{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T03:44:25Z","timestamp":1768707865102,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11042-022-13610-8","type":"journal-article","created":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T23:03:27Z","timestamp":1659135807000},"page":"4517-4532","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Unveiling digital image forgeries using Markov based quaternions in frequency domain and fusion of machine learning algorithms"],"prefix":"10.1007","volume":"82","author":[{"given":"Savita","family":"Walia","sequence":"first","affiliation":[]},{"given":"Krishan","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0115-1620","authenticated-orcid":false,"given":"Munish","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,29]]},"reference":[{"key":"13610_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2015.08.008","volume":"39","author":"M Ali","year":"2015","unstructured":"Ali M, Deriche M (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Processing : Image Communication 39:46\u201374. https:\/\/doi.org\/10.1016\/j.image.2015.08.008","journal-title":"Signal Processing : Image Communication"},{"key":"13610_CR2","first-page":"1","volume":"CSCI 520","author":"J Barbic","year":"2011","unstructured":"Barbic J (2011) Quaternions and Rotations. University of Southern California CSCI 520:1\u201312","journal-title":"University of Southern California"},{"key":"13610_CR3","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/978-981-15-5341-7_82","volume-title":"Advances in communication and computational technology","author":"P Chaudhary","year":"2021","unstructured":"Chaudhary P, Gupta DK, Singh S (2021) Outcome prediction of patients for different stages of Sepsis using machine learning models. In: Hura G, Singh A, Siong Hoe L (eds) Advances in communication and computational technology, vol 668. Springer, Singapore, pp 1085\u20131098"},{"key":"13610_CR4","doi-asserted-by":"publisher","unstructured":"W. Chen, Y. Q. Shi, and W. Su, \u201cImage splicing detection using 2D phase congruency and statistical moments of characteristic function,\u201d in Proceedings of SPIE - The International Society for Optical Engineering, 2007, vol. 6505. https:\/\/doi.org\/10.1117\/12.704321.","DOI":"10.1117\/12.704321"},{"issue":"2","key":"13610_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/19479830903561944","volume":"1","author":"S Chitroub","year":"2010","unstructured":"Chitroub S (2010) Classifier combination and score level fusion: concepts and practical aspects. Int J Image Data Fusion 1(2):113\u2013135. https:\/\/doi.org\/10.1080\/19479830903561944","journal-title":"Int J Image Data Fusion"},{"key":"13610_CR6","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W Tan T, Shi Y. (2009) \u201cRun-length and edge statistics based approach for image splicing detection,\u201d in International Workshop on Digital Watermarking (IWDW), Lect Notes Comput Sci 5450, pp. 76\u201387","DOI":"10.1007\/978-3-642-04438-0_7"},{"key":"13610_CR7","doi-asserted-by":"publisher","unstructured":"Dong J, Wang W, Tan T (2013) \u201cCASIA Image Tempering Detection Evaluation Database (CAISA TIDE)\u201d, in 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp. 422\u2013426. https:\/\/doi.org\/10.1109\/ChinaSIP.2013.6625374","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"issue":"2019","key":"13610_CR8","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.procs.2020.04.038","volume":"171","author":"S Dua","year":"2020","unstructured":"Dua S, Singh J, Parthasarathy H (2020) Image forgery detection based on statistical features of block DCT coefficients. Procedia Computer Science 171(2019):369\u2013378. https:\/\/doi.org\/10.1016\/j.procs.2020.04.038","journal-title":"Procedia Computer Science"},{"key":"13610_CR9","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s10044-014-0396-4","volume":"18","author":"EM