{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T06:58:56Z","timestamp":1768719536389,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T00:00:00Z","timestamp":1555286400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11265-019-01449-6","type":"journal-article","created":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T16:05:04Z","timestamp":1555344304000},"page":"55-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Method for Detecting of Clone Areas in a Digital Image under Conditions of Additional Attacks"],"prefix":"10.1007","volume":"92","author":[{"given":"Alla A.","family":"Kobozeva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4548-0709","authenticated-orcid":false,"given":"Ivan I.","family":"Bobok","sequence":"additional","affiliation":[]},{"given":"Svitlana M.","family":"Grygorenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,15]]},"reference":[{"issue":"6","key":"1449_CR1","first-page":"174","volume":"10","author":"SA Thajeel","year":"2013","unstructured":"Thajeel, S. A., & Bin Sulong, G. (2013). State of the art of copy-move forgery detection techniques: a review. IJCSI International Journal of Computer Science, 10(6), 174\u2013183.","journal-title":"IJCSI International Journal of Computer Science"},{"key":"1449_CR2","unstructured":"Huang, H., Guo, W., & Zhang, Y. (2008). Detection of copy-move forgery in digital image using SIFT algorithm. Proceedings of IEEE Pacific\u2013Asia workshop on computational intelligence and industrial application (PACIIA\u201908) (Pages: 272\u2013276 Year of Publication: 2008 ISBN 9780769534909)."},{"issue":"3","key":"1449_CR3","first-page":"1437","volume":"4","author":"PS Kotkar","year":"2014","unstructured":"Kotkar, P. S., & Shriramwar, S. S. (2014). Detecting region duplication forgery in digital image using SIFT features. International Journal of Current Engineering and Technology, 4(3), 1437\u20131440.","journal-title":"International Journal of Current Engineering and Technology"},{"issue":"4","key":"1449_CR4","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"X Pan","year":"2010","unstructured":"Pan, X., & Lyu, S. (2010). Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security, 5(4), 857\u2013867.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"1449_CR5","first-page":"659","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., & Serra, G. (2013). Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Processing: Image Communication, 28(6), 659\u2013669.","journal-title":"Signal Processing: Image Communication"},{"issue":"1","key":"1449_CR6","first-page":"10187","volume":"4","author":"NP Joglekar","year":"2015","unstructured":"Joglekar, N. P., & Chatur, P. N. (2015). A compressive survey on active and passive methods for image forgery detection. International Journal of Engineering and Computer Science, 4(1), 10187\u201310190.","journal-title":"International Journal of Engineering and Computer Science"},{"issue":"5","key":"1449_CR7","first-page":"3610","volume":"11","author":"R Singh","year":"2016","unstructured":"Singh, R., & Kaur, M. (2016). Copy move tampering detection techniques: A review. International Journal of Applied Engineering Research, 11(5), 3610\u20133615.","journal-title":"International Journal of Applied Engineering Research"},{"issue":"2","key":"1449_CR8","first-page":"419","volume":"5","author":"RS Oommen","year":"2015","unstructured":"Oommen, R. S., Jayamohan, M., & Sruthy, S. (2015). A survey of copy-move forgery detection techniques for digital images. International Journal of Innovations in Engineering and Technology, 5(2), 419\u2013426.","journal-title":"International Journal of Innovations in Engineering and Technology"},{"issue":"1","key":"1449_CR9","first-page":"482","volume":"6","author":"SS Mangat","year":"2016","unstructured":"Mangat, S. S., & Kaur, H. (2016). A review of literature on copy-move forgery detection techniques. International Journal of Computer Science and Information Technology & Security, 6(1), 482\u2013486.","journal-title":"International Journal of Computer Science and Information Technology & Security"},{"issue":"2","key":"1449_CR10","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian, B., & Saic, S. (2007). Detection of copy\u2013move forgery using a method based on blur moment invariants. Forensic Science International, 171(2), 180\u2013189.","journal-title":"Forensic Science International"},{"key":"1449_CR11","unstructured":"Zahra, M., & Pouyan, A. A. (2013). Detection of duplication forgery in digital images in uniform and nonuniform regions. Proceedings of the 15th international conference on computer modelling and simulation (UKSIM\u201913) (Pages: 455\u2013460 Year of Publication: 2013 ISBN 978-0-7695-4994-1)."