{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:44:40Z","timestamp":1773413080988,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17485-1","type":"journal-article","created":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T07:02:53Z","timestamp":1699081373000},"page":"50157-50195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Gabor Filter and Centre Symmetric-Local Binary Pattern based technique for forgery detection in images"],"prefix":"10.1007","volume":"83","author":[{"given":"Prabhat Kumar","family":"Srivastava","sequence":"first","affiliation":[]},{"given":"Ghanshyam","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6260-6353","authenticated-orcid":false,"given":"Sachin","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Neelesh Kumar","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Vikram","family":"Bali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,4]]},"reference":[{"key":"17485_CR1","unstructured":"Ganesan C, Bhuma VR (2014) Digital image forgery detection using color illumination and decision tree classification Int J Eng Res Appl 2014:18\u201323"},{"key":"17485_CR2","doi-asserted-by":"crossref","unstructured":"Mohammadian Fini R, Mahlouji M, Shahidinejad A (2022) Performance improvement in face recognition system using optimized Gabor filters. Multimed Tools Appl 81:38375\u201338408","DOI":"10.1007\/s11042-022-13167-6"},{"issue":"2","key":"17485_CR3","doi-asserted-by":"publisher","first-page":"110","DOI":"10.3390\/info11020110","volume":"11","author":"M Begum","year":"2020","unstructured":"Begum M, Uddin MS (2020) Digital image watermarking techniques: a review. Information 11(2):110","journal-title":"Information"},{"key":"17485_CR4","unstructured":"Jha K, Shirwadkar K, Narvekar T, Kothari I, Jacob S (2020) Digital image forgery detection. Int Res J Eng Technol 7(5):4542\u20134547"},{"key":"17485_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117207","volume":"201","author":"RR Jingade","year":"2022","unstructured":"Jingade RR, Kunte RS (2022) DOG-ADTCP: a new feature descriptor for protection of face identification system. Expert Syst Appl 201:117207","journal-title":"Expert Syst Appl"},{"key":"17485_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.108210","volume":"116","author":"C Li","year":"2022","unstructured":"Li C, Huang W, Huang Y (2022) Gabor log-euclidean gaussian and its fusion with deep network based on self-attention for face recognition. Appl Soft Comput 116:108210","journal-title":"Appl Soft Comput"},{"issue":"4","key":"17485_CR7","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1093\/comjnl\/bxaa137","volume":"65","author":"A Kashyap","year":"2022","unstructured":"Kashyap A, Suresh B, Gupta H (2022) Robust detection of copy-move forgery based on wavelet decomposition and firefly algorithm. Comput J 65(4):983\u2013996","journal-title":"Comput J"},{"issue":"6","key":"17485_CR8","doi-asserted-by":"publisher","first-page":"1298","DOI":"10.1049\/ipr2.12105","volume":"15","author":"A Diwan","year":"2021","unstructured":"Diwan A, Sharma R, Roy AK, Mitra SK (2021) Keypoint based comprehensive copy-move forgery detection. IET Image Proc 15(6):1298\u20131309","journal-title":"IET Image Proc"},{"key":"17485_CR9","doi-asserted-by":"crossref","unstructured":"Kumar S, Desai J, Mukherjee S (2013) A fast DCT based method for copy move forgery detection. In Image Information Processing (ICIIP), 2013 IEEE Second International Conference on (pp. 649\u2013654). IEEE","DOI":"10.1109\/ICIIP.2013.6707675"},{"key":"17485_CR10","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TIFS.2020.3045903","volume":"16","author":"M Barni","year":"2020","unstructured":"Barni M, Phan QT, Tondi B (2020) Copy moves source-target disambiguation through multi-branch CNNs. IEEE Trans Inf Forensics Secur 16:1825\u20131840","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"17485_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7070119","volume":"7","author":"M Gardella","year":"2021","unstructured":"Gardella M, Mus\u00e9 P, Morel JM, Colom M (2021) Forgery detection in digital images by multi-scale noise estimation. J Imaging 7(7):119","journal-title":"J Imaging"},{"issue":"2","key":"17485_CR12","first-page":"11","volume":"14","author":"E Amiri","year":"2021","unstructured":"Amiri E, Mosallanejad A, Sheikhahmadi A (2021) Copy-move forgery detection by an optimal keypoint on SIFT (OKSIFT) Method. J Comput Rob 14(2):11\u201319","journal-title":"J Comput Rob"},{"issue":"2","key":"17485_CR13","doi-asserted-by":"publisher","first-page":"2161","DOI":"10.1007\/s11042-020-09707-7","volume":"80","author":"P Niyishaka","year":"2021","unstructured":"Niyishaka P, Bhagvati C (2021) Image splicing detection technique based on illumination-reflectance model and LBP. Multimed Tools Appl 80(2):2161\u20132175","journal-title":"Multimed Tools Appl"},{"issue":"39","key":"17485_CR14","doi-asserted-by":"publisher","first-page":"28643","DOI":"10.1007\/s11042-020-09502-4","volume":"79","author":"S Al Zahir","year":"2020","unstructured":"Al Zahir S, Hammad R (2020) Image