El-alfy","year":"2015","unstructured":"El-alfy EM, Qureshi MA (2015) Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal Applic 18:713\u2013723. https:\/\/doi.org\/10.1007\/s10044-014-0396-4","journal-title":"Pattern Anal Applic"},{"key":"13610_CR10","doi-asserted-by":"crossref","unstructured":"Elaskily MA, Aslan HK, Elshakankiry OA, Faragallah OS (2017) \u201cComparative Study of Copy-Move Forgery Detection Techniques,\u201d in Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 Intl Conf on New Paradigms in Electronics & Information Technology (PEIT), pp. 193\u2013203","DOI":"10.1109\/ACCS-PEIT.2017.8303041"},{"issue":"2","key":"13610_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid H (2009) Image forgery detection. IEEE Signal Process Mag 26(2):16\u201325. https:\/\/doi.org\/10.1109\/MSP.2008.931079","journal-title":"IEEE Signal Process Mag"},{"key":"13610_CR12","doi-asserted-by":"publisher","unstructured":"Feng W, Hu B (2008) Quaternion Discrete Cosine Transform and its Application in Color Template Matching. Congress Image Signal Process:252\u2013256. https:\/\/doi.org\/10.1109\/CISP.2008.61","DOI":"10.1109\/CISP.2008.61"},{"issue":"1","key":"13610_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia A, Noumeir R (2008) Methods for image authentication : a survey. Multimed Tools Appl 39(1):1\u201346. https:\/\/doi.org\/10.1007\/s11042-007-0154-3","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"13610_CR14","doi-asserted-by":"publisher","first-page":"125","DOI":"10.14257\/ijsia.2015.9.4.13","volume":"9","author":"MF Hashmir","year":"2015","unstructured":"Hashmir MF, Keskar AG (2015) Image forgery detection and classification using HMM and SVM classifier. International Journal of Security and its Applications 9(4):125\u2013140","journal-title":"International Journal of Security and its Applications"},{"issue":"12","key":"13610_CR15","doi-asserted-by":"publisher","first-page":"1591","DOI":"10.1016\/j.patrec.2011.05.013","volume":"32","author":"Z He","year":"2011","unstructured":"He Z, Sun W, Lu W, Lu H (2011) Digital image splicing detection based on approximate run length. Pattern Recogn Lett 32(12):1591\u20131597. https:\/\/doi.org\/10.1016\/j.patrec.2011.05.013","journal-title":"Pattern Recogn Lett"},{"key":"13610_CR16","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn 45:4292\u20134299","journal-title":"Pattern Recogn"},{"key":"13610_CR17","doi-asserted-by":"crossref","unstructured":"Hsu Y-F, Chang S-F (2006) \u201cDetecting Image Splicing Using Geometry Invariants And Camera Characteristics Consistency,\u201d in International Conference on Multimedia and Expo (ICME), pp. 549\u2013552","DOI":"10.1109\/ICME.2006.262447"},{"key":"13610_CR18","doi-asserted-by":"crossref","unstructured":"Hsu Y-F, Chang S-F (2007) \u201cImage Splicing Detection using Camera Response Function and Automatic Segmentation,\u201d in 2007 IEEE International Conference on Multimedia and Expo, pp. 28\u201331","DOI":"10.1109\/ICME.2007.4284578"},{"key":"13610_CR19","doi-asserted-by":"crossref","unstructured":"Hussain M, Saleh SQ, Aboalsamh H, Muhammad G, Bebis G (2014) \u201cComparison between WLD and LBP Descriptors for Non-intrusive Image Forgery Detection,\u201d in Proc. of IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA), pp. 197\u2013204","DOI":"10.1109\/INISTA.2014.6873618"},{"key":"13610_CR20","doi-asserted-by":"crossref","unstructured":"Kantor I, Solodovnikov A, Shenitzer A (1989) Hypercomplex numbers : an elementary introduction to algebras. Berlin: Springer: Springer-Verlag New York","DOI":"10.1007\/978-1-4612-3650-4"},{"issue":"4","key":"13610_CR21","doi-asserted-by":"publisher","first-page":"37","DOI":"10.14257\/ijmue.2016.11.4.05","volume":"11","author":"M Kaur","year":"2016","unstructured":"Kaur M, Walia S (2016) Forgery detection