},{"key":"1449_CR12","first-page":"93","volume":"35","author":"VK Singh","year":"2011","unstructured":"Singh, V. K., & Tripathi, R. C. (2011). Fast and efficient region duplication detection in digital images using sub-blocking method. International Journal of Advanced Science and Technology, 35, 93\u2013102.","journal-title":"International Journal of Advanced Science and Technology"},{"key":"1449_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5121\/csit.2012.2303","volume":"52","author":"M Sridevi","year":"2012","unstructured":"Sridevi, M., Mala, C., & Sandeep, S. (2012). Copy\u2013move image forgery detection. Computer Science & Information Technology, 52, 19\u201329.","journal-title":"Computer Science & Information Technology"},{"issue":"6","key":"1449_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.5815\/ijigsp.2015.06.05","volume":"7","author":"S Kumar","year":"2015","unstructured":"Kumar, S., V. Desai, J., & Mukherjee, S. (2015). Copy move forgery detection in contrast variant environment using binary DCT vectors. International Journal of Image, Graphics and Signal Processing, 7(6), 38\u201344.","journal-title":"International Journal of Image, Graphics and Signal Processing"},{"key":"1449_CR15","unstructured":"Hsu, H.-C., & Wang, M.-S. (2012). Detection of copy-move forgery image using Gabor descriptor. Proceedings of the international conference on anti-counterfeiting, Security and Identification (ASID\u201912) (Pages: 1\u20134 Year of Publication: 2012 ISBN 9781467321440)."},{"key":"1449_CR16","unstructured":"Quan, X., & Zhang, H. (2012). Copy-move forgery detection in digital images based on local dimension estimation. Proceedings of the international conference on cyber security, cyber warfare and digital forensic (CyberSec\u201912) (Pages: 180\u2013185 Year of Publication: 2012 ISBN 9781467314251)."},{"key":"1449_CR17","first-page":"191","volume":"1","author":"M Brajic","year":"2016","unstructured":"Brajic, M., Tuba, E., & Jovanovic, R. (2016). Overlapping block based algorithm for copy-move forgery detection in digital images. International Journal of Computers, 1, 191\u2013198.","journal-title":"International Journal of Computers"},{"key":"1449_CR18","unstructured":"Kirchner, M., Schoettle, P., & Riess, C. (2015). Thinking beyond the block: Block matching for copy-move forgery detection revisited. Proceedings of SPIE media watermarking, security, and forensics 2015 (Page: 940903 Year of Publication: 2015 ISBN 9781628414998)."},{"key":"1449_CR19","unstructured":"Maind, R.A., Khade, A., Chitre, D.K. (2014). Image copy move forgery detection using block representing method. International Journal of Soft Computing and Engineering, 4(2), 49\u201353."},{"issue":"2","key":"1449_CR20","first-page":"7","volume":"16","author":"H Kaur","year":"2015","unstructured":"Kaur, H., Saxena, J., & Singh, S. (2015). Key-point based copy-move forgery detection and their hybrid methods: a review. Journal of The International Association of Advanced Technology and Science, 16(2), 7.","journal-title":"Journal of The International Association of Advanced Technology and Science"},{"issue":"2","key":"1449_CR21","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s11042-014-2010-6","volume":"74","author":"L Yu","year":"2015","unstructured":"Yu, L., Han, Q., & Niu, X. (2015). Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications, 74(2), 1159\u20131176.","journal-title":"Multimedia Tools and Applications"},{"issue":"12","key":"1449_CR22","first-page":"175","volume":"12","author":"C Prema","year":"2013","unstructured":"Prema, C., \u0420ercy Granaph, J., Angaline, S., & Belsi, I. T. (2013). A keypoint based copy-move forgery detection. International Journal of Advanced Information Science and Technology, 12(12), 175\u2013180.","journal-title":"International Journal of Advanced Information Science and Technology"},{"key":"1449_CR23","unstructured":"Pan, X., & Lyu, S. (2010). Detecting image region duplication using SIFT features. Proceedings of the international conference on acoustics, speech and signal processing (ICASSP\u201910) (Pages: 1706\u20131709 Year of Publication: 2010 ISBN 9781424442959)."},{"key":"1449_CR24","unstructured":"Bo, X., Junwen, W., Guangjie, L., & Yuewei, D. (2010). Image copy-move forgery detection based on SURF. Proceedings of second international conference on multimedia information networking and security (MINES\u20192010) (Pages: 889\u2013892 Year of Publication: 2010 ISBN 9781424486267)."},{"issue":"17","key":"1449_CR25","doi-asserted-by":"publisher","first-page":"521","DOI":"10.4156\/ijact.vol4.issue17.61","volume":"4","author":"G Zhang","year":"2012","unstructured":"Zhang, G., & Wang, H. (2012). SURF-based detection of copy-move forgery in flat region. International Journal of Advancements in Computing Technology, 4(17), 521\u2013529.","journal-title":"International Journal of Advancements in Computing Technology"},{"issue":"3","key":"1449_CR26","first-page":"53","volume":"1","author":"J Zheng","year":"2012","unstructured":"Zheng, J., Hao, W., & Zhu, W. (2012). Detection of copy-move forgery based on keypoints\u2019 positional relationship. Journal of Information and Computational Science, 1(3), 53\u201360.","journal-title":"Journal of Information and Computational Science"},{"issue":"2","key":"1449_CR27","first-page":"13219","volume":"8","author":"S Hemalatha","year":"2016","unstructured":"Hemalatha, S., & Kumar, S. S. (2016). Image forgery detection using key-point extraction and segmentation. International Journal of Pharmacy & Technology, 8(2), 13219\u201313229.","journal-title":"International Journal of Pharmacy & Technology"},{"issue":"7","key":"1449_CR28","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/sym8070062","volume":"8","author":"DM Uliyan","year":"2016","unstructured":"Uliyan, D. M., Jalab, H. A., Abdul