{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T07:02:49Z","timestamp":1776322969501,"version":"3.50.1"},"reference-count":124,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T00:00:00Z","timestamp":1579651200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T00:00:00Z","timestamp":1579651200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11277-020-07102-x","type":"journal-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T18:03:19Z","timestamp":1579716199000},"page":"1281-1302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Image and Video Forensics: A Critical Survey"],"prefix":"10.1007","volume":"112","author":[{"given":"Harpreet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Neeru","family":"Jindal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"issue":"2","key":"7102_CR1","first-page":"419","volume":"5","author":"RS Oommen","year":"2015","unstructured":"Oommen, R. S., Jayamohan, M., & Sruthy, S. (2015). A survey of copy move forgery detection techniques for digital images. International Journal of Innovations in Engineering and Technology (IJIET),5(2), 419\u2013426.","journal-title":"International Journal of Innovations in Engineering and Technology (IJIET)"},{"issue":"7","key":"7102_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.14257\/ijsip.2015.8.7.25","volume":"8","author":"N Singhal","year":"2015","unstructured":"Singhal, N., & Gandhani, S. (2015). Analysis of copy\u2013move forgery image forensics: A review. International journal of Signal Processing Image Processing and Pattern Recognition,8(7), 265\u2013272.","journal-title":"International journal of Signal Processing Image Processing and Pattern Recognition"},{"issue":"3","key":"7102_CR3","first-page":"756","volume":"3","author":"V Sharma","year":"2016","unstructured":"Sharma, V., Jha, S., & Bharti, R. K. (2016). Image forgery and it\u2019s detection technique: A review. International Research Journal of Engineering and Technology (IRJET),3(3), 756\u2013762.","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"key":"7102_CR4","doi-asserted-by":"crossref","unstructured":"Wahab, A. W. A., et al. (2014). Passive video forgery detection techniques: A survey. In Proceedings of 10th international conference on information assurance and security (pp. 19\u201334).","DOI":"10.1109\/ISIAS.2014.7064616"},{"key":"7102_CR5","first-page":"3463","volume":"6","author":"Z Zhang","year":"2008","unstructured":"Zhang, Z., et al. (2008). A survey on passive-blind image forgery by doctor method. Proceedings of International Conference on Machine Learning and Cybernetics,6, 3463\u20133467.","journal-title":"Proceedings of International Conference on Machine Learning and Cybernetics"},{"issue":"1","key":"7102_CR6","first-page":"87","volume":"4","author":"S Jaseela","year":"2016","unstructured":"Jaseela, S., & Nishadha, S. G. (2016). Survey on copy move image forgery detection techniques. International Journal of Computer Science Trends and Technology (IJCST),4(1), 87\u201391.","journal-title":"International Journal of Computer Science Trends and Technology (IJCST)"},{"issue":"1","key":"7102_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/09747338.2014.921415","volume":"55","author":"MD Ansari","year":"2014","unstructured":"Ansari, M. D., Ghrera, S. P., & Tyagi, V. (2014). Pixel-based image forgery detection: A review. IETE Journal of Education,55(1), 40\u201346.","journal-title":"IETE Journal of Education"},{"issue":"4","key":"7102_CR8","first-page":"654","volume":"3","author":"R Singh","year":"2016","unstructured":"Singh, R., & Thakkar, M. (2016). Copy move image forgery detection techniques: Survey. International Journal of Modern Trends in Engineering and Research,3(4), 654\u2013657.","journal-title":"International Journal of Modern Trends in Engineering and Research"},{"issue":"2","key":"7102_CR9","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s00530-017-0538-9","volume":"24","author":"RD Singh","year":"2018","unstructured":"Singh, R. D., & Aggarwal, N. (2018). Video content authentication techniques: A comprehensive survey. Multimedia Systems,24(2), 211\u2013240.","journal-title":"Multimedia Systems"},{"issue":"6","key":"7102_CR10","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0608-66","volume":"298","author":"F Hany","year":"2008","unstructured":"Hany, F. (2008). Digital image forensics. Scientific American,298(6), 66\u201371.","journal-title":"Scientific American"},{"issue":"1","key":"7102_CR11","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"JA Redi","year":"2011","unstructured":"Redi, J. A., Taktak, W., & Dugelay, J. L. (2011). Digital image forensics: a booklet for beginners. Multimedia Tools Application,51(1), 133\u2013162.","journal-title":"Multimedia Tools Application"},{"key":"7102_CR12","doi-asserted-by":"crossref","unstructured":"Parveen, A., Tayal, A. (2016) An algorithm to detect the forged part in an image. In Proceedings of 2nd international conference on communication and signal processing (pp. 1486\u20131490).","DOI":"10.1109\/ICCSP.2016.7754405"},{"key":"7102_CR13","doi-asserted-by":"crossref","unstructured":"Fadl, S. M., Semary, N. O. A., & Hadhoud, M. M. (2014). Copy\u2013rotate\u2013move forgery detection based on spatial domain. In Proceedings of 9th international conference on computer engineering and systems (pp. 136\u2013141).","DOI":"10.1109\/ICCES.2014.7030944"},{"key":"7102_CR14","first-page":"169","volume":"1","author":"X Ren","year":"2009","unstructured":"Ren, X. (2009). An optimal image thresholding using genetic algorithm. International Forum on Computer Science-Technology and Applications,1, 169\u2013172.","journal-title":"International Forum on Computer Science-Technology and Applications"},{"key":"7102_CR15","unstructured":"Hussain, M., Muhammad, G., Saleh, S. Q., Mirza, A. M., & Bebis, G. (2013). Copy\u2013move image Forgery detection using multi-resolution weber descriptors. In Proceedings of 8th international conference on signal image technology and internet based systems (pp. 1570\u20131577)."