{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T11:31:19Z","timestamp":1770031879489,"version":"3.49.0"},"reference-count":41,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:00:00Z","timestamp":1616630400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2021,11,17]]},"abstract":"<jats:p>In the era of digital technology, it becomes easy to share photographs and videos using smartphones and social networking sites to their loved ones. On the other hand, many photo editing tools evolved to make it effortless to alter multimedia content. It makes people accustomed to modifying their photographs or videos either for fun or extracting attention from others. This altering brings a questionable validity and integrity to the kind of multimedia content shared over the internet when used as evidence in Journalism and Court of Law. In multimedia forensics, intense research work is underway over the past two decades to bring trustworthiness to the multimedia content. This paper proposes an efficient way of identifying the manipulated region based on Noise Level inconsistencies of spliced mage. The spliced image segmented into irregular objects and extracts the noise features in both pixel and residual domains. The manipulated region is then exposed based on the cosine similarity of noise levels among pairs of individual objects. The experimental results reveal the effectiveness of the proposed method over other state-of-art methods.<\/jats:p>","DOI":"10.3233\/jifs-189861","type":"journal-article","created":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T14:37:08Z","timestamp":1617115028000},"page":"5387-5397","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Effective splicing localization based on noise level inconsistencies"],"prefix":"10.1177","volume":"41","author":[{"given":"P. N. R. L.","family":"Chandra Sekhar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India"}]},{"given":"T. N.","family":"Shankar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India"}]}],"member":"179","published-online":{"date-parts":[[2021,3,25]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2074194"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0688-y"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3712-8"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3795-2"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.03.005"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.C3999.098319"},{"issue":"11","key":"e_1_3_2_10_2","first-page":"471","article-title":"Review on Image Splicing Forgery Detection","volume":"14","author":"Chandra Sekhar P.N.R.L.","year":"2016","unstructured":"Chandra SekharP.N.R.L. and ShankarT.N., Review on Image Splicing Forgery Detection, International Journal of Computer Science and Information Security14(11) (2016), 471\u2013475.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2221728"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2121056"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"ChenG. ZhuF. and HengP.A. An Efficient Statistical Method for Image Noise Level Estimation IEEE International Conference in Computer Vision (2015) 477\u2013485.","DOI":"10.1109\/ICCV.2015.62"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2283400"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"LiuB. PunC.M. and YuanX.C. Digital image forgery detection using JPEG features and local noise discrepancies The Scientific World Journal (2014) 1\u201312.","DOI":"10.1155\/2014\/230425"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.05.014"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","unstructured":"PanX. ZhangX. and LyuS. Exposing image splicing with inconsistent local noise variances IEEE international Conference on Computer Photography (2012).","DOI":"10.1109\/ICCPhot.2012.6215223"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7408-8"},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"QuS. An approach based on object detection for image forensics 1st International Conference on Industrial Artificial Intelligence (IAI) Shenyang China (2019) 1\u20136.","DOI":"10.1109\/ICIAI.2019.8850791"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2938467"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2880433"},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","unstructured":"TripathiE. KumarU. TripathiS.P. and YadavS. Automated Image Splicing Detection using Texture based Feature Criterion and Fuzzy Support Vector Machine based Classifier International Conference on Cutting-edge Technologies in Engineering (ICon-CuTE) Uttar Pradesh India (2019) 81\u201386.","DOI":"10.1109\/ICon-CuTE47290.2019.8991470"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970735"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Phan HoA.T. and RetraintF. Effective images splicing detection based on decision fusion IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) Ajman United Arab Emirates (2020) 1\u20135.","DOI":"10.1109\/ISSPIT47144.2019.9001783"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.0842"},{"key":"e_1_3_2_28_2","first-page":"172","article-title":"Locating splicing forgery by adaptive-SVD noise estimation and vicinity noise descriptor","volume":"387","author":"Liu B.","year":"2020","unstructured":"LiuB. and PunC.-M., Locating splicing forgery by adaptive-SVD noise estimation and vicinity noise descriptor, Science Direct-Neuro computing387 (2020), 172\u2013187.","journal-title":"Science Direct-Neuro computing"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.099"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3372-2"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891632"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1505896"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2895466"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.04.011"},{"key":"e_1_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Ali QureshiM. and DericheM. A review on copy-move image forgery detection techniques IEEE 11th International Multi-Conference on Systems (2014) 1\u20135.","DOI":"10.1109\/SSD.2014.6808907"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0620-1"},{"key":"e_1_3_2_37_2","first-page":"158","article-title":"Steganalysis Versus Splicing Detection","volume":"5041","author":"Shi Y.Q.","year":"2008","unstructured":"ShiY.Q., ChenC., XuanG. and SuW., Steganalysis Versus Splicing Detection, Digital Watermarking. IWDW 20075041 (2008), 158\u2013172.","journal-title":"Digital Watermarking. IWDW 2007"},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","unstructured":"BunkJ. and BappyJ.H. Detection and Localization of Image Forgeries using Resampling Features and Deep Learning Computer Vision and Pattern Recognition (2017) 1\u20139.","DOI":"10.1109\/CVPRW.2017.235"},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","unstructured":"HeK. GkioxariG. DollarP. and GirshickR. Mask R-CNN EEE International Conference on Computer Vision (ICCV) (2017) 2980\u20132988.","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_2_40_2","doi-asserted-by":"crossref","unstructured":"HsuY. ChangS. Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency IEEE International Conference on Multimedia and Expo (2006) 549\u2013552.","DOI":"10.1109\/ICME.2006.262447"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2265677"},{"key":"e_1_3_2_42_2","unstructured":"AbdullaW. Mask R-CNN for object detection and instance segmentation on Keras and Tensor Flow Git Hub Repository (2017)."}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189861","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-189861","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:53:31Z","timestamp":1769993611000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-189861"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,25]]},"references-count":41,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,11,17]]}},"alternative-id":["10.3233\/JIFS-189861"],"URL":"https:\/\/doi.org\/10.3233\/jifs-189861","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,25]]}}}