{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:12:15Z","timestamp":1654128735511},"reference-count":33,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10,1]]},"abstract":"<p>In this paper, the authors investigate the prospect of using multi-resolution histograms (MRH) in conjunction with digital image forensics, particularly in the detection of two kinds of copy-move manipulations, i.e., cloning and splicing. To the best of the authors\u2019 knowledge, this is the first work that uses the same feature in both cloning and splicing forensics. The experimental results show the simplicity and efficiency of using MRH for the purpose of clone detection and splicing detection.<\/p>","DOI":"10.4018\/jdcf.2010100103","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T20:19:15Z","timestamp":1297801155000},"page":"37-50","source":"Crossref","is-referenced-by-count":0,"title":["Digital Image Forensics Using Multi-Resolution Histograms"],"prefix":"10.4018","volume":"2","author":[{"given":"Jin","family":"Liu","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Hefei","family":"Ling","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Fuhao","family":"Zou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"WeiQi","family":"Yan","sequence":"additional","affiliation":[{"name":"Queen\u2019s University Belfast, UK"}]},{"given":"Zhengding","family":"Lu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]}],"member":"2432","reference":[{"key":"jdcf.2010100103-0","unstructured":"Chang, C. C., & Lin, C. J. (n.d.). LIBSVM: A Library for Support Vector Machines. Retrieved from http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/index.html"},{"key":"jdcf.2010100103-1","author":"M.Chen","year":"2007","journal-title":"Imaging sensor noise as digital X-ray for revealing forgeries (No. 03029743)"},{"key":"jdcf.2010100103-2","doi-asserted-by":"publisher","DOI":"10.1002\/asmb.537"},{"key":"jdcf.2010100103-3","unstructured":"Fridrich, J., Soukal, D., & Lukas, J. (2003). Detection of copy-move forgery in digital images. Paper presented at the Digital Forensic Research Workshop, Cleveland, OH."},{"key":"jdcf.2010100103-4","doi-asserted-by":"crossref","unstructured":"Gallagher, A. c. (2005). Detection of linear and cubic interpolation in jpeg compressed images. Paper presented at the 2nd Canadian Conference Computer and Robot Vision, Victoria, British Columbia, Canada.","DOI":"10.1109\/CRV.2005.33"},{"key":"jdcf.2010100103-5","doi-asserted-by":"crossref","unstructured":"Gou, H., Swaminathan, A., & Wu, M. (2007). Noise features for image tampering detection and steganalysis. Paper presented at the IEEE International Conference on Image Processing, San Antonio, TX.","DOI":"10.1109\/ICIP.2007.4379530"},{"key":"jdcf.2010100103-6","doi-asserted-by":"crossref","unstructured":"Hadjidemetriou, E., Grossberg, M. D., & Nayar, S. K. (2001). Spatial information in multiresolution histograms. In Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2001), Los Alamitos, CA.","DOI":"10.1109\/CVPR.2001.990544"},{"key":"jdcf.2010100103-7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.32"},{"key":"jdcf.2010100103-8","doi-asserted-by":"crossref","unstructured":"Hsiao, D. Y., & Pei, S. C. (2005). Detecting digital tampering by blur estimation. Paper presented at the 1st International Workshop on Systematic Approaches to Digital Forensic Engineering, Taipei, China.","DOI":"10.1109\/SADFE.2005.8"},{"key":"jdcf.2010100103-9","doi-asserted-by":"crossref","unstructured":"Hsu, Y.-F., & Chang, S.-F. (2006). Detecting image splicing using geometry invariants and camera characteristics consistency. Paper presented at the 2006 IEEE International Conference on Multimedia and Expo (ICME 2006), Toronto, ON, Canada.","DOI":"10.1109\/ICME.2006.262447"},{"key":"jdcf.2010100103-10","doi-asserted-by":"crossref","unstructured":"Huang, H., Guo, W., & Zhang, Y. (2008). Detection of copy-move forgery in digital images using SIFT algorithm. Paper presented at the 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA 2008), Piscataway, NJ.","DOI":"10.1109\/PACIIA.2008.240"},{"key":"jdcf.2010100103-11","doi-asserted-by":"crossref","unstructured":"Johnson, M. K., & Farid, H. (2005). Exposing digital forgeries by detecting inconsistencies in lighting. Paper presented at the ACM Multimedia and Security Workshop, NewYork.","DOI":"10.1145\/1073170.1073171"},{"key":"jdcf.2010100103-12","author":"M. K.Johnson","year":"2007","journal-title":"Exposing digital forgeries through specular highlights on the eye (No. 03029743)"},{"key":"jdcf.2010100103-13","author":"M. K.Johnson","year":"2008","journal-title":"Detecting photographic composites of people (No. 03029743)"},{"key":"jdcf.2010100103-14","doi-asserted-by":"crossref","unstructured":"Kirchner, M. (2008). Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In Proceedings of the MM and Sec'08 10th ACM Workshop on Multimedia and Security, Oxford, UK.","DOI":"10.1145\/1411328.1411333"},{"key":"jdcf.2010100103-15","unstructured":"Lab, C. D. R. (2004). Columbia Image Splicing Detection Evaluation Dataset. Retrieved from http:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/AuthSplicedDataSet\/AuthSplicedDataSet.htm"},{"key":"jdcf.2010100103-16","doi-asserted-by":"crossref","unstructured":"Li, G., Wu, Q., Tu, D., & Sun, S. (2007). A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. Paper presented at the 2007 International Conference on Multimedia Expo, Piscataway, NJ.","DOI":"10.1109\/ICME.2007.4285009"},{"key":"jdcf.2010100103-17","unstructured":"Lin, Z. C., Wang, R. R., Tang, X. O., & Shum, H. Y. (2005). Detecting doctored images using camera response normality and consistency analysis. Paper presented at the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Diego, CA."},{"key":"jdcf.2010100103-18","doi-asserted-by":"crossref","unstructured":"Long, Y. J., & Huang, Y. Z. (2006). Image based source camera identification using demosaicing. Paper presented at the 8th Workshop on Multimedia Siganal Processing, Victoria, TX.","DOI":"10.1109\/MMSP.2006.285343"},{"key":"jdcf.2010100103-19","doi-asserted-by":"crossref","unstructured":"Lu, W., Sun, W., Huang, J.-W., & Lu, H.-T. (2008). Digital image forensics using statistical features and neural network classifier. Paper presented at the 2008 International Conference on Machine Learning and Cybernetics (ICMLC), Piscataway, NJ.","DOI":"10.1109\/ICMLC.2008.4620890"},{"key":"jdcf.2010100103-20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"jdcf.2010100103-21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839896"},{"key":"jdcf.2010100103-22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2004.924603"},{"key":"jdcf.2010100103-23","unstructured":"Ng, T.-T., Chang, S., & Sun, Q. (2004, May). Blind Detection of Photomontage Using Higher Order Statistics. Paper presented at the IEEE International Symposium on Circuits and Systems (ISCAS), Vancouver, Canada."},{"key":"jdcf.2010100103-24","author":"A. C.Popescu","year":"2004","journal-title":"Exposing Digital Forgeries by Detecting Duplicated Image Regions (Tech. Rep.)"},{"key":"jdcf.2010100103-25","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839932"},{"key":"jdcf.2010100103-26","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855406"},{"key":"jdcf.2010100103-27","doi-asserted-by":"crossref","unstructured":"Prasad, S., & Ramakrishnan, K. R. (2006). On resampling detection and its application to image tampering. Paper presented at the IEEE International Conference Multimedia and Exposition, Toronto, Canada.","DOI":"10.1109\/ICME.2006.262783"},{"key":"jdcf.2010100103-28","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., Coskun, B., Sencar, H. T., & Memon, N. (2007). Tamper detection based on regularity of wavelet transform coefficients. In Proceedings of 2007 IEEE International Conference on Image Processing, San Antonio, TX.","DOI":"10.1109\/ICIP.2007.4378975"},{"key":"jdcf.2010100103-29","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Wu, M., & Liu, K. (2006). Image tampering identification using blind deconvolution. Paper presented at the IEEE International Conference on Image Processing, Atlanta.","DOI":"10.1109\/ICIP.2006.312848"},{"key":"jdcf.2010100103-30","unstructured":"Tian-Tsong, N., Shih-Fu, C., Jessie, H., Lexing, X., & Mao-Pei, T. (2005). Physics-motivated features for distinguishing photographic images and computer graphics. Paper presented at the 13th Annual ACM International Conference on Multimedia, New York."},{"key":"jdcf.2010100103-31","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Kang, J., & Ren, Y. (2008). An effective algorithm of image splicing detection. Paper presented at the International Conference on Computer Science and Software Engineering (CSSE 2008), Wuhan, Hubei, China.","DOI":"10.1109\/CSSE.2008.1621"},{"key":"jdcf.2010100103-32","unstructured":"Zhen, Z., Yukun, B., & Xijian, P. (2008). Image blind forensics using artificial neural network. Paper presented at the 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), Piscataway, NJ."}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=47070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:44:40Z","timestamp":1654127080000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2010100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,10,1]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2010100103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,1]]}}}