},{"key":"7102_CR16","unstructured":"Shahbahrami, A., Borodin, D., & Juurlink, B. (2008). Comparison between color and texture features for image retrieval. In Proceedings of conference (pp. 1\u201311)."},{"key":"7102_CR17","doi-asserted-by":"crossref","unstructured":"Lin, S. D., & Wu, T. (2011). An integrated technique for splicing and copy\u2013move forgery image detection. In Proceedings of 4th international conference on image and signal processing (pp. 1086\u20131090).","DOI":"10.1109\/CISP.2011.6100366"},{"key":"7102_CR18","doi-asserted-by":"crossref","unstructured":"Yao, H., Qiao, T., Tang, Z., Zhao Y., & Mao, H. (2011). Detecting copy\u2013move forgery using non-negative matrix factorization. In Proceedings of 2nd international conference on multimedia information networking and security (pp. 591\u2013594).","DOI":"10.1109\/MINES.2011.104"},{"issue":"3","key":"7102_CR19","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Bimbo, A. D., & Serra, G. (2011). A SIFT-Based forensic method for copy\u2013move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security,6(3), 1099\u20131110.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7102_CR20","doi-asserted-by":"crossref","unstructured":"Lin, S. D., & Wu, T. (2011). An integrated technique for splicing and copy\u2013move forgery image detection. In Proceedings of 4th international conference on image and signal processing (Vol. 2, pp. 1086\u20131091).","DOI":"10.1109\/CISP.2011.6100366"},{"key":"7102_CR21","doi-asserted-by":"crossref","unstructured":"Agarwal, V., & Mane, V. (2016). Reflective SIFT for improving the detection of copy\u2013move image forgery. In Proceedings of 2nd international conference on research in computational intelligence and communication networks (pp. 84\u201388).","DOI":"10.1109\/ICRCICN.2016.7813636"},{"key":"7102_CR22","doi-asserted-by":"crossref","unstructured":"Shahroudnejad, A., & Rahmati, M. (2016). Copy\u2013move forgery detection in digital images using affine-SIFT. In Proceedings of 2nd international conference of signal processing and intelligent systems (pp. 1\u20135).","DOI":"10.1109\/ICSPIS.2016.7869896"},{"key":"7102_CR23","unstructured":"Ting, Z., & Rang-ding, W. (2009). Copy\u2013move forgery detection based on SVD in digital image. In Proceedings of 2nd international conference on image and signal processing (pp. 1\u20135)."},{"issue":"12","key":"7102_CR24","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He, Z., Lu, W., Sun, W., & Huang, J. (2012). Digital image splicing detection based on markov features in DCT and DWT domain. Pattern Recognition,45(12), 4292\u20134299.","journal-title":"Pattern Recognition"},{"key":"7102_CR25","doi-asserted-by":"crossref","unstructured":"Sridevi, M., Mala, C., & Sandeep, S. (2012). Copy \u2013 move image forgery detection in a parallel environment. In Proceedings of CS & IT Computer science\u00a0conference proceedings (CSCP) (pp. 19\u201329).","DOI":"10.5121\/csit.2012.2303"},{"key":"7102_CR26","doi-asserted-by":"crossref","unstructured":"Kang, L., & Cheng, X. P. (2010). Copy\u2013move forgery detection in digital image. In Proceedings of 3rd international congress on image and signal processing (CISP) (Vol. 5, pp. 2419\u20132421).","DOI":"10.1109\/CISP.2010.5648249"},{"key":"7102_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2016.2622498","volume":"12","author":"H Li","year":"2017","unstructured":"Li, H., Luo, W., Qiu, X., & Huang, J. (2017). Image forgery localization via integrating tampering possibility maps. IEEE Transactions on Information Forensics and Security,12, 1\u201313.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"7102_CR28","first-page":"217","volume":"74","author":"OI Al-Sanjary","year":"2015","unstructured":"Al-Sanjary, O. I., & Sulong, G. (2015). Detection of video forgery: A review of literature. Journal of Theoretical and Applied Information Technology,74(2), 217\u2013218.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"7102_CR29","doi-asserted-by":"crossref","unstructured":"Vidyadharan, D. S., & Thampi, S. M. (2015). Detecting spliced face in a group photo using PCA. In Proceedings of 7th international conference of soft computing and pattern recognition (pp. 175\u2013180).","DOI":"10.1109\/SOCPAR.2015.7492803"},{"key":"7102_CR30","unstructured":"Tralic, D., Zupancic, I., Grgic, S., & Grgic, M. (2013). CoMoFoD\u2014New database for copy\u2013move forgery detection. In International symposium electronics in marine (pp. 49\u201354)."