A novel method for digital image copy-move forgery detection and localization using evolving cellular automata and local binary patterns
Copy-Move Forgery Detection (CMFD) methods aim to forensically analyze a digital image for a possible content duplication manipulation. In the past, many block-based algorithms have been proposed for detection and localization of CMF. However, the existing solutions show limited efficacy for images...
Saved in:
| Published in | Evolving systems Vol. 12; no. 2; pp. 503 - 517 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.06.2021
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1868-6478 1868-6486 |
| DOI | 10.1007/s12530-019-09309-1 |
Cover
| Abstract | Copy-Move Forgery Detection (CMFD) methods aim to forensically analyze a digital image for a possible content duplication manipulation. In the past, many block-based algorithms have been proposed for detection and localization of CMF. However, the existing solutions show limited efficacy for images compressed in JPEG and lack robustness against post-processing attacks such as noise addition, blurring, etc. To address this problem, we propose a new block-based passive method for detection and localization of CMF in this paper. Passive methods, as opposed to active methods, are used to authenticate the image content in the absence of any pre-embedded information such as watermarks. In our proposed scheme, a suspicious input image to be analyzed is first low pass filtered and converted to Local Binary Patterns (LBP) image. The LBP texture image is then divided into overlapping blocks. Next, a compact five-dimensional feature vector is extracted from each block by employing thresholding and Cellular Automata. The set of feature vectors is sorted lexicographically to bring the copy-pasted blocks nearer to each other. Finally, the feature matching step is used to reveal the duplicate blocks. Our experimental results indicate that the proposed method performs exceptionally well relative to other state-of-art-methods, under different image manipulation scenarios. |
|---|---|
| AbstractList | Copy-Move Forgery Detection (CMFD) methods aim to forensically analyze a digital image for a possible content duplication manipulation. In the past, many block-based algorithms have been proposed for detection and localization of CMF. However, the existing solutions show limited efficacy for images compressed in JPEG and lack robustness against post-processing attacks such as noise addition, blurring, etc. To address this problem, we propose a new block-based passive method for detection and localization of CMF in this paper. Passive methods, as opposed to active methods, are used to authenticate the image content in the absence of any pre-embedded information such as watermarks. In our proposed scheme, a suspicious input image to be analyzed is first low pass filtered and converted to Local Binary Patterns (LBP) image. The LBP texture image is then divided into overlapping blocks. Next, a compact five-dimensional feature vector is extracted from each block by employing thresholding and Cellular Automata. The set of feature vectors is sorted lexicographically to bring the copy-pasted blocks nearer to each other. Finally, the feature matching step is used to reveal the duplicate blocks. Our experimental results indicate that the proposed method performs exceptionally well relative to other state-of-art-methods, under different image manipulation scenarios. |
| Author | Qadir, Fasel Gani, Gulnawaz |
