A novel method for digital image copy-move forgery detection and localization using evolving cellular automata and local binary patterns

Copy-Move Forgery Detection (CMFD) methods aim to forensically analyze a digital image for a possible content duplication manipulation. In the past, many block-based algorithms have been proposed for detection and localization of CMF. However, the existing solutions show limited efficacy for images...

Full description

Saved in:
Bibliographic Details
Published inEvolving systems Vol. 12; no. 2; pp. 503 - 517
Main Authors Gani, Gulnawaz, Qadir, Fasel
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2021
Subjects
Online AccessGet full text
ISSN1868-6478
1868-6486
DOI10.1007/s12530-019-09309-1

Cover

Abstract Copy-Move Forgery Detection (CMFD) methods aim to forensically analyze a digital image for a possible content duplication manipulation. In the past, many block-based algorithms have been proposed for detection and localization of CMF. However, the existing solutions show limited efficacy for images compressed in JPEG and lack robustness against post-processing attacks such as noise addition, blurring, etc. To address this problem, we propose a new block-based passive method for detection and localization of CMF in this paper. Passive methods, as opposed to active methods, are used to authenticate the image content in the absence of any pre-embedded information such as watermarks. In our proposed scheme, a suspicious input image to be analyzed is first low pass filtered and converted to Local Binary Patterns (LBP) image. The LBP texture image is then divided into overlapping blocks. Next, a compact five-dimensional feature vector is extracted from each block by employing thresholding and Cellular Automata. The set of feature vectors is sorted lexicographically to bring the copy-pasted blocks nearer to each other. Finally, the feature matching step is used to reveal the duplicate blocks. Our experimental results indicate that the proposed method performs exceptionally well relative to other state-of-art-methods, under different image manipulation scenarios.
AbstractList Copy-Move Forgery Detection (CMFD) methods aim to forensically analyze a digital image for a possible content duplication manipulation. In the past, many block-based algorithms have been proposed for detection and localization of CMF. However, the existing solutions show limited efficacy for images compressed in JPEG and lack robustness against post-processing attacks such as noise addition, blurring, etc. To address this problem, we propose a new block-based passive method for detection and localization of CMF in this paper. Passive methods, as opposed to active methods, are used to authenticate the image content in the absence of any pre-embedded information such as watermarks. In our proposed scheme, a suspicious input image to be analyzed is first low pass filtered and converted to Local Binary Patterns (LBP) image. The LBP texture image is then divided into overlapping blocks. Next, a compact five-dimensional feature vector is extracted from each block by employing thresholding and Cellular Automata. The set of feature vectors is sorted lexicographically to bring the copy-pasted blocks nearer to each other. Finally, the feature matching step is used to reveal the duplicate blocks. Our experimental results indicate that the proposed method performs exceptionally well relative to other state-of-art-methods, under different image manipulation scenarios.