},{"key":"7102_CR31","unstructured":"CASIA image tempering detection evaluation database (CAISA TIDE) V1.0 and V2.0. (2016). Retrieved March 30, 2016 from, http:\/\/forensics.idealtest.org\/."},{"key":"7102_CR32","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T., Shen, X., & Winkler, S. (2016). COVERAGE\u2014A novel database for copy\u2013move forgery detection. In Proceedings of IEEE international conference on image processing (pp. 161\u2013165).","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"7102_CR33","unstructured":"Surrey University library for forensic analysis (SULFA) of video content database. (2017). Retrieved May 5, 2017 from, http:\/\/sulfa.cs.surrey.ac.uk\/forged_1.php."},{"key":"7102_CR34","unstructured":"REWIND copy\u2013move forgery dataset for video-testing provided by SULFA. (2017). Retrieved July 10, 2017 from, https:\/\/sites.google.com\/site\/rewindpolimi\/downloads\/datasets\/videocopy-move-forgeries-dataset."},{"key":"7102_CR35","unstructured":"Fridrich, A. J., Soukal, B. D., & Luk\u00e1\u0161, A. J. (2003). Detection of copy\u2013move forgery in digital images. In Digital forensic research workshop (DRWS) (pp. 19\u201323)."},{"key":"7102_CR36","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H. T., & Memon, N. (2009). An efficient and robust method for detecting copy\u2013move forgery. In Proceedings of IEEE international conference on acoustics, speed and signal processing (ICASSP) (pp. 1053\u20131056).","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"7102_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, J., Feng, Z., & Su, Y. (2008). A New approach for detecting copy\u2013move forgery in digital images. In Proceedings of IEEE international conference on communication systems (pp. 362\u2013366).","DOI":"10.1109\/ICCS.2008.4737205"},{"key":"7102_CR38","doi-asserted-by":"crossref","unstructured":"Junhong, Z. (2010). Detection of copy\u2013move forgery based on one improved LLE method. In Proceedings of 2nd international conference on advanced computer control (pp. 547\u2013549).","DOI":"10.1109\/ICACC.2010.5486861"},{"key":"7102_CR39","doi-asserted-by":"crossref","unstructured":"Qureshi, M. A., & Deriche, M. (2014). A review on copy move image forgery detection techniques. In Proceedings of IEEE 11th international multi-conference on systems, signals and devices (pp. 1\u20135).","DOI":"10.1109\/SSD.2014.6808907"},{"key":"7102_CR40","doi-asserted-by":"crossref","unstructured":"Ardizzone, E., Bruno, A., & Mazzola G. (2010). Detecting multiple copies in tampered images. In Proceedings of IEEE 17th international conference on image processing (pp. 2117-2120).","DOI":"10.1109\/ICIP.2010.5652490"},{"key":"7102_CR41","doi-asserted-by":"crossref","unstructured":"Liu, L., Ni, R., Zhao, Y., & Li, S. (2014). Improved SIFT-based copy\u2013move detection using BFSN clustering and CFA features. In Proceedings of 10th international conference on intelligent information hiding and multimedia signal processing (pp. 626\u2013629).","DOI":"10.1109\/IIH-MSP.2014.162"},{"issue":"10","key":"7102_CR42","first-page":"1190","volume":"1","author":"R Vidhi","year":"2014","unstructured":"Vidhi, R., & Khushbu, S. (2014). An integrated technique DCT & SIFT for detection of image forgery. International Journal for Technological Research in Engineering,1(10), 1190\u20131195.","journal-title":"International Journal for Technological Research in Engineering"},{"key":"7102_CR43","unstructured":"Debbarma, S., Singh, A. B., & Singh, K. M. (2014). Key points based copy\u2013move forgery detection of digital images. In Proceedings of international conference on informatics electronics & vision (pp. 1\u20135)."},{"issue":"3","key":"7102_CR44","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based image copy\u2013move forgery detection scheme. IEEE Transactions on Information Forensics and Security,10(3), 507\u2013518.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7102_CR45","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-319-28658-7_55","volume":"425","author":"VT Manu","year":"2015","unstructured":"Manu, V. T., & Mehtre, B. M. (2015). Detection of copy\u2013move forgery in images using segmentation and SURF. Advances in Signal Processing and Intelligence in Recognition Systems,425, 645\u2013654.","journal-title":"Advances in Signal Processing and Intelligence in Recognition Systems"},{"key":"7102_CR46","doi-asserted-by":"crossref","unstructured":"Shandilya, M., & Naskar, R. (2015). Detection of geometric transformations in copy move forgery of digital images. In Proceedings of annual IEEE India conference (INDICON) (pp. 1\u20136).","DOI":"10.1109\/INDICON.2015.7443141"},{"key":"7102_CR47","doi-asserted-by":"crossref","unstructured":"Ustubioglu, B., Muzaffer, G., Ulutas, G., Nabiyev, V., & Ulutas, M. (2015). A novel keypoint based forgery detection method based on local phase quantization and SIFT. In Proceedings of 2nd International conference on electrical and electronics engineering (pp. 185\u2013189).","DOI":"10.1109\/ELECO.2015.7394438"},{"issue":"3","key":"7102_CR48","first-page":"199","volume":"7","author":"P Sharma","year":"2016","unstructured":"Sharma, P., Singla, S., & Kaur, S. (2016). Detecting copy\u2013move forgery in digital image using SIFT. International Journal