{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:18:52Z","timestamp":1764937132654},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11277-019-06739-7","type":"journal-article","created":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T10:36:33Z","timestamp":1575282993000},"page":"503-530","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Copy-Move Forgery Detection Based on Discrete and SURF Transforms"],"prefix":"10.1007","volume":"110","author":[{"given":"Faten Maher","family":"Al_azrak","sequence":"first","affiliation":[]},{"given":"Zeinab F.","family":"Elsharkawy","sequence":"additional","affiliation":[]},{"given":"Ahmed S.","family":"Elkorany","sequence":"additional","affiliation":[]},{"given":"Ghada M.","family":"El Banby","sequence":"additional","affiliation":[]},{"given":"Moawad I.","family":"Dessowky","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,30]]},"reference":[{"key":"6739_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0065-2458(09)01201-7","volume":"77","author":"H Farid","year":"2009","unstructured":"Farid, H. (2009). Photo fakery and forensics. Advances in Computers,77, 1\u201355.","journal-title":"Advances in Computers"},{"key":"6739_CR2","volume-title":"Adobe photoshop forensics: Sleuths, truths, and fauxtography","author":"C Baron","year":"2008","unstructured":"Baron, C. (2008). Adobe photoshop forensics: Sleuths, truths, and fauxtography. Boston: Cengage Learning."},{"issue":"3","key":"6739_CR3","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar, G. K., & Mankar, V. H. (2013). Digital image forgery detection using passive techniques: A survey. Digital Investigation,10(3), 226\u2013245.","journal-title":"Digital Investigation"},{"issue":"1","key":"6739_CR4","first-page":"25","volume":"70","author":"SA Thajeel","year":"2014","unstructured":"Thajeel, S. A., & Ghazali, S. (2014). A survey of copy-move forgery detection techniques. Journal of Theoretical & Applied Information Technology, 70(1), 25\u201335.","journal-title":"Journal of Theoretical & Applied Information Technology"},{"issue":"3","key":"6739_CR5","doi-asserted-by":"publisher","first-page":"3775","DOI":"10.1007\/s11042-016-4087-6","volume":"77","author":"Yi Chen","year":"2018","unstructured":"Chen, Yi, et al. (2018). Sensorineural hearing loss detection via discrete wavelet transform and principal component analysis combined with generalized eigenvalue proximal support vector machine and Tikhonov regularization. Multimedia Tools and Applications,77(3), 3775\u20133793.","journal-title":"Multimedia Tools and Applications"},{"key":"6739_CR6","doi-asserted-by":"crossref","unstructured":"Jwaid, M. F., & Baraskar, T. N. (2017). Study and analysis of copy-move and splicing image forgery detection techniques. In 2017 international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC). IEEE.","DOI":"10.1109\/I-SMAC.2017.8058268"},{"issue":"8","key":"6739_CR7","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1109\/TIFS.2018.2806926","volume":"13","author":"Y Guo","year":"2018","unstructured":"Guo, Y., et al. (2018). Fake colorized image detection. IEEE Transactions on Information Forensics and Security,13(8), 1932\u20131944.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6739_CR8","doi-asserted-by":"publisher","first-page":"21585","DOI":"10.1007\/s11042-019-7206-3","volume":"78","author":"ZF Elsharkawy","year":"2019","unstructured":"Elsharkawy, Z. F., Abdelwahab, S. A. S., Abd El-Samie, F. E., et al. (2019). New and efficient blind detection algorithm for digital image forgery using homomorphic image processing. Multimedia Tools and Applications, 78, 21585\u201321611. https:\/\/doi.org\/10.1007\/s11042-019-7206-3.","journal-title":"Multimedia Tools and Applications"},{"key":"6739_CR9","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"75","author":"NBA Warif","year":"2016","unstructured":"Warif, N. B. A., Choo, K. K. R., Wahab, A. W. A., Shamshirband, S., Ramli, R., Salleh, R., et al. (2016). Copy-move forgery detection: Survey, challenges and future directions. Journal of Network and Computer Applications,75, 259\u2013278.","journal-title":"Journal of Network and Computer Applications"},{"key":"6739_CR10","unstructured":"Fridrich, A. J., Luk\u00e1\u0161, A. J., & Soukal, B. D. (2003). Detection of copy-move forgery in digital images. In Proceedings of digital forensic research workshop."},{"key":"6739_CR11","unstructured":"Farid, H., & Popescu, A. (2004). Exposing digital forgeries by detecting duplicated image regions. Department Computer Science, Dartmouth College, Technology Report TR2004-515 ed."},{"key":"6739_CR12","doi-asserted-by":"crossref","unstructured":"Li, G., Wu, Q., Sun, S., & Tu, D. (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In 2007 IEEE international conference on multimedia and expo (pp. 1750\u20131753).","DOI":"10.1109\/ICME.2007.4285009"},{"key":"6739_CR13","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"B Mahdian","year":"2007","unstructured":"Mahdian, B., & Saic, S. (2007). Detection of copy-move forgery using a method based on blur moment invariants. Forensic Science International,171, 180\u2013189.","journal-title":"Forensic Science International"},{"key":"6739_CR14","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.ins.2013.03.028","volume":"239","author":"G Lynch","year":"2013","unstructured":"Lynch, G., Liao, H.-Y. M., & Shih, F. Y. (2013). An efficient expanding block algorithm for image copy-move forgery detection. Information Sciences,239, 253\u2013265.","journal-title":"Information Sciences"},{"key":"6739_CR15","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Serra, G., Del Bimbo, A., Caldelli, R., & Ballan, L. (2011). A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security,6, 1099\u20131110.