using noise estimation and HOG feature extraction. Int J Multimed Ubiquitous Eng 11(4):37\u201348. https:\/\/doi.org\/10.14257\/ijmue.2016.11.4.05","journal-title":"Int J Multimed Ubiquitous Eng"},{"key":"13610_CR22","doi-asserted-by":"crossref","unstructured":"Kaur A, Walia S, Kumar K (2018) \u201cComparative analysis of different keypoint based copy-move forgery detection methods,\u201d in 2018 Eleventh International Conference on Contemporary Computing (IC3), pp. 172\u2013176","DOI":"10.1109\/IC3.2018.8530489"},{"key":"13610_CR23","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1007\/978-981-15-5341-7_115","volume-title":"Advances in communication and computational technology","author":"M Kumar","year":"2021","unstructured":"Kumar M, Gupta DK, Singh S (2021) Extreme event forecasting using machine learning models. In: Hura G, Singh A, Siong Hoe L (eds) Advances in communication and computational technology, vol 668. Springer, Singapore, pp 1503\u20131514. https:\/\/doi.org\/10.1007\/978-981-15-5341-7_115"},{"issue":"1","key":"13610_CR24","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s10044-002-0173-7","volume":"6","author":"LI Kuncheva","year":"2003","unstructured":"Kuncheva LI, Whitaker CJ, Shipp CA, Duin RPW (2003) Limits on the majority vote accuracy in classifier fusion. Pattern Anal Applic 6(1):22\u201331. https:\/\/doi.org\/10.1007\/s10044-002-0173-7","journal-title":"Pattern Anal Applic"},{"key":"13610_CR25","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.jvcir.2015.07.007","volume":"31","author":"J-C Lee","year":"2015","unstructured":"Lee J-C (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320\u2013334. https:\/\/doi.org\/10.1016\/j.jvcir.2015.07.007","journal-title":"J Vis Commun Image Represent"},{"key":"13610_CR26","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.neucom.2016.04.068","volume":"228","author":"C Li","year":"2017","unstructured":"Li C, Ma Q, Xiao L, Li M, Zhang A (2017) Image splicing detection based on Markov features in QDCT domain. Neurocomputing 228:29\u201336. https:\/\/doi.org\/10.1016\/j.neucom.2016.04.068","journal-title":"Neurocomputing"},{"key":"13610_CR27","doi-asserted-by":"crossref","unstructured":"Moxey CE, Sangwine SJ, Member S, Ell TA (2003) Hypercomplex correlation techniques for vector images. IEEE Trans Signal Process 51(7):1941\u20131953","DOI":"10.1109\/TSP.2003.812734"},{"key":"13610_CR28","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1007\/978-981-15-5341-7_81","volume-title":"Advances in communication and computational technology","author":"A Saxena","year":"2021","unstructured":"Saxena A, Gupta DK, Singh S (2021) An animal detection and collision avoidance system using deep learning. In: Hura G, Singh A, Siong Hoe L (eds) Advances in communication and computational technology, vol 668. Springer, Singapore, pp 1069\u20131084. https:\/\/doi.org\/10.1007\/978-981-15-5341-7_81"},{"key":"13610_CR29","doi-asserted-by":"crossref","unstructured":"Schauerte B, Stiefelhagen R (2012) \u201cQuaternion-based Spectral Saliency Detection for Eye Fixation Prediction Related Work,\u201d in 12th European conference on Computer Vision, pp. 116\u2013129","DOI":"10.1007\/978-3-642-33709-3_9"},{"key":"13610_CR30","doi-asserted-by":"publisher","unstructured":"Y. Q. Shi, and D. Zou, and, W. Chen, and C. Chen, \u201cImage steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network,\u201d in IEEE International Conference on Multimedia and Expo, 2005, pp. 1\u20134. https:\/\/doi.org\/10.1109\/ICME.2005.1521412.","DOI":"10.1109\/ICME.2005.1521412"},{"key":"13610_CR31","doi-asserted-by":"crossref","unstructured":"Shi YQ, Chen C, Chen W (2007) \u201cA Natural Image Model Approach to Splicing Detection,\u201d in 9th workshop on Multimedia & security, pp. 51\u201362","DOI":"10.1145\/1288869.1288878"},{"key":"13610_CR32","first-page":"1","volume":"6730","author":"P