of Latest Trends in Engineering and Technology,7(3), 199\u2013204.","journal-title":"International Journal of Latest Trends in Engineering and Technology"},{"issue":"23","key":"7102_CR49","doi-asserted-by":"publisher","first-page":"14","DOI":"10.5120\/16734-6935","volume":"95","author":"LK Bhullar","year":"2014","unstructured":"Bhullar, L. K., Budhirajam, S., & Dhindsa, A. (2014). DWT and SIFT based passive copy\u2013move forgery detection. International Journal of Computer Applications,95(23), 14\u201318.","journal-title":"International Journal of Computer Applications"},{"issue":"8","key":"7102_CR50","first-page":"607","volume":"2","author":"U Datta","year":"2013","unstructured":"Datta, U., & Sharma, C. (2013). Analysis of copy\u2013move image forgery detection. International Journal of Advanced Research in Computer Science and Electronics Engineering,2(8), 607\u2013609.","journal-title":"International Journal of Advanced Research in Computer Science and Electronics Engineering"},{"key":"7102_CR51","doi-asserted-by":"crossref","unstructured":"Ustubioglu, B., Ayas, S., Do\u011fan, H., & Uluta\u015f, G. (2015). Image forgery detection based on colour SIFT. In Proceedings of 23th international conference on signal processing and communications applications (pp. 1741\u20131744).","DOI":"10.1109\/SIU.2015.7130189"},{"issue":"3","key":"7102_CR52","doi-asserted-by":"publisher","first-page":"0975","DOI":"10.5120\/ijca2016911979","volume":"153","author":"A Dixit","year":"2016","unstructured":"Dixit, A., Dixit, R., & Gupta, R. K. (2016). Detection of copy\u2013move forgery exploiting LBP features with discrete wavelet transform. International Journal of Computer Applications,153(3), 0975\u20130987.","journal-title":"International Journal of Computer Applications"},{"key":"7102_CR53","doi-asserted-by":"crossref","unstructured":"Nguyen, H. C., & Beisser, S. K. (2012). Detection of copy\u2013move forgery in digital images using radon transformation and Phase Correlation. In Proceedings of 8th international conference on intelligent information hiding and multimedia signal processing (pp. 134\u2013137).","DOI":"10.1109\/IIH-MSP.2012.38"},{"key":"7102_CR54","unstructured":"\u0130mamo\u011flu, M. B., Uluta\u015f, G., & Uluta\u015f, M. (2013). Detection of copy\u2013move forgery using krawtchouk moment. In Proceedings of 8th international conference on electrical and electronics engineering (pp. 311\u2013314)."},{"key":"7102_CR55","doi-asserted-by":"crossref","unstructured":"Zhong, L., & Xu, W. (2013). A robust image copy\u2013move forgery detection based on mixed moments. In Proceedings of 4th international conference on software engineering and service science (pp. 381\u2013384).","DOI":"10.1109\/ICSESS.2013.6615329"},{"key":"7102_CR56","doi-asserted-by":"crossref","unstructured":"Chen, Y., & Hsu, C. T. (2013). What has been tampered? From a sparse manipulation perspective. In IEEE 15th international workshop on multimedia signal processing (pp. 123\u2013128).","DOI":"10.1109\/MMSP.2013.6659275"},{"key":"7102_CR57","doi-asserted-by":"crossref","unstructured":"Chakraborty, S. (2013). Copy move image forgery detection using mutual information. In Proceedings of 4th international conference on computing communications and networking technologies (pp. 1\u20134).","DOI":"10.1109\/ICCCNT.2013.6726743"},{"issue":"10","key":"7102_CR58","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone, E., Bruno, A., & Mazzola, G. (2015). Copy\u2013move forgery detection by matching triangles of key points. IEEE Transactions on Information Forensics and Security,10(10), 2084\u20132094.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7102_CR59","doi-asserted-by":"crossref","unstructured":"Ustub\u0131oglu, B., Nab\u0131yev, V., Ulutas, G., & Ulutas, M. (2015). Image forgery detection using colour moments. In Proceedings of 38th international conference on telecommunications and signal processing (pp. 540\u2013544).","DOI":"10.1109\/TSP.2015.7296321"},{"key":"7102_CR60","doi-asserted-by":"publisher","first-page":"56","DOI":"10.5815\/ijmecs.2016.12.08","volume":"12","author":"GK Saini","year":"2016","unstructured":"Saini, G. K., & Mahajan, M. (2016). Improvement in copy\u2013move forgery detection using hybrid approach. International Journal of Modern Education and Computer Science,12, 56\u201363.","journal-title":"International Journal of Modern Education and Computer Science"},{"issue":"2","key":"7102_CR61","doi-asserted-by":"publisher","first-page":"91","DOI":"10.12785\/ijcds\/040203","volume":"4","author":"S Kumar","year":"2015","unstructured":"Kumar, S., Desai, J. V., & Mukherjee, S. (2015). A fast keypoint based hybrid method for copy move forgery detection. International Journal of Computing and Digital Systems,4(2), 91\u201398.","journal-title":"International Journal of Computing and Digital Systems"},{"key":"7102_CR62","doi-asserted-by":"crossref","unstructured":"Baykal, E., Ustubioglu, B., & Ulutas, G. (2016). Image forgery detection based on SIFT and k-means\u2009++. In Proceedings of 39th international conference on telecommunications and signal processing (TSP) (pp. 474\u2013477).","DOI":"10.1109\/TSP.2016.7760924"},{"key":"7102_CR63","doi-asserted-by":"crossref","unstructured":"Mohebbian, E., & Hariri, M. (2015). Increase