Author Qadir, Fasel
Gani, Gulnawaz
Author_xml – sequence: 1
  givenname: Gulnawaz
  surname: Gani
  fullname: Gani, Gulnawaz
  organization: Department of Computer Science, University of Kashmir
– sequence: 2
  givenname: Fasel
  orcidid: 0000-0003-2294-0338
  surname: Qadir
  fullname: Qadir, Fasel
  email: fasel.scholars@gmail.com
  organization: Department of Computer Science, University of Kashmir
BookMark eNp9kM1KAzEQgIMoWLUv4CkvsDpJttnkKOIfFLzoeZkmaV1Jk5KkhfoEPrapFQUPPc0wM98w852R4xCDI-SSwRUD6K4z4xMBDTDdgBagG3ZERkxJ1chWyePfvFOnZJzzOwBw1gK03Yh83tAQN87TpStv0dJ5TNQOi6Ggp8MSF46auNo2yzqz6y1c2lLrijNliIFisNRHg374wO_COg9hQd0m-s0uMc77tcdEcV3iEgv-EXQ2BKzLVliKSyFfkJM5-uzGP_GcvN7fvdw-NtPnh6fbm2ljuGalsQjM2taJGU7QaSaBQzdn2nRGKsPtTCiBLUqtdMeFkJwLqybaSHA4k1XPOVH7vSbFnJOb96Y-uzu-JBx8z6DfSe33Uvsqtf-W2rOK8n_oKlVHaXsYEnso1-FQ_fXvcZ1CffEQ9QVk_Y7A
CitedBy_id crossref_primary_10_1007_s11042_021_11503_w
crossref_primary_10_1016_j_jvcir_2022_103658
crossref_primary_10_1117_1_JEI_33_4_043004
crossref_primary_10_1016_j_jisa_2020_102510
crossref_primary_10_1007_s13042_024_02370_6
crossref_primary_10_1007_s11760_023_02484_4
crossref_primary_10_1007_s11277_023_10216_7
crossref_primary_10_1007_s11042_021_11174_7
crossref_primary_10_1007_s11227_023_05042_4
Cites_doi 10.1016/j.jvcir.2018.03.015
10.1016/j.forsciint.2013.09.013
10.1016/j.ins.2015.03.009
10.1016/j.ins.2018.06.040
10.1109/TSMCB.2010.2091271
10.1002/int.20462
10.1155/2018/6853696
10.1002/9781118798706.hdi044
10.1109/TSMC.1979.4310076
10.1016/j.eng.2018.02.008
10.1109/TIFS.2013.2272377
10.1007/s11042-015-2961-2
10.1109/TIFS.2012.2218597
10.1016/j.forsciint.2010.08.001
10.1186/s41235-017-0067-2
10.1016/j.jksuci.2018.12.006
10.1007/s11042-018-6201-4
10.1109/TIFS.2015.2445742
10.1016/j.forsciint.2013.04.023
10.1016/j.compeleceng.2017.03.013
10.1016/j.forsciint.2011.07.015
10.1007/s41870-018-0166-4
10.1109/TIFS.2011.2129512
10.1109/PACIIA.2008.240
10.1109/TSMCB.2003.810438
10.1108/IJICC-10-2017-0132
10.1016/j.cviu.2010.02.005
10.5815/ijcnis.2013.02.05
10.1016/j.patrec.2015.11.019
10.1145/2905055.2905134
10.1109/CISDA.2007.368145
10.1109/MINES.2010.189
10.1109/ICIP.2016.7532339
ContentType Journal Article
Copyright Springer-Verlag GmbH Germany, part of Springer Nature 2019
Copyright_xml – notice: Springer-Verlag GmbH Germany, part of Springer Nature 2019
DBID AAYXX
CITATION
DOI 10.1007/s12530-019-09309-1
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1868-6486
EndPage 517
ExternalDocumentID 10_1007_s12530_019_09309_1
GroupedDBID -EM
06D
0R~
0VY
1N0
203
29~
2JY
2VQ
30V
4.4
406
408
409
40D
96X
AAAVM
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATLR
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
AAZMS
ABAKF
ABBXA
ABDZT
ABECU
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMQK
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACDTI
ACGFS
ACHSB
ACKNC
ACMLO
ACOKC
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGNC
AEJHL
AEJRE
AEMSY
AEOHA
AEPYU
AESKC
AETCA
AEVLU
AEXYK
AFBBN
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
AKLTO
ALFXC
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMXSW
AMYLF
AMYQR
ANMIH
ARAPS
AUKKA
AXYYD
AYJHY
BENPR
BGLVJ
BGNMA
CCPQU
CSCUP
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FYJPI
GGCAI
GGRSB
GJIRD
GQ6
