{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T09:19:24Z","timestamp":1764494364136,"version":"build-2065373602"},"reference-count":41,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T00:00:00Z","timestamp":1713225600000},"content-version":"vor","delay-in-days":106,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010868","name":"Ministry of Public Security of the People's Republic of China","doi-asserted-by":"publisher","award":["2020JSYJC25"],"award-info":[{"award-number":["2020JSYJC25"]}],"id":[{"id":"10.13039\/501100010868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Signal Processing"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>The color filter array of the camera is an effective fingerprint for digital forensics. Most previous color filter array (CFA)\u2010based forgery localization methods perform under the assumption that the interpolation algorithm is linear. However, interpolation algorithms commonly used in digital cameras are nonlinear, and their coefficients vary with content to enhance edge information. To avoid the impact of this impractical assumption, a CFA\u2010based forgery localization method independent of linear assumption is proposed. The probability of an interpolated pixel value falling within the range of its neighboring acquired pixel values is computed. This probability serves as a means of discerning the presence and absence of CFA artifacts, as well as distinguishing between various interpolation techniques. Subsequently, curvature is employed in the analysis to select suitable features for generating the tampering probability map. Experimental results on the Columbia and Korus datasets indicate that the proposed method outperforms the state\u2010of\u2010the\u2010art methods and is also more robust to various attacks, such as noise addition, Gaussian filtering, and JPEG compression with a quality factor of 90.<\/jats:p>","DOI":"10.1049\/2024\/9929900","type":"journal-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T16:35:05Z","timestamp":1713285305000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["CFA\u2010Based Splicing Forgery Localization Method via Statistical Analysis"],"prefix":"10.1049","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0370-4217","authenticated-orcid":false,"given":"Lei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Peng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yubo","family":"Lang","sequence":"additional","affiliation":[]},{"given":"Jingjiao","family":"Li","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2024,4,16]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656823"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623589"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2265677"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2629646"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2935913"},{"key":"e_1_2_9_7_2","doi-asserted-by":"crossref","unstructured":"ChierchiaG. CozzolinoD. PoggiG. SansoneC. andVerdolivaL. Guided filtering for PRNU-based localization of small-size image forgeries 2014 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) 2014 Florence Italy IEEE 6231\u20136235 https:\/\/doi.org\/10.1109\/ICASSP.2014.6854802.","DOI":"10.1109\/ICASSP.2014.6854802"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3660-3"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-010-0403-1"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855406"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"BammeyQ. Grompone von GioiR. andMorelJ.-M. An adaptive neural network for unsupervised mosaic consistency analysis in image forensics 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2020 IEEE 14194\u201314204.","DOI":"10.1109\/CVPR42600.2020.01420"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2191946"},{"key":"e_1_2_9_13_2","doi-asserted-by":"crossref","unstructured":"BunkJ. BappyJ. H. MohammedT. M. NatarajL. FlennerA. ManjunathB. S. ChandrasekaranS. Roy-ChowdhuryA. K. andPetersonL. Detection and localization of image forgeries using resampling features and deep learning 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2017 Honolulu HI USA IEEE 1881\u20131889 https:\/\/doi.org\/10.1109\/CVPRW.2017.235.","DOI":"10.1109\/CVPRW.2017.235"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2277814"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2273394"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2300937"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.02.001"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248727"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.24.1.013029"},{"key":"e_1_2_9_20_2","doi-asserted-by":"crossref","unstructured":"CozzolinoD. GragnanielloD. andVerdolivaL. Image forgery detection through residual-based local descriptors and block-matching 2014 IEEE International Conference on Image Processing (ICIP) 2014 Paris France IEEE 5297\u20135301 https:\/\/doi.org\/10.1109\/ICIP.2014.7026072.","DOI":"10.1109\/ICIP.2014.7026072"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-017-0196-z"},{"key":"e_1_2_9_22_2","doi-asserted-by":"crossref","unstructured":"BammeyQ. GioiR. andMorelJ.-M. Automatic detection of demosaicing image artifacts and its use in tampering detection 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) 2018 Miami FL USA IEEE https:\/\/doi.org\/10.1109\/MIPR.2018.00091.","DOI":"10.1109\/MIPR.2018.00091"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18092804"},{"key":"e_1_2_9_24_2","doi-asserted-by":"crossref","unstructured":"ChoiC.-H. ChoiJ.-H. andLeeH.-K. CFA pattern identification of digital cameras using intermediate value counting Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security 2011 ACM 21\u201326 https:\/\/doi.org\/10.1145\/2037252.2037258.","DOI":"10.1145\/2037252.2037258"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2012.12.014"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.4.043015"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6075-5"},{"key":"e_1_2_9_29_2","doi-asserted-by":"crossref","unstructured":"LuL. NiR. YaoZ. andLiS. Improved SIFT-based copy-move detection using bfsn clustering and CFA features Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2014 Kitakyushu Japan IEEE 626\u2013629 https:\/\/doi.org\/10.1109\/IIH%2DMSP.2014.162.","DOI":"10.1109\/IIH-MSP.2014.162"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.04.010"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_196"},{"key":"e_1_2_9_33_2","doi-asserted-by":"crossref","unstructured":"HsuY. F.andChangS. F. Detecting image splicing using geometry invariants and camera characteristics consistency 2006 IEEE International Conference on Multimedia and Expo 2006 Toronto ON Canada IEEE 549\u2013552 https:\/\/doi.org\/10.1109\/ICME.2006.262447.","DOI":"10.1109\/ICME.2006.262447"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636089"},{"key":"e_1_2_9_35_2","doi-asserted-by":"crossref","unstructured":"DirikA. E.andMemonN. Image tamper detection based on demosaicing artifacts 2009 16th IEEE International Conference on Image Processing (ICIP) 2009 Cairo Egypt IEEE 1497\u20131500 https:\/\/doi.org\/10.1109\/ICIP.2009.5414611.","DOI":"10.1109\/ICIP.2009.5414611"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.03.025"},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.05.011"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"e_1_2_9_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3712-8"},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3795-2"},{"key":"e_1_2_9_41_2","doi-asserted-by":"crossref","unstructured":"Garcia-GarciaA. Orts-EscolanoS. OpreaS. Villena-MartinezV. andGarcia-RodriguezJ. A review on deep learning techniques applied to semantic segmentation 2017.","DOI":"10.1016\/j.asoc.2018.05.018"}],"container-title":["IET Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietsp\/2024\/9929900.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietsp\/2024\/9929900.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/2024\/9929900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T16:54:09Z","timestamp":1762361649000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/2024\/9929900"}},"subtitle":[],"editor":[{"given":"Richard","family":"Dansereau","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1049\/2024\/9929900"],"URL":"https:\/\/doi.org\/10.1049\/2024\/9929900","archive":["Portico"],"relation":{},"ISSN":["1751-9675","1751-9683"],"issn-type":[{"type":"print","value":"1751-9675"},{"type":"electronic","value":"1751-9683"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"2023-07-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9929900"}}