{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:40:07Z","timestamp":1654098007831},"reference-count":26,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1,1]]},"abstract":"<p>A robust method for local image region feature description based on step sector statistics is proposed in this paper. The means and the standard deviations along the radial direction of the circle image region are extracted through the sector masks, and the rearrangement of these statistics makes this image region description method rotation-robust. The proposed description method is applied in the detection of copy-rotate-move forgery, and it can detect the exact rotation angle between the duplicate regions. With minor extension, the proposed description method can also be applied in the detection of copy-flip-move forgery. The experimental results show that the proposed description method can work well for the detection of copy-rotate\/flip-move forgery.<\/p>","DOI":"10.4018\/jdcf.2012010104","type":"journal-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T13:11:38Z","timestamp":1333631498000},"page":"49-62","source":"Crossref","is-referenced-by-count":6,"title":["An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate\/Flip-Move Forgery Detection"],"prefix":"10.4018","volume":"4","author":[{"given":"Likai","family":"Chen","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Wei","family":"Lu","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]}],"member":"2432","reference":[{"key":"jdcf.2012010104-0","doi-asserted-by":"crossref","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Bimbo, A. D., & Serra, G. (2010). Geometric tampering estimation by means of a SIFT-based forensic analysis. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (pp. 1702-1705).","DOI":"10.1109\/ICASSP.2010.5495485"},{"key":"jdcf.2012010104-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"jdcf.2012010104-2","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H. T., & Memon, N. (2009). An efficient and robust method for detecting copy-move forgery. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 1053-1056).","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"jdcf.2012010104-3","unstructured":"Bayram, S., Sencar, H. T., & Memon, N. (2009). A survey of copy-move forgery detection techniques. Retrieved from http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.140.5185&rep=rep1&type=pdf"},{"key":"jdcf.2012010104-4","unstructured":"CASIA. (2009). CASIA tampered image detection evaluation database (CASIA TIDE v2.0). Retrieved from http:\/\/forensics.idealtest.org\/"},{"key":"jdcf.2012010104-5","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(09)01201-7"},{"key":"jdcf.2012010104-6","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., & Du, M. (2001). Invertible authentication. In Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents (Vol. 4313, pp. 197-208).","DOI":"10.1117\/12.435400"},{"key":"jdcf.2012010104-7","unstructured":"Fridrich, J., Soukal, D., & Lukas, J. (2003). Detection of copy-move forgery in digital images. In Proceeding of the Digital Forensic Research Workshop, Cleveland, OH (pp. 19-23)."},{"key":"jdcf.2012010104-8","doi-asserted-by":"crossref","unstructured":"Huang, H., Guo, W., & Zhang, Y. (2008). Detection of copy-move forgery in digital images using SIFT algorithm. In Proceedings of the IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application (Vol. 2, pp. 272-276).","DOI":"10.1109\/PACIIA.2008.240"},{"key":"jdcf.2012010104-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2009.09.004"},{"key":"jdcf.2012010104-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2010.08.001"},{"key":"jdcf.2012010104-11","unstructured":"Iran test-fired long-range missiles Photo suspected of fraud. (2008). People\u2019s Network. Retrieved from http:\/\/news.163.com\/08\/0711\/19\/4GJI52PQ0001121M.html"},{"key":"jdcf.2012010104-12","author":"S.Katzenbeisser","year":"2000","journal-title":"Information techniques for steganography and digital watermarking"},{"key":"jdcf.2012010104-13","unstructured":"Kodak. (1999). The Kodak lossless true color image suite. Retrieved from http:\/\/r0k.us\/graphics\/kodak\/"},{"key":"jdcf.2012010104-14","doi-asserted-by":"publisher","DOI":"10.1109\/5.771070"},{"key":"jdcf.2012010104-15","doi-asserted-by":"crossref","unstructured":"Li, G., Wu, Q., Tu, D., & Sun, S. (2007). A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In Proceedings of the IEEE International Conference on Multimedia and Expo (pp. 1750-1753).","DOI":"10.1109\/ICME.2007.4285009"},{"key":"jdcf.2012010104-16","doi-asserted-by":"crossref","unstructured":"Lin, E., Podilchuk, C., & Delp, E. (2000). Detection of image alterations using semi-fragile watermarks. In Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents (Vol. 3971, pp. 52-163).","DOI":"10.1117\/12.384969"},{"key":"jdcf.2012010104-17","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"jdcf.2012010104-18","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.811621"},{"key":"jdcf.2012010104-19","unstructured":"Luo, W., Huang, J., & Qiu, G. (2006). Robust detection of region duplication forgery in digital image. In Proceedings of the 18th International Conference on Pattern Recognition (Vol. 4, pp. 746-749)."},{"key":"jdcf.2012010104-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.11.002"},{"key":"jdcf.2012010104-21","doi-asserted-by":"crossref","unstructured":"Myna, A. N., Venkateshmurthy, M. G., & Patil, C. G. (2007). Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (Vol. 3, pp. 371-377).","DOI":"10.1109\/ICCIMA.2007.271"},{"key":"jdcf.2012010104-22","unstructured":"Ng, T., Chang, S. F., & Sun, Q. (2004). Blind detection of photomontage using higher order statistics. In Proceedings of the IEEE International Symposium on Circuits and Systems, Vancouver, BC, Canada (pp. 688-691)."},{"key":"jdcf.2012010104-23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2078506"},{"key":"jdcf.2012010104-24","unstructured":"Popescu, A. C., & Farid, H. (2004). Exposing digital forgeries by detecting duplicated image regions (Tech. Rep. No. TR2004-515). Hanover, NH: Dartmouth College."},{"key":"jdcf.2012010104-25","unstructured":"Xu, B., Wang, J., Liu, G., & Dai, Y. (2010). Image copy-move forgery detection based on SURF. In Proceedings of the International Conference on Multimedia Information on Networking and Security (pp. 889-892)."}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=65736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:26:38Z","timestamp":1654097198000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2012010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,1,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2012010104","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,1]]}}}