJIREEICE, 7"},{"key":"9707_CR26","doi-asserted-by":"crossref","unstructured":"Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images, 2016 IEEE International Workshop on Information Forensics and Security (WIFS), 1\u20136","DOI":"10.1109\/WIFS.2016.7823911"},{"issue":"1","key":"9707_CR27","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133\u2013162. https:\/\/doi.org\/10.1007\/s11042-010-0620-1. https:\/\/doi.org\/10.1007\/s11042-010-0620-1,","journal-title":"Multimedia Tools and Applications"},{"key":"9707_CR28","unstructured":"Steve E (2013) Homomorphic filtering, Accessed: 2020-01-19"},{"key":"9707_CR29","unstructured":"Steven B (2014) Why luminance is the key component of color, Accessed: 2020-06-20. https:\/\/vanseodesign.com\/web-design\/color-luminance\/"},{"key":"9707_CR30","doi-asserted-by":"publisher","first-page":"169","DOI":"10.3233\/AIC-170729","volume":"30","author":"A Tharwat","year":"2017","unstructured":"Tharwat A, Gaber T, Ibrahim A, Hassanien A E (2017) Linear discriminant analysis: A detailed tutorial. Ai Communications 30:169\u2013190,. https:\/\/doi.org\/10.3233\/AIC-170729","journal-title":"Ai Communications"},{"key":"9707_CR31","doi-asserted-by":"crossref","unstructured":"Thing V L L, Chen Y, Cheh C (2012) An improved double compression detection method for jpeg image forensics. In: 2012 IEEE International Symposium on Multimedia, pp 290\u2013297","DOI":"10.1109\/ISM.2012.61"},{"key":"9707_CR32","unstructured":"Tomasi C, Manduchi R (1998) Bilateral filtering for gray and color images. In: ICCV, pp 839\u2013846. citeseer.ist.psu.edu\/tomasi98bilateral.html"},{"key":"9707_CR33","doi-asserted-by":"crossref","unstructured":"Wei Wang, Dong J, Tan T (2009) Effective image splicing detection based on image chroma. In: 2009 16th IEEE International Conference on Image Processing (ICIP), pp 1257\u20131260","DOI":"10.1109\/ICIP.2009.5413549"},{"key":"9707_CR34","unstructured":"Willy W (2020) Human vision and color, Accessed: 2020-01-20. https:\/\/biomachina.org\/courses\/imageproc\/121.pdf"},{"key":"9707_CR35","doi-asserted-by":"publisher","first-page":"25611","DOI":"10.1109\/ACCESS.2020.2970735","volume":"8","author":"R Yuan","year":"2020","unstructured":"Yuan R, Jiangqun N, Huimin Z (2020) Deep learning local descriptor for image splicing detection and localization. IEEE Access 8:25611\u201325625. https:\/\/doi.org\/10.1109\/ACCESS.2020.2970735","journal-title":"IEEE Access"},{"key":"9707_CR36","doi-asserted-by":"crossref","unstructured":"Zhang Z, Zhang Y, Zhou Z, Luo J (2018) Boundary-based image forgery detection by fast shallow cnn, 2658\u20132663","DOI":"10.1109\/ICPR.2018.8545074"},{"key":"9707_CR37","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"H Zhongwei","year":"2012","unstructured":"Zhongwei H, Wei L, Wei S, Jiwu H (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recogn 45:4292\u20134299","journal-title":"Pattern Recogn"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09707-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09707-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09707-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T23:40:18Z","timestamp":1631317218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09707-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,11]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9707"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09707-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,11]]},"assertion":[{"value":"24 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}