the efficiency of DCT method for detection of copy\u2013move forgery in complex and smooth images. In Proceedings of 2nd international conference on knowledge-based engineering and innovation (KBEI) (pp. 436\u2013440).","DOI":"10.1109\/KBEI.2015.7436084"},{"issue":"1","key":"7102_CR64","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao, J., & Guo, J. (2013). Passive forensics for copy\u2013move image forgery using a method based on DCT and SVD. Forensic Science International,233(1), 158\u2013166.","journal-title":"Forensic Science International"},{"key":"7102_CR65","doi-asserted-by":"crossref","unstructured":"Chetty, G., Biswas, M., & Singh, R. (2010). Digital video tamper detection based on multimodal fusion of residue features. In Proceedings of 4th international conference on network and system security (pp. 606\u2013612).","DOI":"10.1109\/NSS.2010.8"},{"key":"7102_CR66","doi-asserted-by":"crossref","unstructured":"Hu, J., Zhang, H., Gao, Q., & Huang, H. (2011). An improved lexicographical sort algorithm of copy\u2013move forgery detection. In proceedings of second international conference on networking and distributed computing (pp. 23\u201327).","DOI":"10.1109\/ICNDC.2011.12"},{"key":"7102_CR67","doi-asserted-by":"crossref","unstructured":"Tu, H. K., et al. (2017). Develop an algorithm for image forensics using feature comparison and sharpness estimation. In Proceedings of international conference on recent advances in signal processing, telecommunications & computing (SigTelCom) (pp. 82\u201388).","DOI":"10.1109\/SIGTELCOM.2017.7849800"},{"issue":"Part A","key":"7102_CR68","first-page":"46","volume":"39","author":"MA Qureshi","year":"2015","unstructured":"Qureshi, M. A., & Deriche, M. (2015). A bibliography of pixel-based blind image forgery detection techniques. Signal Processing: Image Communication,39(Part A), 46\u201374.","journal-title":"Signal Processing: Image Communication"},{"key":"7102_CR69","first-page":"688","volume":"5","author":"T Ng","year":"2004","unstructured":"Ng, T., Chang, S., & Sun, Q. (2004). Blind detection of photomontage using higher order statistics. IEEE International Symposium on Circuits and Systems,5, 688\u2013691.","journal-title":"IEEE International Symposium on Circuits and Systems"},{"issue":"2","key":"7102_CR70","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A. C., & Farid, H. (2005). Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing,53(2), 758\u2013767.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"7102_CR71","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/TIFS.2010.2077628","volume":"5","author":"YF Hsu","year":"2010","unstructured":"Hsu, Y. F., & Chang, S. F. (2010). Camera response functions for image forensics: An automatic algorithm for splicing detection. IEEE Transactions on Information Forensics and Security,5(4), 816\u2013825.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7102_CR72","unstructured":"Zheng, Q., Sun W., & Lu, W. (2010). Digital spliced image forensics based on edge blur measurement. In Proceedings of IEEE international conference on information theory and information security (pp. 399\u2013402)."},{"key":"7102_CR73","unstructured":"Ping, Z., & Xiang, Z. (2010). Image splicing detection based on image quality and analysis of variance. In Proceedings of 2nd international conference on education technology and computer (ICETC) (Vol. 4, pp. 242\u2013246)."},{"issue":"4","key":"7102_CR74","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TCSVT.2011.2125370","volume":"21","author":"GS Lin","year":"2011","unstructured":"Lin, G. S., Chang, M. K., & Chen, Y. L. (2011). A passive-blind forgery detection scheme based on content-adaptive quantization table estimation. IEEE Transactions on Circuits and Systems for Video Technology,21(4), 421\u2013433.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"12","key":"7102_CR75","doi-asserted-by":"publisher","first-page":"1591","DOI":"10.1016\/j.patrec.2011.05.013","volume":"32","author":"Z He","year":"2011","unstructured":"He, Z., Sun, W., Lu, W., & Lu, H. (2011). Digital image splicing detection based on approximate run length. Pattern Recognition Letters,32(12), 1591\u20131597.","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"7102_CR76","doi-asserted-by":"publisher","first-page":"0975","DOI":"10.5120\/8722-2594","volume":"55","author":"Y Venkateswarlu","year":"2012","unstructured":"Venkateswarlu, Y., Sujatha, B., & Kumar, V. V. (2012). Extraction of texture information from fuzzy run length matrix. International Journal of Computer Applications,55(1), 0975\u20138887.","journal-title":"International Journal of Computer Applications"},{"key":"7102_CR77","doi-asserted-by":"crossref","unstructured":"Shi, Z., Shen, X., Chen, H., Li, X. (2015). Blind detection of image splicing based on fuzzy run-length. In Proceedings of IEEE international conference on computer and information technology (pp. 915\u2013920).","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.137"},{"key":"7102_CR78","doi-asserted-by":"crossref","unstructured":"Liu, H., Yang, Y., & Shang, M. (2012). Blind detection of image splicing based on run length matrix combined properties. In Proceedings of 10th world congress on intelligent control and automation (pp. 4545\u20134550).","DOI":"10.1109\/WCICA.2012.6359340"},{"key":"7102_CR79","unstructured":"Dong, J., et al. (2008). Run-length and edge statistics-based approach for image splicing detection. In Proceedings of international workshop in digital watermarking (pp. 76\u201387)."