GQ7
GQ8
H13
HCIFZ
HF~
HG6
HMJXF
HQYDN
HRMNR
HZ~
I0C
IKXTQ
IWAJR
IXD
IZIGR
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K7-
KOV
LLZTM
M4Y
NPVJJ
NQJWS
NU0
O9-
O93
O9J
P9P
PT4
QOS
R89
R9I
RLLFE
ROL
RSV
S1Z
S27
S3B
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
T13
TSG
U2A
UG4
UOJIU
UTJUX
UZXMN
VFIZW
W48
WK8
Z45
Z83
Z88
ZMTXR
~A9
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
ID FETCH-LOGICAL-c291t-da01dd4e3ba5ae9160207f19c7c68c2db383a4a698972336223d859c60eab6093
IEDL.DBID AGYKE
ISSN 1868-6478
IngestDate Thu Apr 24 22:51:43 EDT 2025
Wed Oct 01 01:12:15 EDT 2025
Fri Feb 21 02:48:16 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Local Binary Patterns
Copy-Move Forgery
Passive method
Thresholding
Cellular Automata
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-da01dd4e3ba5ae9160207f19c7c68c2db383a4a698972336223d859c60eab6093
ORCID 0000-0003-2294-0338
PageCount 15
ParticipantIDs crossref_citationtrail_10_1007_s12530_019_09309_1
crossref_primary_10_1007_s12530_019_09309_1
springer_journals_10_1007_s12530_019_09309_1
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210600
2021-06-00
PublicationDateYYYYMMDD 2021-06-01
PublicationDate_xml – month: 6
  year: 2021
  text: 20210600
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
PublicationSubtitle An Interdisciplinary Journal for Advanced Science and Technology
PublicationTitle Evolving systems
PublicationTitleAbbrev Evolving Systems
PublicationYear 2021
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
References Rosin (CR25) 2010
Christlein, Riess, Jordan, Riess, Angelopoulou (CR7) 2012; 7
Jeelani, Qadir (CR12) 2018; 11
Wang, Wang (CR31) 2018; 2018
Amerini, Ballan, Member, Caldelli, Bimbo, Serra (CR2) 2011; 6
Mahmood, Mehmood, Shah, Saba (CR18) 2018; 53
Lee, Chang, Chen (CR15) 2015; 321
CR36
CR34
Davarzani, Yaghmaie, Mozaffari, Tapak (CR8) 2013; 231
CR33
Nightingale, Wade, Watson (CR20) 2017; 2
CR32
Angelov, Sadeghi-tehran, Ramezani (CR3) 2011; 26
Sun, Rosin, Martin (CR28) 2011
Lin, Li, Wang, Liew, Cheng, Huang (CR17) 2018
Al-Qershi, Khoo (CR1) 2018; 77
Qadir, Peer, Khan (CR24) 2013; 5
Cao, Gao, Fan, Yang (CR6) 2012; 214
Huang, Lu, Sun, Long (CR11) 2011; 206
Mehta, Egiazarian (CR19) 2016; 71
CR29
Qadir, Shoosha (CR23) 2018; 10
CR27
Zhao, Guo (CR35) 2013; 233
Otsu (CR21) 1979; 9
Krawetz (CR14) 2015
Fridrich, Soukal, Lukáš (CR9) 2003
Tralic, Grgic, Sun, Rosin (CR30) 2016; 75
Hayat, Qazi (CR10) 2017
Ardizzone, Bruno, Mazzola (CR4) 2015; 10
Pun, Chung (CR22) 2018; 463–464
Jeelani, Qadir (CR13) 2019
Billings, Yang (CR5) 2003; 33
Ryu, Kirchner, Lee, Lee (CR26) 2013; 8
Li, Li, Zhu, Chu, Roddick, Pan (CR16) 2013; 4
V Christlein (9309_CR7) 2012; 7
R Davarzani (9309_CR8) 2013; 231
L Li (9309_CR16) 2013; 4
H Wang (9309_CR31) 2018; 2018
D Tralic (9309_CR30) 2016; 75
I Amerini (9309_CR2) 2011; 6
Y Huang (9309_CR11) 2011; 206
9309_CR32
9309_CR33
9309_CR36
9309_CR34
F Qadir (9309_CR23) 2018; 10
F Qadir (9309_CR24) 2013; 5
P Angelov (9309_CR3) 2011; 26
J Fridrich (9309_CR9) 2003
Z Jeelani (9309_CR13) 2019
K Hayat (9309_CR10) 2017
N Otsu (9309_CR21) 1979; 9
SJ Ryu (9309_CR26) 2013; 8
OM Al-Qershi (9309_CR1) 2018; 77
X Lin (9309_CR17) 2018
J Zhao (9309_CR35) 2013; 233
Y Cao (9309_CR6) 2012; 214
R Mehta (9309_CR19) 2016; 71
SJ Nightingale (9309_CR20) 2017; 2
CM Pun (9309_CR22) 2018; 463–464
E Ardizzone (9309_CR4) 2015; 10
SA Billings (9309_CR5) 2003; 33