Wahab, A. W., & Sadeghi, S. (2016). Image region duplication forgery detection based on angular radial partitioning and Harris key-points. Symmetry, 8(7), 62\u201379.","journal-title":"Symmetry"},{"issue":"3","key":"1449_CR29","first-page":"21","volume":"5","author":"AM Venitta","year":"2016","unstructured":"Venitta, A. M., & Kumari, V. S. (2016). Image forgery detection using feature point matching. International Journal of Innovative Research in Science, Engineering and Technology, 5(3), 21\u201331.","journal-title":"International Journal of Innovative Research in Science, Engineering and Technology"},{"issue":"3","key":"1449_CR30","first-page":"859","volume":"4","author":"S Saravana Kumar","year":"2016","unstructured":"Saravana Kumar, S., Barath, R., & Nirmal, A. G. J. (2016). Copy move forgery image detection. International Journal of Advanced Research in Computer Science Engineering and Information Technology, 4(3), 859\u2013864.","journal-title":"International Journal of Advanced Research in Computer Science Engineering and Information Technology"},{"key":"1449_CR31","unstructured":"Bharathi, V., & Dhivyabarathi, D. (2016). An implementation of block and keypoint based forgery detection scheme. Proceedings of the international conference on current research in engineering science and technology (ICCREST-2016) (Pages: 55\u201360 Year of Publication: 2016 E-ISSN 2348-8549)."},{"key":"1449_CR32","unstructured":"Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing (2nd Ed.). Upper Saddle River, NJ: Prentice Hall."},{"issue":"4","key":"1449_CR33","first-page":"21","volume":"17","author":"AA Kobozeva","year":"2015","unstructured":"Kobozeva, A. A., & Grigorenko, S. N. (2015). Theoretical principles of solution the detection cloning results for a digital image saved in lossy format. Data Rec., Storage & Processing, 17(4), 21\u201330.","journal-title":"Data Rec., Storage & Processing"},{"key":"1449_CR34","unstructured":"United States Department of Agriculture. NRCS photo gallery. Retrieved from \nhttp:\/\/photogallery.nrcs.usda.gov\n\n. Accessed 20 Nov 2017."},{"key":"1449_CR35","first-page":"72","volume":"3","author":"VV Zorilo","year":"2010","unstructured":"Zorilo, V. V., & Kobozeva, A. A. (2010). Fundamentals of method for the detection of results of blurring an image. Suchasna Spetsialna Tekhnika, 3, 72\u201382.","journal-title":"Suchasna Spetsialna Tekhnika"},{"key":"1449_CR36","unstructured":"Konahovich, G. F., & Puzyrenko, A. Yu. (2006). Computer steganography: Theory and practice. Kyiv: MK-Press."},{"issue":"5","key":"1449_CR37","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1016\/j.jnca.2010.09.001","volume":"34","author":"G Liu","year":"2011","unstructured":"Liu, G., Wang, J., Lian, S., & Wang, Z. (2011). A passive image authentication scheme for detecting region-duplication forgery with rotation. Journal of Network and Computer Applications, 34(5), 1557\u20131565.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"1449_CR38","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099\u20131110.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1449_CR39","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.aasri.2014.09.015","volume":"9","author":"MF Hashmi","year":"2014","unstructured":"Hashmi, M. F., Anand, V., & Keskar, A. G. (2014). Copy-move image forgery detection using efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia, 9, 84\u201391.","journal-title":"AASRI Procedia"},{"key":"1449_CR40","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1155\/2016\/8713202","volume":"2016","author":"T Mahmood","year":"2016","unstructured":"Mahmood, T., Nawaz, T., Irtaza, A., Ashraf, R., Shah, M., & Mahmood, M. T. (2016). Copy-move forgery detection technique for forensic analysis in digital images. Mathematical Problems in Engineering, 2016, 13.","journal-title":"Mathematical Problems in Engineering"},{"key":"1449_CR41","unstructured":"Uliyan, D.M., Jalab, H.A., & Abdul Wahab, A.W. (2015). Copy move image forgery detection using hessian and center symmetric local binary pattern. Proceedings of IEEE conference on open systems (ICOS\u201915) (Pages: 7\u201311 Year of Publication: 2015 ISBN 9781467394345)."},{"issue":"5","key":"1449_CR42","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5120\/ijca2016908749","volume":"137","author":"M Deoli","year":"2016","unstructured":"Deoli, M., & Joshi, J. (2016). A fast and robust approach to detect copy-move forgery in digital images. International Journal of Computer Applications, 137(5), 29\u201333.","journal-title":"International Journal of Computer Applications"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-019-01449-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11265-019-01449-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-019-01449-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T23:42:54Z","timestamp":1586821374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11265-019-01449-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,15]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["1449"],"URL":"https:\/\/doi.org\/10.1007\/s11265-019-01449-6","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,15]]},"assertion":[{"value":"23 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}