{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:17:55Z","timestamp":1774369075799,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:00:00Z","timestamp":1696982400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:00:00Z","timestamp":1696982400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,11]]},"DOI":"10.1109\/iccst59048.2023.10474252","type":"proceedings-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T19:06:57Z","timestamp":1711393617000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Transform Domain Techniques combined with LBP for Tampered Image Detection using Machine Learning"],"prefix":"10.1109","author":[{"given":"Aziz","family":"Makandar","sequence":"first","affiliation":[{"name":"KSAWU Vijayapura,Department of Computer Science"}]},{"given":"Shilpa","family":"Kaman","sequence":"additional","affiliation":[{"name":"KSAWU Vijayapura,Department of Computer Science"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.020368"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4270776"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.talanta.2019.120520"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SAMI48414.2020.9108753"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18405-5_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781118705773.ch13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.13456"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-013-0547-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2015.067996"},{"issue":"3","key":"ref10","first-page":"163","article-title":"Digital image security using digital watermarking","volume":"5","author":"Kapse","year":"2018","journal-title":"International Research Journal of Engineering and Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2019.05.04"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/sec.721"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/globalsip.2013.6736863"},{"issue":"02","key":"ref14","first-page":"1844","article-title":"Digital Image Forgery Detection using Local Binary Patterns (LBP) and Histogram of Oriented Gradients(HOG)","volume":"06","author":"Kaushik","year":"2019","journal-title":"(IRJET)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2021.1883397"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2017.108"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2895466"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.038"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/iprecon52453.2021.9640976"},{"key":"ref20","first-page":"978","article-title":"Local DCT-Based Deep Learning Architecture for Image Forgery Detection","volume-title":"Computer Vision and Machine Intelligence, Lecture Notes in Networks and Systems","volume":"586","author":"Shekar","year":"2023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/chinasip.2013.6625374"},{"issue":"1","key":"ref22","first-page":"83","volume-title":"Hybrid Image-Retrieval Method for Image-Splicing Validation","volume":"11","author":"Nam","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/globalsip.2013.6736863"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.244"},{"issue":"5","key":"ref26","first-page":"1801","article-title":"An efficient method for detection of copy-move forgery using discrete wavelet transform [J]","volume":"2","year":"2010","journal-title":"International Journal on Computer Science and Engineering"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.05.014"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652660"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2012-240"},{"key":"ref30","author":"Ghodsi","year":"2006","journal-title":"Dimensionality Reduction a Short Tutorial, Department of Statistics and Actuarial Science, University of Waterloo, Ontario, Canada"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/606570"}],"event":{"name":"2023 IEEE International Carnahan Conference on Security Technology (ICCST)","location":"Pune, India","start":{"date-parts":[[2023,10,11]]},"end":{"date-parts":[[2023,10,15]]}},"container-title":["2023 IEEE International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10474215\/10474227\/10474252.pdf?arnumber=10474252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T21:40:34Z","timestamp":1711489234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10474252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iccst59048.2023.10474252","relation":{},"subject":[],"published":{"date-parts":[[2023,10,11]]}}}