Z Jeelani (9309_CR12) 2018; 11
N Krawetz (9309_CR14) 2015
X Sun (9309_CR28) 2011
JC Lee (9309_CR15) 2015; 321
T Mahmood (9309_CR18) 2018; 53
9309_CR29
9309_CR27
PL Rosin (9309_CR25) 2010
References_xml – volume: 53
  start-page: 202
  year: 2018
  end-page: 214
  ident: CR18
  article-title: A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2018.03.015
– volume: 233
  start-page: 158
  year: 2013
  end-page: 166
  ident: CR35
  article-title: Passive forensics for copy-move image forgery using a method based on DCT and SVD
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2013.09.013
– volume: 321
  start-page: 250
  year: 2015
  end-page: 262
  ident: CR15
  article-title: Detection of copy-move image forgery using histogram of orientated gradients
  publication-title: Inf Sci (NY)
  doi: 10.1016/j.ins.2015.03.009
– volume: 463–464
  start-page: 33
  year: 2018
  end-page: 55
  ident: CR22
  article-title: A two-stage localization for copy-move forgery detection
  publication-title: Inf Sci (NY)
  doi: 10.1016/j.ins.2018.06.040
– year: 2011
  ident: CR28
  article-title: Fast rule identification and neighborhood selection for cellular automata
  publication-title: IEEE Trans Syst Man Cybern Part B Cybern
  doi: 10.1109/TSMCB.2010.2091271
– volume: 26
  start-page: 189
  year: 2011
  end-page: 205
  ident: CR3
  article-title: An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving Takagi—Sugeno fuzzy systems
  publication-title: Int J Intell Syst
  doi: 10.1002/int.20462
– volume: 2018
  start-page: 6853696
  year: 2018
  ident: CR31
  article-title: Perceptual hashing-based image copy-move forgery detection
  publication-title: Secur Commun Netw
  doi: 10.1155/2018/6853696
– ident: CR33
– year: 2015
  ident: CR14
  article-title: Digital photo forensics, handbook of digital
  publication-title: Imaging
  doi: 10.1002/9781118798706.hdi044
– volume: 9
  start-page: 62
  year: 1979
  end-page: 66
  ident: CR21
  article-title: A threshold selection method from gray-level histograms
  publication-title: IEEE Trans Syst Man Cybern
  doi: 10.1109/TSMC.1979.4310076
– ident: CR29
– year: 2018
  ident: CR17
  article-title: Recent advances in passive digital image security forensics: a brief review
  publication-title: Engineering
  doi: 10.1016/j.eng.2018.02.008
– volume: 8
  start-page: 1355
  year: 2013
  end-page: 1370
  ident: CR26
  article-title: Rotation invariant localization of duplicated image regions based on zernike moments
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2013.2272377
– volume: 75
  start-page: 16881
  year: 2016
  end-page: 16903
  ident: CR30
  article-title: Combining cellular automata and local binary patterns for copy-move forgery detection
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2961-2
– volume: 7
  start-page: 1841
  issue: 6
  year: 2012
  end-page: 1854
  ident: CR7
  article-title: An evaluation of popular copy-move forgery detection approaches
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2012.2218597
– volume: 206
  start-page: 178
  year: 2011
  end-page: 184
  ident: CR11
  article-title: Improved DCT-based detection of copy-move forgery in images
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2010.08.001
– ident: CR27
– volume: 2
  start-page: 30
  year: 2017
  ident: CR20
  article-title: Can people identify original and manipulated photos of real-world scenes?
