{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:52:10Z","timestamp":1762005130973,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s12530-019-09309-1","type":"journal-article","created":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T22:02:52Z","timestamp":1572732172000},"page":"503-517","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A novel method for digital image copy-move forgery detection and localization using evolving cellular automata and local binary patterns"],"prefix":"10.1007","volume":"12","author":[{"given":"Gulnawaz","family":"Gani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2294-0338","authenticated-orcid":false,"given":"Fasel","family":"Qadir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"key":"9309_CR1","doi-asserted-by":"publisher","first-page":"31807","DOI":"10.1007\/s11042-018-6201-4","volume":"77","author":"OM Al-Qershi","year":"2018","unstructured":"Al-Qershi OM, Khoo BE (2018) Evaluation of copy-move forgery detection: datasets and evaluation metrics. Multimed. Tools Appl. 77:31807\u201331833. https:\/\/doi.org\/10.1007\/s11042-018-6201-4","journal-title":"Multimed. Tools Appl."},{"key":"9309_CR2","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Member S, Caldelli R, Bimbo A Del, Serra G (2011) A SIFT-based forensic method for copy\u2014move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6:1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9309_CR3","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1002\/int.20462","volume":"26","author":"P Angelov","year":"2011","unstructured":"Angelov P, Sadeghi-tehran P, Ramezani R (2011) An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving Takagi\u2014Sugeno fuzzy systems. Int J Intell Syst 26:189\u2013205. https:\/\/doi.org\/10.1002\/int.20462","journal-title":"Int J Intell Syst"},{"issue":"10","key":"9309_CR4","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084\u20132094. https:\/\/doi.org\/10.1109\/TIFS.2015.2445742","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9309_CR5","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TSMCB.2003.810438","volume":"33","author":"SA Billings","year":"2003","unstructured":"Billings SA, Yang Y (2003) Identification of the neighborhood and CA rules from spatio-temporal CA patterns. IEEE Trans Syst Man Cybern Part B Cybern 33:332\u2013339. https:\/\/doi.org\/10.1109\/TSMCB.2003.810438","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"key":"9309_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214:33\u201343. https:\/\/doi.org\/10.1016\/j.forsciint.2011.07.015","journal-title":"Forensic Sci Int"},{"issue":"6","key":"9309_CR7","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9309_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"R Davarzani","year":"2013","unstructured":"Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231:61\u201372. https:\/\/doi.org\/10.1016\/j.forsciint.2013.04.023","journal-title":"Forensic Sci Int"},{"key":"9309_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/PACIIA.2008.240","author":"J Fridrich","year":"2003","unstructured":"Fridrich J, Soukal D, Luk\u00e1\u0161 J (2003) Detection of copy-move forgery in digital images. Int J Comput Sci Issues. https:\/\/doi.org\/10.1109\/PACIIA.2008.240","journal-title":"Int J Comput Sci Issues"},{"key":"9309_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.03.013","author":"K Hayat","year":"2017","unstructured":"Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Comput Electr Eng. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.03.013","journal-title":"Comput Electr Eng"},{"key":"9309_CR11","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206:178\u2013184. https:\/\/doi.org\/10.1016\/j.forsciint.2010.08.001","journal-title":"Forensic Sci Int"},{"key":"9309_CR12","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1108\/IJICC-10-2017-0132","volume":"11","author":"Z Jeelani","year":"2018","unstructured":"Jeelani Z, Qadir F (2018) Cellular automata-based approach for digital image scrambling. Int J Intell Comput Cybern 11:353\u2013370","journal-title":"Int J Intell Comput Cybern"},{"key":"9309_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.12.006","author":"Z Jeelani","year":"2019","unstructured":"Jeelani Z, Qadir F (2019) Cellular automata-based approach for salt-and-pepper noise filtration. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2018.12.006","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"9309_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/9781118798706.hdi044","author":"N Krawetz","year":"2015","unstructured":"Krawetz N (2015) Digital photo forensics, handbook of digital. Imaging. https:\/\/doi.org\/10.1002\/9781118798706.hdi044","journal-title":"Imaging"},{"key":"9309_CR15","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2015.03.009","volume":"321","author":"JC Lee","year":"2015","unstructured":"Lee JC, Chang CP, Chen WK (2015) Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci (NY) 321:250\u2013262. https:\/\/doi.org\/10.1016\/j.ins.2015.03.009","journal-title":"Inf Sci (NY)"},{"key":"9309_CR16","first-page":"46","volume":"4","author":"L Li","year":"2013","unstructured":"Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimed Signal Process 4:46\u201356","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"9309_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2018.02.008","author":"X Lin","year":"2018","unstructured":"Lin X, Li JH, Wang SL, Liew AWC, Cheng F, Huang XS (2018) Recent advances in passive digital image security forensics: a brief review. Engineering. https:\/\/doi.org\/10.1016\/j.eng.2018.02.008","journal-title":"Engineering"},{"key":"9309_CR18","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202\u2013214. https:\/\/doi.org\/10.1016\/j.jvcir.2018.03.015","journal-title":"J Vis Commun Image Represent"},{"key":"9309_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.patrec.2015.11.019","volume":"71","author":"R Mehta","year":"2016","unstructured":"Mehta R, Egiazarian K (2016) Dominant rotated local binary patterns (DRLBP) for texture