Sutthiwan","year":"2011","unstructured":"Sutthiwan P, Shi YQ, Zhao H, Ng TT, Su W (2011) Markovian Rake Transform for Digital Image Tampering Detection. Trans Data Hiding Multimed Sec VI Lect Notes Comput Sci 6730:1\u201317","journal-title":"Trans Data Hiding Multimed Sec VI Lect Notes Comput Sci"},{"key":"13610_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-016-3941-1","volume":"98","author":"V Thirunavukkarasu","year":"2017","unstructured":"Thirunavukkarasu V, Kumar JS, Chae GS, Kishorkumar J (2017) Non-intrusive forensic detection method using DSWT with reduced feature set for copy-move image. Wirel Pers Commun 98:1\u201319. https:\/\/doi.org\/10.1007\/s11277-016-3941-1","journal-title":"Wirel Pers Commun"},{"key":"13610_CR34","unstructured":"Tralic D, Zupancic I, Grgic I, Grgic M (2013) \u201cCoMoFoD - New Database for Copy-Move Forgery Detection,\u201d in 55th International Symposium ELMAR, pp. 25\u201327"},{"key":"13610_CR35","doi-asserted-by":"publisher","unstructured":"Ustubioglu B et al (2016) Improved copy-move forgery detection based on the CLDs and colour moments. Imaging Sci J 64(4). https:\/\/doi.org\/10.1080\/13682199.2016.1162922","DOI":"10.1080\/13682199.2016.1162922"},{"issue":"2","key":"13610_CR36","first-page":"240","volume":"1","author":"S Walia","year":"2017","unstructured":"Walia S, Kumar K (2017) Pragmatical investigation of frequency-domain and spatial-structure based image forgery detection methods. Intern J Comput Intell IoT 1(2):240\u2013245","journal-title":"Intern J Comput Intell IoT"},{"key":"13610_CR37","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-981-10-8660-1","volume":"828","author":"S Walia","year":"2018","unstructured":"Walia S, Kumar K (2018) An Eagle-Eye View of Recent Digital Image Forgery Detection Methods. Smart Innov Trends Next Gener Comput Technol 828:469\u2013487. https:\/\/doi.org\/10.1007\/978-981-10-8660-1","journal-title":"Smart Innov Trends Next Gener Comput Technol"},{"issue":"5","key":"13610_CR38","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1080\/00450618.2018.1424241","volume":"51","author":"S Walia","year":"2019","unstructured":"Walia S, Kumar K (2019) Digital image forgery detection: a systematic scrutiny. Australian Journal of Forensic Sciences 51(5):488\u2013526. https:\/\/doi.org\/10.1080\/00450618.2018.1424241","journal-title":"Australian Journal of Forensic Sciences"},{"key":"13610_CR39","doi-asserted-by":"publisher","unstructured":"W. Wang, J. Dong, and T. Tan, \u201cImage tampering detection based on stationary distribution of Markov chain,\u201d in IEEE International Conference on Image Processing, 2010, pp. 2101\u20132104. https:\/\/doi.org\/10.1109\/ICIP.2010.5652660.","DOI":"10.1109\/ICIP.2010.5652660"},{"issue":"2","key":"13610_CR40","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TCSVT.2014.2347513","volume":"25","author":"X Zhao","year":"2015","unstructured":"Zhao X, Wang S, Li S, Li J (2015) Passive image splicing detection by a 2-D noncausal Markov model. IEEE Transactions on Circuits and Systems for Video Technology 25(2):185\u2013199","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13610-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13610-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13610-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T09:56:25Z","timestamp":1672826185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13610-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,29]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["13610"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13610-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,29]]},"assertion":[{"value":"20 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors declared that they have no conflict of interest in this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}