  publication-title: Cogn Res Princ Implic
  doi: 10.1186/s41235-017-0067-2
– year: 2019
  ident: CR13
  article-title: Cellular automata-based approach for salt-and-pepper noise filtration
  publication-title: J King Saud Univ Comput Inf Sci
  doi: 10.1016/j.jksuci.2018.12.006
– volume: 77
  start-page: 31807
  year: 2018
  end-page: 31833
  ident: CR1
  article-title: Evaluation of copy-move forgery detection: datasets and evaluation metrics
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-6201-4
– volume: 10
  start-page: 2084
  issue: 10
  year: 2015
  end-page: 2094
  ident: CR4
  article-title: Copy-move forgery detection by matching triangles of keypoints
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2015.2445742
– volume: 231
  start-page: 61
  year: 2013
  end-page: 72
  ident: CR8
  article-title: Copy-move forgery detection using multiresolution local binary patterns
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2013.04.023
– year: 2017
  ident: CR10
  article-title: Forgery detection in digital images via discrete wavelet and discrete cosine transforms
  publication-title: Comput Electr Eng
  doi: 10.1016/j.compeleceng.2017.03.013
– volume: 214
  start-page: 33
  year: 2012
  end-page: 43
  ident: CR6
  article-title: A robust detection algorithm for copy-move forgery in digital images
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2011.07.015
– volume: 10
  start-page: 529
  year: 2018
  end-page: 536
  ident: CR23
  article-title: Cellular automata-based efficient method for the removal of high-density impulsive noise from digital images
  publication-title: Int J Inf Technol
  doi: 10.1007/s41870-018-0166-4
– volume: 6
  start-page: 1099
  year: 2011
  end-page: 1110
  ident: CR2
  article-title: A SIFT-based forensic method for copy—move attack detection and transformation recovery
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2011.2129512
– year: 2003
  ident: CR9
  article-title: Detection of copy-move forgery in digital images
  publication-title: Int J Comput Sci Issues
  doi: 10.1109/PACIIA.2008.240
– ident: CR32
– ident: CR34
– volume: 33
  start-page: 332
  year: 2003
  end-page: 339
  ident: CR5
  article-title: Identification of the neighborhood and CA rules from spatio-temporal CA patterns
  publication-title: IEEE Trans Syst Man Cybern Part B Cybern
  doi: 10.1109/TSMCB.2003.810438
– ident: CR36
– volume: 11
  start-page: 353
  year: 2018
  end-page: 370
  ident: CR12
  article-title: Cellular automata-based approach for digital image scrambling
  publication-title: Int J Intell Comput Cybern
  doi: 10.1108/IJICC-10-2017-0132
– year: 2010
  ident: CR25
  article-title: Image processing using 3-state cellular automata
  publication-title: Comput Vis Image Underst
  doi: 10.1016/j.cviu.2010.02.005
– volume: 5
  start-page: 36
  year: 2013
  end-page: 41
  ident: CR24
  article-title: Digital image scrambling based on two dimensional cellular automata
  publication-title: Int J Comput Netw Inf Secur
  doi: 10.5815/ijcnis.2013.02.05
– volume: 4
  start-page: 46
  year: 2013
  end-page: 56
  ident: CR16
  article-title: An efficient scheme for detecting copy-move forged images by local binary patterns
  publication-title: J Inf Hiding Multimed Signal Process
– volume: 71
  start-page: 16
  year: 2016
  end-page: 22
  ident: CR19
  article-title: Dominant rotated local binary patterns (DRLBP) for texture classification
  publication-title: Pattern Recognit Lett
  doi: 10.1016/j.patrec.2015.11.019
– ident: 9309_CR27
  doi: 10.1145/2905055.2905134
– volume: 77
  start-page: 31807
  year: 2018
  ident: 9309_CR1
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-6201-4
– volume: 321
  start-page: 250
  year: 2015
  ident: 9309_CR15
  publication-title: Inf Sci (NY)