| Author_xml | – sequence: 1 givenname: Gulnawaz surname: Gani fullname: Gani, Gulnawaz organization: Department of Computer Science, University of Kashmir – sequence: 2 givenname: Fasel orcidid: 0000-0003-2294-0338 surname: Qadir fullname: Qadir, Fasel email: fasel.scholars@gmail.com organization: Department of Computer Science, University of Kashmir |
| BookMark | eNp9kM1KAzEQgIMoWLUv4CkvsDpJttnkKOIfFLzoeZkmaV1Jk5KkhfoEPrapFQUPPc0wM98w852R4xCDI-SSwRUD6K4z4xMBDTDdgBagG3ZERkxJ1chWyePfvFOnZJzzOwBw1gK03Yh83tAQN87TpStv0dJ5TNQOi6Ggp8MSF46auNo2yzqz6y1c2lLrijNliIFisNRHg374wO_COg9hQd0m-s0uMc77tcdEcV3iEgv-EXQ2BKzLVliKSyFfkJM5-uzGP_GcvN7fvdw-NtPnh6fbm2ljuGalsQjM2taJGU7QaSaBQzdn2nRGKsPtTCiBLUqtdMeFkJwLqybaSHA4k1XPOVH7vSbFnJOb96Y-uzu-JBx8z6DfSe33Uvsqtf-W2rOK8n_oKlVHaXsYEnso1-FQ_fXvcZ1CffEQ9QVk_Y7A |
| CitedBy_id | crossref_primary_10_1007_s11042_021_11503_w crossref_primary_10_1016_j_jvcir_2022_103658 crossref_primary_10_1117_1_JEI_33_4_043004 crossref_primary_10_1016_j_jisa_2020_102510 crossref_primary_10_1007_s13042_024_02370_6 crossref_primary_10_1007_s11760_023_02484_4 crossref_primary_10_1007_s11277_023_10216_7 crossref_primary_10_1007_s11042_021_11174_7 crossref_primary_10_1007_s11227_023_05042_4 |
| Cites_doi | 10.1016/j.jvcir.2018.03.015 10.1016/j.forsciint.2013.09.013 10.1016/j.ins.2015.03.009 10.1016/j.ins.2018.06.040 10.1109/TSMCB.2010.2091271 10.1002/int.20462 10.1155/2018/6853696 10.1002/9781118798706.hdi044 10.1109/TSMC.1979.4310076 10.1016/j.eng.2018.02.008 10.1109/TIFS.2013.2272377 10.1007/s11042-015-2961-2 10.1109/TIFS.2012.2218597 10.1016/j.forsciint.2010.08.001 10.1186/s41235-017-0067-2 10.1016/j.jksuci.2018.12.006 10.1007/s11042-018-6201-4 10.1109/TIFS.2015.2445742 10.1016/j.forsciint.2013.04.023 10.1016/j.compeleceng.2017.03.013 10.1016/j.forsciint.2011.07.015 10.1007/s41870-018-0166-4 10.1109/TIFS.2011.2129512 10.1109/PACIIA.2008.240 10.1109/TSMCB.2003.810438 10.1108/IJICC-10-2017-0132 10.1016/j.cviu.2010.02.005 10.5815/ijcnis.2013.02.05 10.1016/j.patrec.2015.11.019 10.1145/2905055.2905134 10.1109/CISDA.2007.368145 10.1109/MINES.2010.189 10.1109/ICIP.2016.7532339 |
| ContentType | Journal Article |
| Copyright | Springer-Verlag GmbH Germany, part of Springer Nature 2019 |
| Copyright_xml | – notice: Springer-Verlag GmbH Germany, part of Springer Nature 2019 |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s12530-019-09309-1 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1868-6486 |
| EndPage | 517 |
| ExternalDocumentID | 10_1007_s12530_019_09309_1 |
| GroupedDBID | -EM 06D 0R~ 0VY 1N0 203 29~ 2JY 2VQ 30V 4.4 406 408 409 40D 96X AAAVM AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATLR AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH AAZMS ABAKF ABBXA ABDZT ABECU ABFTV ABHQN ABJNI ABJOX ABKCH ABMQK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACDTI ACGFS ACHSB ACKNC ACMLO ACOKC ACPIV ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AESKC AETCA AEVLU AEXYK AFBBN AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKLTO ALFXC ALMA_UNASSIGNED_HOLDINGS AMKLP AMXSW AMYLF AMYQR ANMIH ARAPS AUKKA AXYYD AYJHY BENPR BGLVJ BGNMA CCPQU CSCUP DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FYJPI GGCAI GGRSB GJIRD GQ6 GQ7 GQ8 H13 HCIFZ HF~ HG6 HMJXF HQYDN HRMNR HZ~ I0C IKXTQ IWAJR IXD IZIGR J-C J0Z JBSCW JCJTX JZLTJ K7- KOV LLZTM M4Y NPVJJ NQJWS NU0 O9- O93 O9J P9P PT4 QOS R89 R9I RLLFE ROL RSV S1Z S27 S3B SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE T13 TSG U2A UG4 UOJIU UTJUX UZXMN VFIZW W48 WK8 Z45 Z83 Z88 ZMTXR ~A9 AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO |
| ID | FETCH-LOGICAL-c291t-da01dd4e3ba5ae9160207f19c7c68c2db383a4a698972336223d859c60eab6093 |
| IEDL.DBID | AGYKE |
| ISSN | 1868-6478 |