},{"key":"7102_CR80","doi-asserted-by":"crossref","unstructured":"Mushtaq, S., & Mir, A. H. (2014). Novel method for image splicing detection. In Proceedings of international conference on advances in computing, communications and informatics (pp. 2398\u20132404).","DOI":"10.1109\/ICACCI.2014.6968386"},{"key":"7102_CR81","doi-asserted-by":"crossref","unstructured":"Wu, X., & Fang, Z. (2011). Image splicing detection using illuminant color inconsistency. In Proceedings of 3rd international conference on multimedia information networking and security (pp. 600\u2013603).","DOI":"10.1109\/MINES.2011.135"},{"key":"7102_CR82","doi-asserted-by":"crossref","unstructured":"Binnar, P., & Mane, V. (2015). Robust technique of localizing blurred image splicing based on exposing blur type inconsistency. In Proceedings of international conference on applied and theoretical computing and communication technology (pp. 398\u2013401).","DOI":"10.1109\/ICATCCT.2015.7456916"},{"issue":"5","key":"7102_CR83","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1109\/TIFS.2015.2394231","volume":"10","author":"K Bahrami","year":"2015","unstructured":"Bahrami, K., Kot, A. C., Li, L., & Li, H. (2015). Blurred image splicing localization by exposing blur type inconsistency. IEEE Transactions on Information Forensics and Security,10(5), 999\u20131009.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7102_CR84","doi-asserted-by":"crossref","unstructured":"Das, A., Medhi, A., Karsh, R. K., & Laskar, R. H. (2016). Image splicing detection using Gaussian or defocus blur. In Proceedings of international conference on communication and signal processing (pp. 1237\u20131241).","DOI":"10.1109\/ICCSP.2016.7754350"},{"key":"7102_CR85","doi-asserted-by":"crossref","unstructured":"Agarwal, S., & Chand, S. (2016). Texture operator based image splicing detection hybrid technique. In Proceedings of 2nd international conference on computational intelligence & communication technology (pp. 116\u2013120).","DOI":"10.1109\/CICT.2016.31"},{"issue":"1","key":"7102_CR86","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1049\/iet-ipr.2016.0238","volume":"11","author":"X Shen","year":"2017","unstructured":"Shen, X., Shi, Z., & Chen, H. (2017). Splicing image forgery detection using textural features based on the gray level co-occurrence matrices. IET Image Processing,11(1), 44\u201353.","journal-title":"IET Image Processing"},{"issue":"4","key":"7102_CR87","first-page":"1","volume":"11","author":"T Carvalho","year":"2015","unstructured":"Carvalho, T., et al. (2015). Illuminant-based transformed spaces for image forensics. IEEE Transactions on Information Forensics and Security,11(4), 1\u201314.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7102_CR88","doi-asserted-by":"crossref","unstructured":"Fan, Y., Carr\u00e9, P., & Maloigne, C. F. (2015). Image splicing detection with local illumination estimation. In Proceedings of IEEE international conference on image processing (ICIP) (pp. 2940\u20132944).","DOI":"10.1109\/ICIP.2015.7351341"},{"key":"7102_CR89","doi-asserted-by":"crossref","unstructured":"Rao, Y., & Ni, J. (2016). A deep learning approach to detection of splicing and copy\u2013move forgeries in images. In Proceedings of IEEE international workshop on information forensics and security (pp. 1\u20136).","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"7102_CR90","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., & Verdoliva, L. (2016). Single-image splicing localization through autoencoder-based anomaly detection. In Proceedings of IEEE international workshop on information forensics and security (pp. 1\u20136).","DOI":"10.1109\/WIFS.2016.7823921"},{"key":"7102_CR91","doi-asserted-by":"crossref","unstructured":"Hsu, Y. F., & Chang, S. F. (2007). Image splicing detection using camera response function consistency and automatic segmentation. In Proceedings of IEEE international conference on multimedia and expo (pp. 28\u201331).","DOI":"10.1109\/ICME.2007.4284578"},{"key":"7102_CR92","doi-asserted-by":"crossref","unstructured":"Wang, E., Dong, J., & Tan, T. (2009). Effective image splicing detection based on image chroma. In Proceedings of 16th IEEE international conference on image processing (ICIP) (pp. 1257\u20131260).","DOI":"10.1109\/ICIP.2009.5413549"},{"key":"7102_CR93","doi-asserted-by":"crossref","unstructured":"Alahmadi, A. A., et al. (2013). Splicing image forgery detection based on DCT and local binary pattern. In Proceedings of\u00a0IEEE global conference on signal and information processing (pp. 253\u2013256).","DOI":"10.1109\/GlobalSIP.2013.6736863"},{"issue":"3","key":"7102_CR94","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s10044-014-0396-4","volume":"18","author":"EM El-Alfy","year":"2015","unstructured":"El-Alfy, E. M., & Qureshi, M. A. (2015). Combining spatial and DCT based markov features for enhanced blind detection of image splicing. Pattern Analysis and Applications,18(3), 713\u2013723.","journal-title":"Pattern Analysis and Applications"},{"issue":"4","key":"7102_CR95","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","volume":"25","author":"G Muhammad","year":"2014","unstructured":"Muhammad, G., Al-Hammadi, M. H., Hussain, M., & Bebis, G. (2014). Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications,25(4), 985\u2013994.","journal-title":"Machine Vision and Applications"},{"key":"7102_CR96","doi-asserted-by":"crossref","unstructured":"Mushtaq, S., & Mir, A. H. (2014). Forgery detection using statistical features. In Proceedings of international conference on innovative applications of computational intelligence on power, energy and controls with their impact on humanity (pp. 92\u201397).","DOI":"10.1109\/CIPECH.2014.7019062"},{"key":"7102_CR97","doi-asserted-by":"crossref","unstructured":"Agarwal, S., & Chand, S. (2016). Image forgery detection using markov features in undecimated wavelet transform. In Proceedings of 9th international conference on contemporary computing (pp. 1\u20136).","DOI":"10.1109\/IC3.2016.7880221"},{"key":"7102_CR98","doi-asserted-by":"crossref","unstructured":"Sharma, S., & Dhavale, S. V. (2016). A review of passive forensic techniques for detection of copy\u2013move attacks on digital videos. In Proceedings of 3rd international conference on advanced computing and communication systems (ICACCS) (Vol. 1, pp. 1\u20136)","DOI":"10.1109\/ICACCS.2016.7586396"},{"issue":"5","key":"7102_CR99","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1109\/TSMCC.2010.2077674","volume":"41","author":"TK Shih","year":"2011","unstructured":"Shih, T. K., Tang, N. C., Tsai, J. C., & Hwang, J. N. (2011). Video motion interpolation for special effect applications. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews),41(5), 720\u2013732.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"7102_CR100","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.3923\/itj.2012.1456.1462","volume":"11","author":"R Chen","year":"2012","unstructured":"Chen, R., Dong, Q., Ren, H., & Fu, J. (2012). Video forgery detection based on non-subsampled contour let transformation and gradient information. Information Technology Journal,11, 1456\u20131462.","journal-title":"Information Technology Journal"},{"key":"7102_CR101","doi-asserted-by":"crossref","unstructured":"Wang, W., & Farid, H. (2007). Exposing digital forgeries in video by detecting duplication. In Proceedings of 9th workshop on multimedia and security (pp. 35\u201342).","DOI":"10.1145\/1288869.1288876"},{"key":"7102_CR102","doi-asserted-by":"crossref","unstructured":"Goodwin, J., & Chetty, G. (2011). Blind video tamper detection based on fusion of source features. In Proceedings of international conference on digital image computing techniques and applications (pp. 608\u2013613).","DOI":"10.1109\/DICTA.2011.108"},{"issue":"3","key":"7102_CR103","first-page":"148","volume":"3","author":"MR Khammar","year":"2012","unstructured":"Khammar, M. R. (2012). Evaluation of different block matching algorithms to motion estimation. International Journal of VLSI and Embedded Systems (IJVES),3(3), 148\u2013153.","journal-title":"International Journal of VLSI and Embedded Systems (IJVES)"},{"key":"7102_CR104","doi-asserted-by":"crossref","unstructured":"Wang, W., & Farid, H. (2006). Exposing digital forgeries in video by detecting double MPEG compression. In Proceedings of 8th workshop on multimedia and security (pp. 37\u201347).","DOI":"10.1145\/1161366.1161375"},{"issue":"1","key":"7102_CR105","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/TIFS.2011.2165843","volume":"7","author":"V Conotter","year":"2012","unstructured":"Conotter, V., O\u2019Brien, J. F., & Farid, H. (2012). Exposing digital forgeries in ballistic motion. IEEE Transactions on Information Forensics and Security,7(1), 283\u2013296.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"7102_CR106","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/TIFS.2012.2205568","volume":"7","author":"MC Stamm","year":"2012","unstructured":"Stamm, M. C., Lin, W. S., & Liu, K. J. (2012). Temporal forensics and anti-forensics for motion compensated video. IEEE Transactions on Information Forensics and Security,7(4), 1315\u20131327.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7102_CR107","doi-asserted-by":"crossref","unstructured":"Lin, G., Chang, J., & Chuang, C. (2011). Detecting frame duplication based on spatial and temporal analyses. In Proceedings of 6th international conference on computer science & education (ICCSE) (pp. 1396\u20131399).","DOI":"10.1109\/ICCSE.2011.6028891"},{"key":"7102_CR108","doi-asserted-by":"crossref","unstructured":"Wang, W., & Farid, H. (2007). Exposing digital forgeries in video by detecting duplication. In Proceedings of 9th workshop of multimedia and security (pp. 35\u201342).","DOI":"10.1145\/1288869.1288876"},{"key":"7102_CR109","doi-asserted-by":"crossref","unstructured":"Mathai, M., Rajan, D., & Emmanuel, S. (2016). Video forgery detection and localization using normalized cross-correlation of moment features. In IEEE southwest symposium on image analysis and interpretation (SSIAI) (pp. 149-152).","DOI":"10.1109\/SSIAI.2016.7459197"},{"issue":"7","key":"7102_CR110","first-page":"1","volume":"26","author":"G