forgery detection using image similarity. Multimed Tools Appl 79(39):28643\u201328659","journal-title":"Multimed Tools Appl"},{"key":"17485_CR15","doi-asserted-by":"publisher","first-page":"104456","DOI":"10.1016\/j.engappai.2021.104456","volume":"106","author":"AR Javed","year":"2021","unstructured":"Javed AR, Jalil Z, Zehra W, Gadekallu TR, Suh DY, Piran MJ (2021) A comprehensive survey on digital video forensics: taxonomy, challenges, and future directions. Eng Appl Artif Intell 106:104456","journal-title":"Eng Appl Artif Intell"},{"key":"17485_CR16","unstructured":"VinodKumar RS (2016) A comparative analysis of histogram of gradient (HOG), Gabor filter bank and DCT based feature extraction methods used for fingerprint recognition Int J Sci Eng Res 7(4):321\u2013326"},{"key":"17485_CR17","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.future.2021.06.043","volume":"125","author":"J Yang","year":"2021","unstructured":"Yang J, Xiao S, Li A, Lan G, Wang H (2021) Detecting fake images by identifying potential texture difference. Futur Gener Comput Syst 125:127\u2013135","journal-title":"Futur Gener Comput Syst"},{"key":"17485_CR18","doi-asserted-by":"crossref","unstructured":"Abinaya D, Priyanka C, Stefinjain MR, Venkatesan GDP, Kamalraj S (2021) Classification of Facial Expression Recognition using Machine Learning Algorithms. In Journal of Physics: Conference Series (Vol. 1937, No. 1, p. 012001). IOP Publishing","DOI":"10.1088\/1742-6596\/1937\/1\/012001"},{"key":"17485_CR19","doi-asserted-by":"crossref","unstructured":"Kaur G, Singh N, Kumar M (2023) Image Forgery techniques: a review. Artif Intell Rev 56:1577\u20131625","DOI":"10.1007\/s10462-022-10211-7"},{"issue":"3","key":"17485_CR20","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2013","unstructured":"Fridrich J, Kodovsky J, Lukas J (2013) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"17485_CR21","first-page":"041101","volume":"24","author":"S Bayram","year":"2015","unstructured":"Bayram S, Sencar HT (2015) A survey of copy-move forgery detection methods. J Electron Imaging 24(4):041101","journal-title":"J Electron Imaging"},{"key":"17485_CR22","first-page":"37","volume":"21","author":"A Gupta","year":"2017","unstructured":"Gupta A, Singh G (2017) Image forgery detection techniques: a comprehensive review. Digit Invest 21:37\u201354","journal-title":"Digit Invest"},{"issue":"2\u20133","key":"17485_CR23","first-page":"45","volume":"11","author":"AA Al-Fatlawi","year":"2019","unstructured":"Al-Fatlawi AA, Ibrahim R (2019) Image forgery detection techniques: a review. J Telecommun Electron Comput Eng 11(2\u20133):45\u201349","journal-title":"J Telecommun Electron Comput Eng"},{"issue":"4","key":"17485_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2010.2091354","volume":"5","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) A survey of passive techniques for digital image forensics. IEEE Trans Inf Forensics Secur 5(4):1\u201320","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"17485_CR25","first-page":"395","volume":"9","author":"M Hussain","year":"2018","unstructured":"Hussain M, Muhammad K, Ali T, Afzal MK (2018) Image forgery detection techniques: a review. J Ambient Intell Humaniz Comput 9(2):395\u2013416","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"17485_CR26","first-page":"243","volume":"59","author":"D Das","year":"2019","unstructured":"Das D, Bhowmik MK, Nasipuri M (2019) A survey on image forensics techniques and applications. J Vis Commun Image Represent 59:243\u2013267","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"17485_CR27","first-page":"63","volume":"47","author":"G Chierchia","year":"2014","unstructured":"Chierchia G, Poggi G, Sansone C (2014) A comprehensive survey on vision-based techniques for grayscale and color image forgery detection. ACM-CSUR 47(4):63","journal-title":"ACM-CSUR"},{"issue":"1","key":"17485_CR28","first-page":"1","volume":"1","author":"A Agarwal","year":"2017","unstructured":"Agarwal A, Kumar V, Gupta P (2017) Image forgery detection techniques: a comprehensive review. J Electr Eng Autom 1(1):1\u201312","journal-title":"J Electr Eng Autom"},{"issue":"8","key":"17485_CR29","first-page":"9861","volume":"77","author":"S Roy","year":"2018","unstructured":"Roy S, Das D, Nasipuri M (2018) Digital image forgery detection using visual descriptors: a comprehensive survey. Multimed Tools Appl 77(8):9861\u20139892","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17485-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17485-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17485-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T07:12:10Z","timestamp":1715757130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17485-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,4]]},"references-count":29,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17485"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17485-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,4]]},"assertion":[{"value":"15 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests"}}]}}