  doi: 10.1016/j.ins.2015.03.009
– volume: 10
  start-page: 529
  year: 2018
  ident: 9309_CR23
  publication-title: Int J Inf Technol
  doi: 10.1007/s41870-018-0166-4
– ident: 9309_CR36
  doi: 10.1109/CISDA.2007.368145
– volume: 6
  start-page: 1099
  year: 2011
  ident: 9309_CR2
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2011.2129512
– volume: 26
  start-page: 189
  year: 2011
  ident: 9309_CR3
  publication-title: Int J Intell Syst
  doi: 10.1002/int.20462
– year: 2018
  ident: 9309_CR17
  publication-title: Engineering
  doi: 10.1016/j.eng.2018.02.008
– year: 2015
  ident: 9309_CR14
  publication-title: Imaging
  doi: 10.1002/9781118798706.hdi044
– volume: 214
  start-page: 33
  year: 2012
  ident: 9309_CR6
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2011.07.015
– volume: 2018
  start-page: 6853696
  year: 2018
  ident: 9309_CR31
  publication-title: Secur Commun Netw
  doi: 10.1155/2018/6853696
– volume: 71
  start-page: 16
  year: 2016
  ident: 9309_CR19
  publication-title: Pattern Recognit Lett
  doi: 10.1016/j.patrec.2015.11.019
– volume: 53
  start-page: 202
  year: 2018
  ident: 9309_CR18
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2018.03.015
– ident: 9309_CR29
– volume: 4
  start-page: 46
  year: 2013
  ident: 9309_CR16
  publication-title: J Inf Hiding Multimed Signal Process
– volume: 9
  start-page: 62
  year: 1979
  ident: 9309_CR21
  publication-title: IEEE Trans Syst Man Cybern
  doi: 10.1109/TSMC.1979.4310076
– ident: 9309_CR33
– ident: 9309_CR34
  doi: 10.1109/MINES.2010.189
– volume: 7
  start-page: 1841
  issue: 6
  year: 2012
  ident: 9309_CR7
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2012.2218597
– ident: 9309_CR32
  doi: 10.1109/ICIP.2016.7532339
– volume: 11
  start-page: 353
  year: 2018
  ident: 9309_CR12
  publication-title: Int J Intell Comput Cybern
  doi: 10.1108/IJICC-10-2017-0132
– year: 2003
  ident: 9309_CR9
  publication-title: Int J Comput Sci Issues
  doi: 10.1109/PACIIA.2008.240
– volume: 206
  start-page: 178
  year: 2011
  ident: 9309_CR11
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2010.08.001
– year: 2010
  ident: 9309_CR25
  publication-title: Comput Vis Image Underst
  doi: 10.1016/j.cviu.2010.02.005
– year: 2011
  ident: 9309_CR28
  publication-title: IEEE Trans Syst Man Cybern Part B Cybern
  doi: 10.1109/TSMCB.2010.2091271
– volume: 10
  start-page: 2084
  issue: 10
  year: 2015
  ident: 9309_CR4
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2015.2445742
– volume: 5
  start-page: 36
  year: 2013
  ident: 9309_CR24
  publication-title: Int J Comput Netw Inf Secur
  doi: 10.5815/ijcnis.2013.02.05
– volume: 8
  start-page: 1355
  year: 2013
  ident: 9309_CR26
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2013.2272377
– volume: 233
  start-page: 158
  year: 2013
  ident: 9309_CR35
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2013.09.013
– year: 2019
  ident: 9309_CR13
  publication-title: J King Saud Univ Comput Inf Sci
  doi: 10.1016/j.jksuci.2018.12.006
– volume: 2
  start-page: 30
  year: 2017
  ident: 9309_CR20
  publication-title: Cogn Res Princ Implic
  doi: 10.1186/s41235-017-0067-2
– volume: 463–464
  start-page: 33
  year: 2018
  ident: 9309_CR22
  publication-title: Inf Sci (NY)
  doi: 10.1016/j.ins.2018.06.040
– volume: 33
  start-page: 332
  year: 2003
  ident: 9309_CR5
  publication-title: IEEE Trans Syst Man Cybern Part B Cybern
  doi: 10.1109/TSMCB.2003.810438
– volume: 75
  start-page: 16881
  year: 2016
  ident: 9309_CR30
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2961-2
– volume: 231
  start-page: 61
  year: 2013
  ident: 9309_CR8
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2013.04.023
– year: 2017
  ident: 9309_CR10
  publication-title: Comput Electr Eng