classification. Pattern Recognit Lett 71:16\u201322. https:\/\/doi.org\/10.1016\/j.patrec.2015.11.019","journal-title":"Pattern Recognit Lett"},{"key":"9309_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1186\/s41235-017-0067-2","volume":"2","author":"SJ Nightingale","year":"2017","unstructured":"Nightingale SJ, Wade KA, Watson DG (2017) Can people identify original and manipulated photos of real-world scenes? Cogn Res Princ Implic 2:30. https:\/\/doi.org\/10.1186\/s41235-017-0067-2","journal-title":"Cogn Res Princ Implic"},{"key":"9309_CR21","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9:62\u201366. https:\/\/doi.org\/10.1109\/TSMC.1979.4310076","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"9309_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ins.2018.06.040","volume":"463\u2013464","author":"CM Pun","year":"2018","unstructured":"Pun CM, Chung JL (2018) A two-stage localization for copy-move forgery detection. Inf Sci (NY) 463\u2013464:33\u201355. https:\/\/doi.org\/10.1016\/j.ins.2018.06.040","journal-title":"Inf Sci (NY)"},{"key":"9309_CR23","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s41870-018-0166-4","volume":"10","author":"F Qadir","year":"2018","unstructured":"Qadir F, Shoosha IQ (2018) Cellular automata-based efficient method for the removal of high-density impulsive noise from digital images. Int J Inf Technol 10:529\u2013536. https:\/\/doi.org\/10.1007\/s41870-018-0166-4","journal-title":"Int J Inf Technol"},{"key":"9309_CR24","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5815\/ijcnis.2013.02.05","volume":"5","author":"F Qadir","year":"2013","unstructured":"Qadir F, Peer MA, Khan KA (2013) Digital image scrambling based on two dimensional cellular automata. Int J Comput Netw Inf Secur 5:36\u201341. https:\/\/doi.org\/10.5815\/ijcnis.2013.02.05","journal-title":"Int J Comput Netw Inf Secur"},{"key":"9309_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2010.02.005","author":"PL Rosin","year":"2010","unstructured":"Rosin PL (2010) Image processing using 3-state cellular automata. Comput Vis Image Underst. https:\/\/doi.org\/10.1016\/j.cviu.2010.02.005","journal-title":"Comput Vis Image Underst"},{"key":"9309_CR26","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inf Forensics Secur 8:1355\u20131370. https:\/\/doi.org\/10.1109\/TIFS.2013.2272377","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9309_CR27","doi-asserted-by":"publisher","unstructured":"Shelke PM, Prasad RS (2016) Improving JPEG image anti-forensics. 1:1. https:\/\/doi.org\/10.1145\/2905055.2905134","DOI":"10.1145\/2905055.2905134"},{"key":"9309_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2091271","author":"X Sun","year":"2011","unstructured":"Sun X, Rosin PL, Martin RR (2011) Fast rule identification and neighborhood selection for cellular automata. IEEE Trans Syst Man Cybern Part B Cybern. https:\/\/doi.org\/10.1109\/TSMCB.2010.2091271","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"key":"9309_CR29","unstructured":"Tralic D, Zupancic I, Grgic M (2013) New database for copy-move forgery detection-CoMoFoD. In: 55th International Symposium ELMAR, pp 49\u201354"},{"key":"9309_CR30","doi-asserted-by":"publisher","first-page":"16881","DOI":"10.1007\/s11042-015-2961-2","volume":"75","author":"D Tralic","year":"2016","unstructured":"Tralic D, Grgic S, Sun X, Rosin PL (2016) Combining cellular automata and local binary patterns for copy-move forgery detection. Multimed Tools Appl 75:16881\u201316903. https:\/\/doi.org\/10.1007\/s11042-015-2961-2","journal-title":"Multimed Tools Appl"},{"key":"9309_CR31","doi-asserted-by":"publisher","first-page":"6853696","DOI":"10.1155\/2018\/6853696","volume":"2018","author":"H Wang","year":"2018","unstructured":"Wang H, Wang H (2018) Perceptual hashing-based image copy-move forgery detection. Secur Commun Netw 2018:6853696. https:\/\/doi.org\/10.1155\/2018\/6853696","journal-title":"Secur Commun Netw"},{"key":"9309_CR32","doi-asserted-by":"publisher","unstructured":"Wen B, Zhu Y, Subramanian R, Ng TT, Shen X, Winkler S (2016) COVERAGE\u2014a novel database for copy-move forgery detection. In: Proceedings\u2014international conference on image processing. ICIP, pp 161\u2013165. https:\/\/doi.org\/10.1109\/ICIP.2016.7532339","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"9309_CR33","unstructured":"Wolfram S (2002) Stephen Wolfram: a new kind of science. [WWW Document]. Wolfram Media"},{"key":"9309_CR34","doi-asserted-by":"publisher","unstructured":"Xu B, Wang J, Liu G, Dai Y (2010) Image copy-move forgery detection based on SURF. In: Proc.\u20142010 2nd Int. Conf. Multimed. Inf. Netw. Secur. MINES 2010, pp 889\u2013892. https:\/\/doi.org\/10.1109\/MINES.2010.189","DOI":"10.1109\/MINES.2010.189"},{"key":"9309_CR35","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233:158\u2013166. https:\/\/doi.org\/10.1016\/j.forsciint.2013.09.013","journal-title":"Forensic Sci Int"},{"key":"9309_CR36","doi-asserted-by":"publisher","unstructured":"Zhou X, Angelov P (2007) Autonomous visual self-localization in completely unknown environment using evolving fuzzy rule-based classifier. In: Proceedings of the 2007 IEEE symposium on computational intelligence in security and defense applications (CISDA 2007). IEEE, Honolulu, pp 131\u2013138. https:\/\/doi.org\/10.1109\/CISDA.2007.368145","DOI":"10.1109\/CISDA.2007.368145"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-019-09309-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-019-09309-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-019-09309-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T04:21:09Z","timestamp":1621570869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-019-09309-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["9309"],"URL":"https:\/\/doi.org\/10.1007\/s12530-019-09309-1","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"type":"print","value":"1868-6478"},{"type":"electronic","value":"1868-6486"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"23 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}