Shianglin","year":"2012","unstructured":"Shianglin, G., & Chang, J. F. (2012). Detection of frame duplication forgery in videos based on spatial and temporal analysis. International Journal of Pattern Recognition and Artificial Intelligence,26(7), 1\u201318.","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"7102_CR111","doi-asserted-by":"crossref","unstructured":"Mathai. M., Rajan, D., & Emmanuel, S. (2016). Video forgery detection and localization using normalized cross-correlation of moment features. In Proceedings of IEEE southwest symposium on image analysis and interpretation (SSIAI) (pp. 149\u2013152).","DOI":"10.1109\/SSIAI.2016.7459197"},{"key":"7102_CR112","doi-asserted-by":"crossref","unstructured":"Tralic, D., Grgic, S., & Zovko-Cihlar, B. (2014). Video frame copy\u2013move forgery detection based on cellular automata and local binary patterns. In 10th International symposium on telecommunications (BIHTEL) (pp. 1\u20134).","DOI":"10.1109\/BIHTEL.2014.6987651"},{"key":"7102_CR113","unstructured":"Amiano, L., Cozzolino, D., Poggi, G., & Verdoliva, L. (2015). Video forgery detection and localization based on 3D patchmatch. In Proceedings of IEEE international conference on multimedia & expo workshops (ICMEW) (pp. 1\u20136)."},{"key":"7102_CR114","doi-asserted-by":"crossref","unstructured":"Bidokhti, A., & Ghaemmaghami, S. (2015). Detection of regional copy\u2013move forgery in MPEG videos using optical flow. In Proceedings of the international symposium on artificial intelligence and signal processing (AISP) (pp. 13\u201317).","DOI":"10.1109\/AISP.2015.7123529"},{"issue":"1","key":"7102_CR115","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s11042-013-1364-5","volume":"72","author":"S Bian","year":"2014","unstructured":"Bian, S., Luo, W., & Huang, J. (2014). Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity. Multimedia Tools and Applications,72(1), 437\u2013451.","journal-title":"Multimedia Tools and Applications"},{"key":"7102_CR116","doi-asserted-by":"crossref","unstructured":"Zheng, L., Sun, T., & Shi, Y. Q. (2015). Inter-frame video forgery detection based on block-wise brightness variance descriptor. In Digital-forensics and watermarking (pp. 18\u201330).","DOI":"10.1007\/978-3-319-19321-2_2"},{"key":"7102_CR117","doi-asserted-by":"crossref","unstructured":"Wang, W., & Farid, H. (2009). Exposing digital forgeries in video by detecting double quantization. In Proceedings of 11th ACM workshop on multimedia and security (pp. 39\u201348).","DOI":"10.1145\/1597817.1597826"},{"key":"7102_CR118","unstructured":"GRIP\u2014Image processing research group video Dataset. (2018). Retrieved January 10, 2018 from, http:\/\/www.grip.unina.it\/web-download.html."},{"key":"7102_CR119","unstructured":"Sundaram, M. A., & Nandini, C. (2015). CBFD: Coherence based forgery detection technique in image forensics analysis. In Proceedings of international conference on emerging research in electronics, computer science and technology (ICERECT) (pp. 192\u2013197)."},{"issue":"13","key":"7102_CR120","doi-asserted-by":"publisher","first-page":"4887","DOI":"10.1007\/s11042-016-4201-9","volume":"76","author":"J Zhong","year":"2017","unstructured":"Zhong, J., et al. (2017). A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools and Applications,76(13), 4887\u201314903.","journal-title":"Multimedia Tools and Applications"},{"key":"7102_CR121","unstructured":"Hsu, C. C., et al. (2008). Video forgery detection using correlation of noise residue. In Proceedings of IEEE 10th workshop on multimedia signal processing (pp. 170\u2013174)."},{"issue":"4","key":"7102_CR122","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TCSVT.2011.2125370","volume":"21","author":"Q Dong","year":"2011","unstructured":"Dong, Q., Yan, G., & Zhu, N. (2011). A MCEA based passive forensics scheme for detecting frame-based video tampering. IEEE Transactions on Circuits and Systems for Video Technology,21(4), 421\u2013434.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"7102_CR123","doi-asserted-by":"crossref","unstructured":"Ravi, H., Subramanyam, A. V., Gupta, G., & Kumar, A. B. (2014). Compression noise based video forgery detection. In Proceedings of IEEE international conference on image processing (pp. 5352\u20135356).","DOI":"10.1109\/ICIP.2014.7026083"},{"key":"7102_CR124","doi-asserted-by":"crossref","unstructured":"Tan, S., Chen, S., & Li, B. (2015). GOP based automatic detection of object-based forgery in advanced video. In Proceedings of Asia-pacific signal and information processing association annual summit and conference (pp. 719\u2013722).","DOI":"10.1109\/APSIPA.2015.7415366"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07102-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07102-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07102-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T00:17:18Z","timestamp":1611188238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07102-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,22]]},"references-count":124,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["7102"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07102-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,22]]},"assertion":[{"value":"22 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}