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6739_CR16","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s00138-013-0522-0","volume":"25","author":"M Jaberi","year":"2014","unstructured":"Jaberi, M., Muhammad, G., Hussain, M., & Bebis, G. (2014). Accurate and robust localization of duplicated region in copy-move image forgery. Machine Vision and Applications,25, 451\u2013475.","journal-title":"Machine Vision and Applications"},{"key":"6739_CR17","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1016\/j.compeleceng.2013.11.034","volume":"40","author":"L Li","year":"2014","unstructured":"Li, L., Wu, X., Zhu, H., & Li, S. (2014). Detecting copy-move forgery under affine transforms for image forensics. Computers & Electrical Engineering,40, 1951\u20131962.","journal-title":"Computers & Electrical Engineering"},{"key":"6739_CR18","doi-asserted-by":"crossref","unstructured":"Zandi, M., Mansouri, A., & Mahmoudi-Aznaveh, A. (2014). Adaptive matching for copy-move forgery detection. In 2014 IEEE international workshop on information forensics and security (WIFS) (pp. 119\u2013124).","DOI":"10.1109\/WIFS.2014.7084314"},{"key":"6739_CR19","doi-asserted-by":"crossref","unstructured":"Hashmi, M. F., Hambarde, A. R., & Keskar, A. G. (2013). Copy move forgery detection using DWT and SIFT features. In 2013 13th international conference on intellient systems design and applications. IEEE.","DOI":"10.1109\/ISDA.2013.6920733"},{"key":"6739_CR20","doi-asserted-by":"crossref","unstructured":"Hashmi, M. F., Anand, V., & Keskar, A. G. (2014). A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms. In 2014 international conference on computer and communication technology (ICCCT). IEEE.","DOI":"10.1109\/ICCCT.2014.7001483"},{"key":"6739_CR21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao, Y., Yang, Q., Fan, L., & Gao, T. (2012). A robust detection algorithm for copy-move forgery in digital images. Forensic Science International,214, 33\u201343.","journal-title":"Forensic Science International"},{"key":"6739_CR22","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1090\/S0025-5718-1978-0468306-4","volume":"34","author":"S Winograd","year":"1978","unstructured":"Winograd, S. (1978). On computing the discrete Fourier transform. Mathematics of Computation,34, 175\u2013199.","journal-title":"Mathematics of Computation"},{"key":"6739_CR23","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1023\/A:1011183429707","volume":"43","author":"ZM Hafed","year":"2001","unstructured":"Hafed, Z. M., & Levine, M. D. (2001). Face recognition using the discrete cosine transform. International Journal of Computer Vision,43, 167\u2013188.","journal-title":"International Journal of Computer Vision"},{"key":"6739_CR24","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s11266-006-4191-3","volume":"42","author":"T Acharya","year":"2006","unstructured":"Acharya, T., & Chakrabarti, C. (2006). A survey on lifting-based discrete wavelet transform architectures. Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology,42, 321\u2013339.","journal-title":"Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology"},{"key":"6739_CR25","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.isprsjprs.2007.05.009","volume":"62","author":"K Amolins","year":"2007","unstructured":"Amolins, K., Dare, P., & Zhang, Y. (2007). Wavelet based image fusion techniques\u2014An introduction, review and comparison. ISPRS Journal of Photogrammetry and Remote Sensing,62, 249\u2013263.","journal-title":"ISPRS Journal of Photogrammetry and Remote Sensing"},{"key":"6739_CR26","unstructured":"Fridrich, A., et al. (2003). Detection of copy-move forgery in digital images."},{"key":"6739_CR27","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang, Y., Long, D., Sun, W., & Lu, W. (2011). Improved DCT-based detection of copy-move forgery in images. Forensic Science International,206, 178\u2013184.","journal-title":"Forensic Science International"},{"key":"6739_CR28","unstructured":"Popescu, A., & Farid, H. (2004). Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Technical Report TR2004-515."},{"key":"6739_CR29","doi-asserted-by":"crossref","unstructured":"Dang-Nguyen, D. T., Boato, G., Conotter, V., & Pasquini, C. (2015). RAISE: A raw images dataset for digital image forensics. In Proceedings of the 6th ACM multimedia systems conference (pp. 219\u2013224).","DOI":"10.1145\/2713168.2713194"},{"key":"6739_CR30","doi-asserted-by":"crossref","unstructured":"Harris, C., & Stephens, M. (1988). A combined corner and edge detector. In Proceedings of the Alvey vision conference (pp. 147\u2013151).","DOI":"10.5244\/C.2.23"},{"key":"6739_CR31","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2011","unstructured":"Bay, H., Ess, A., Tuytelaars, T., & Van Gool, L. (2011). Speeded-up robust features (SURF). Computer Vision and Image Understanding,110, 346\u2013359.","journal-title":"Computer Vision and Image Understanding"},{"key":"6739_CR32","unstructured":"Pedersen, J. T. (2011). Study group SURF: Feature detection and description. Department of Computer Science, Aarhus University, Q4-2011."},{"key":"6739_CR33","doi-asserted-by":"crossref","unstructured":"Muthugnanambika, M., & Padmavathi, S. (2017). Feature detection for color images using SURF. In International conference on advanced computing and communication systems, IEEE.","DOI":"10.1109\/ICACCS.2017.8014572"},{"issue":"2","key":"6739_CR34","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/TIFS.2010.2041826","volume":"5","author":"G Gul","year":"2010","unstructured":"Gul, G., & Kurugollu, F. (2010). SVD-based universal spatial domain image steganalysis. IEEE Transactions on Information Forensics and Security,5(2), 349\u2013353.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06739-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06739-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06739-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,29]],"date-time":"2020-11-29T00:36:04Z","timestamp":1606610164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06739-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,30]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["6739"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06739-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,30]]},"assertion":[{"value":"30 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}