{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:05:59Z","timestamp":1761581159759},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,1,15]],"date-time":"2014-01-15T00:00:00Z","timestamp":1389744000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Digital image splicing blind detection is becoming a new and important subject in information security area. Among various approaches in extracting splicing clues, Markov state transition probability feature based on transform domain (discrete cosine transform or discrete wavelet transform) seems to be most promising in the state of the arts. However, the up-to-date extraction method of Markov features has some disadvantages in not exploiting the information of transformed coefficients thoroughly. In this paper, an enhanced approach of Markov state selection is proposed, which matches coefficients to Markov states base on well-performed function model. Experiments and analysis show that the improved Markov model can employ more useful underlying information in transformed coefficients and can achieve a higher recognition rate as results.<\/jats:p>","DOI":"10.1186\/1687-1499-2014-7","type":"journal-article","created":{"date-parts":[[2014,1,15]],"date-time":"2014-01-15T10:02:35Z","timestamp":1389780155000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Enhanced state selection Markov model for image splicing detection"],"prefix":"10.1186","volume":"2014","author":[{"given":"Bo","family":"Su","sequence":"first","affiliation":[]},{"given":"Quanqiao","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Shilin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chenglin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Shenghong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,15]]},"reference":[{"key":"862_CR1","first-page":"2168","volume-title":"Proceeding on International Conference on Acoustics, Speech, and Signal Processing, Atlanta","author":"N Nikolaidis","year":"1996","unstructured":"Nikolaidis N, Pitas I: Copyright protection of images using robust digital signatures. In Proceeding on International Conference on Acoustics, Speech, and Signal Processing, Atlanta. Edited by: Reeves Stanley J. Piscataway: IEEE Press; 1996:2168-2171."},{"issue":"12","key":"862_CR2","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 1997, 6(12):1673-1687. 10.1109\/83.650120","journal-title":"IEEE Trans. Image Process"},{"issue":"2","key":"862_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid H: A survey of image forgery detection. IEEE Signal Process. Mag. 2009, 26(2):16-25.","journal-title":"IEEE Signal Process. Mag"},{"key":"862_CR4","volume-title":"Dartmouth College","author":"AC Popescu","year":"2004","unstructured":"Popescu AC, Farid H: Exposing digital forgeries by detecting duplicated image regions, Technical report TR2004-515. Dartmouth College 2004."},{"key":"862_CR5","volume-title":"2006 8th International Conference on Signal Processing (ICSP 2006), Beijing","author":"J Wang","year":"2006","unstructured":"Wang J, Zhang H: Exposing digital forgeries by detecting traces of image splicing. In 2006 8th International Conference on Signal Processing (ICSP 2006), Beijing. Piscataway: IEEE; 2006. vol 2"},{"key":"862_CR6","first-page":"1","volume-title":"SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents IX, San Jose","author":"W Chen","year":"2007","unstructured":"Chen W, Shi Y: Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. In SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents IX, San Jose. Bellingham: SPIE; 2007:1-8. vol. 6505"},{"key":"862_CR7","first-page":"76","volume-title":"7th International Workshop in Digital Watermarking (IWDW 2008), Busan","author":"J Dong","year":"2008","unstructured":"Dong J, Wang W, Tan T, Shi Y: Run-length and edge statistics based approach for image splicing detection. In 7th International Workshop in Digital Watermarking (IWDW 2008), Busan. Heidelberg: Springer; 2008:76-87."},{"key":"862_CR8","first-page":"12","volume":"6526","author":"X Zhao","year":"2011","unstructured":"Zhao X, Li J, Li S, Wang S: Detecting digital image splicing in chroma spaces, International Workshop on Digital Watermarking 2010. LNCS 2011, 6526: 12-22.","journal-title":"LNCS"},{"key":"862_CR9","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1288869.1288878","volume-title":"9th Workshop on Multimedia and Security","author":"YQ Shi","year":"2007","unstructured":"Shi YQ, Chen C, Chen W: A natural image model approach to splicing detection. In 9th Workshop on Multimedia and Security. Edited by: Deepa K, Balakrishnan P. New York: ACM; 2007:51-62."},{"issue":"12","key":"862_CR10","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He Z, Lu W, Sun W, Huang J: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 2012, 45(12):4292-4299. 10.1016\/j.patcog.2012.05.014","journal-title":"Pattern Recogn"},{"key":"862_CR11","unstructured":"New York: Columbia DVMM Research Lab; 2004.http:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/authsplcuncmp . Accessed 3 July 2013"},{"issue":"4","key":"862_CR12","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/78.668544","volume":"46","author":"M Crouse","year":"1998","unstructured":"Crouse M, Nowak RD, Baraniuk RG: Wavelet-based signal processing using hidden Markov models. IEEE Trans. Signal Proc. (Special Issue on Wavelets and Filter banks) 1998, 46(4):886-902.","journal-title":"IEEE Trans. Signal Proc. (Special Issue on Wavelets and Filter banks)"},{"key":"862_CR13","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970104","volume-title":"Ten Lectures on Wavelets","author":"I Daubechies","year":"1992","unstructured":"Daubechies I: Ten Lectures on Wavelets. Philadelphia: Society for Industrial and Applied Mathematics; 1992."},{"issue":"27","key":"862_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang C-C, C-J Lin LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2011, 2(27):1-27. Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm","journal-title":"ACM Trans. Intell. Syst. Technol"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T20:24:47Z","timestamp":1688934287000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,15]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["862"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-7","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,15]]},"assertion":[{"value":"20 November 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2013","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"7"}}