  doi: 10.1016/j.compeleceng.2017.03.013
SSID ssj0002140047
ssib031263332
Score 2.262242
Snippet Copy-Move Forgery Detection (CMFD) methods aim to forensically analyze a digital image for a possible content duplication manipulation. In the past, many...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 503
SubjectTerms Artificial Intelligence
Complex Systems
Complexity
Engineering
Original Paper
Title A novel method for digital image copy-move forgery detection and localization using evolving cellular automata and local binary patterns
URI https://link.springer.com/article/10.1007/s12530-019-09309-1
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1868-6486
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002140047
  issn: 1868-6478
  databaseCode: AFBBN
  dateStart: 20100801
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1868-6486
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002140047
  issn: 1868-6478
  databaseCode: AGYKE
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1868-6486
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002140047
  issn: 1868-6478
  databaseCode: U2A
  dateStart: 20100801
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEN4oXPTg24gPMgdvWkO3L3oEIxJNOEmCp2ZfJUQpRIqJ_gJ_tjNLK2KMiefONu3udB6db75h7FyT2_Cl78RRyh0_jX1HxMYlJkwe8tTQoBpCW_TCbt-_GwSDoilsVqLdy5KktdTLZjeOCzH1JYgP1QUw56lavq0Kq7ZuH-9vSj3yXB56JS0XWWTukqbaOSvNsOlQe2XRP_P7jVd91GqB1Pqdzjbrl0-8gJs8Xc1zeaXef5A5_veVdthWEYhCa6E5u2zNZHts8xs94T77aEE2eTXPsBgzDRjfgh4NacwIjMZoiEBNpm_OGGXoGrVXgza5BXdlIDIN1lMWnZ5AEPshGLSH9BMDqGRAGFgQ83yCcbNYrgBpu4Rhask_s9kB63duHq67TjG5wVE8dnNHi4artW88KQJhMALFoDRK3VhFKmwqriXmxcIXNLwy4h76UO7pZhCrsGGEDHEvDlklm2TmiAGmjxGepx-kVIZOpQxlFGBaRbz0qmHiGnPLs0pUQWtO0zWekyUhM-1ygruc2F1O3Bq7-FozXZB6_Cl9WZ5eUnzgsz_Ej_8nfsI2OMFk7I-dU1bJX-bmDOOcXNZRrTvtdq9eqHedrfd56xPnyvKv
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kHtSD-MT6nIM3DTSb97GIUrX21EJvYV8phTYpNhX8B_5sZ7aJtSAFz5nNYWd3HjvffMPYrSa34UvfSaKMO36W-I5IjEtMmDzkmaFBNYS26IWdgf8yDIZVU9i8RrvXJUlrqVfNbhwXYupLEB-qC2DOs00EVsSYP-Dt-hR5Lg-9mpSL7DF36ZzaKStxGDvUXFl1z_z923UPtV4etV7n6YDtV-EitJf6PWRbJj9ie79IBI_ZVxvy4sNMYDkMGjAKBT0e0TAQGE_RXIAqZp_OFGXoGzVBgzalhWDlIHIN1p9V_ZhAQPgRGLRa9NQA9LBPSFUQi7LA6FasVoC0vbwwsxSd-fyEDZ4e-w8dp5qv4CieuKWjRcvV2jeeFIEwGCdi6BhlbqIiFcaKa4nZq_AFjZiMuIeejns6DhIVtoyQIe7WKWvkRW7OGGCSF-G--0FGxeJMylBGASY_xB6vWiZpMrfe01RV5OM0A2OSrmiTSQ8p6iG1ekjdJrv7WTNbUm9slL6vVZVW13C-Qfz8f-I3bKfTf-um3efe6wXb5QRssU8xl6xRvi_MFUYmpby2B_EbwmjWNg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kguhBfGJ9zsGbhjabTdIci1p8UTxY6C3sZjel0KbBpoL_wJ_tzDaxLUjBc2b3sDPZmdmZ7xvGrjW5DaGEE4Upd0QaCUdGxiUmTB7w1NCgGuq26AaPPfHc9_tLKH7b7V6VJOeYBmJpyopGrtPGAvjGcRNMg6ndh2oEmP9sCiJKQIvu8XZlUZ7LA68i6KK7mbtks3biSitoOQS0LJE0f2-76q1WS6XWA3X22G4ZOkJ7rut9tmGyA7azRCh4yL7bkE0-zQjmg6EBI1LQwwENBoHhGK8OSCb5lzNGGfpGgGjQprDtWBnITIP1bSU2E6gpfgAGbzB6dgB65KeuVZCzYoKRrlysAGVxvZBbus5sesR6nYf3u0ennLXgJDxyC0fLpqu1MJ6SvjQYM2IYGaZulIRJ0Eq4VpjJSiFp3GTIPfR63NMtP0qCppEqwNM6ZrVskpkTBpjwhXjuwk-pcJwqFajQx0SImOSTponqzK3ONE5KInKahzGKFxTKpIcY9RBbPcRund38rsnnNBxrpW8rVcXlLzldI376P_ErtvV234lfn7ovZ2ybU4-LfZU5Z7XiY2YuMEgp1KW1wx9lnNpy
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+method+for+digital+image+copy-move+forgery+detection+and+localization+using+evolving+cellular+automata+and+local+binary+patterns&rft.jtitle=Evolving+systems&rft.au=Gani%2C+Gulnawaz&rft.au=Qadir%2C+Fasel&rft.date=2021-06-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=1868-6478&rft.eissn=1868-6486&rft.volume=12&rft.issue=2&rft.spage=503&rft.epage=517&rft_id=info:doi/10.1007%2Fs12530-019-09309-1&rft.externalDocID=10_1007_s12530_019_09309_1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1868-6478&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1868-6478&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1868-6478&client=summon