| IngestDate | Thu Apr 24 22:51:43 EDT 2025 Wed Oct 01 01:12:15 EDT 2025 Fri Feb 21 02:48:16 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Local Binary Patterns Copy-Move Forgery Passive method Thresholding Cellular Automata |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c291t-da01dd4e3ba5ae9160207f19c7c68c2db383a4a698972336223d859c60eab6093 |
| ORCID | 0000-0003-2294-0338 |
| PageCount | 15 |
| ParticipantIDs | crossref_citationtrail_10_1007_s12530_019_09309_1 crossref_primary_10_1007_s12530_019_09309_1 springer_journals_10_1007_s12530_019_09309_1 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20210600 2021-06-00 |
| PublicationDateYYYYMMDD | 2021-06-01 |
| PublicationDate_xml | – month: 6 year: 2021 text: 20210600 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg |
| PublicationSubtitle | An Interdisciplinary Journal for Advanced Science and Technology |
| PublicationTitle | Evolving systems |
| PublicationTitleAbbrev | Evolving Systems |
| PublicationYear | 2021 |
| Publisher | Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin Heidelberg |
| References | Rosin (CR25) 2010 Christlein, Riess, Jordan, Riess, Angelopoulou (CR7) 2012; 7 Jeelani, Qadir (CR12) 2018; 11 Wang, Wang (CR31) 2018; 2018 Amerini, Ballan, Member, Caldelli, Bimbo, Serra (CR2) 2011; 6 Mahmood, Mehmood, Shah, Saba (CR18) 2018; 53 Lee, Chang, Chen (CR15) 2015; 321 CR36 CR34 Davarzani, Yaghmaie, Mozaffari, Tapak (CR8) 2013; 231 CR33 Nightingale, Wade, Watson (CR20) 2017; 2 CR32 Angelov, Sadeghi-tehran, Ramezani (CR3) 2011; 26 Sun, Rosin, Martin (CR28) 2011 Lin, Li, Wang, Liew, Cheng, Huang (CR17) 2018 Al-Qershi, Khoo (CR1) 2018; 77 Qadir, Peer, Khan (CR24) 2013; 5 Cao, Gao, Fan, Yang (CR6) 2012; 214 Huang, Lu, Sun, Long (CR11) 2011; 206 Mehta, Egiazarian (CR19) 2016; 71 CR29 Qadir, Shoosha (CR23) 2018; 10 CR27 Zhao, Guo (CR35) 2013; 233 Otsu (CR21) 1979; 9 Krawetz (CR14) 2015 Fridrich, Soukal, Lukáš (CR9) 2003 Tralic, Grgic, Sun, Rosin (CR30) 2016; 75 Hayat, Qazi (CR10) 2017 Ardizzone, Bruno, Mazzola (CR4) 2015; 10 Pun, Chung (CR22) 2018; 463–464 Jeelani, Qadir (CR13) 2019 Billings, Yang (CR5) 2003; 33 Ryu, Kirchner, Lee, Lee (CR26) 2013; 8 Li, Li, Zhu, Chu, Roddick, Pan (CR16) 2013; 4 V Christlein (9309_CR7) 2012; 7 R Davarzani (9309_CR8) 2013; 231 L Li (9309_CR16) 2013; 4 H Wang (9309_CR31) 2018; 2018 D Tralic (9309_CR30) 2016; 75 I Amerini (9309_CR2) 2011; 6 Y Huang (9309_CR11) 2011; 206 9309_CR32 9309_CR33 9309_CR36 9309_CR34 F Qadir (9309_CR23) 2018; 10 F Qadir (9309_CR24) 2013; 5 P Angelov (9309_CR3) 2011; 26 J Fridrich (9309_CR9) 2003 Z Jeelani (9309_CR13) 2019 K Hayat (9309_CR10) 2017 N Otsu (9309_CR21) 1979; 9 SJ Ryu (9309_CR26) 2013; 8 OM Al-Qershi (9309_CR1) 2018; 77 X Lin (9309_CR17) 2018 J Zhao (9309_CR35) 2013; 233 Y Cao (9309_CR6) 2012; 214 R Mehta (9309_CR19) 2016; 71 SJ Nightingale (9309_CR20) 2017; 2 CM Pun (9309_CR22) 2018; 463–464 E Ardizzone (9309_CR4) 2015; 10 SA Billings (9309_CR5) 2003; 33 Z Jeelani (9309_CR12) 2018; 11 N Krawetz (9309_CR14) 2015 X Sun (9309_CR28) 2011 JC Lee (9309_CR15) 2015; 321 T Mahmood (9309_CR18) 2018; 53 9309_CR29 9309_CR27 PL Rosin (9309_CR25) 2010 |
| References_xml | – volume: 53 start-page: 202 year: 2018 end-page: 214 ident: CR18 article-title: A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2018.03.015 – volume: 233 start-page: 158 year: 2013 end-page: 166 ident: CR35 article-title: Passive forensics for copy-move image forgery using a method based on DCT and SVD publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2013.09.013 – volume: 321 start-page: 250 year: 2015 end-page: 262 ident: CR15 article-title: Detection of copy-move image forgery using histogram of orientated gradients publication-title: Inf Sci (NY) doi: 10.1016/j.ins.2015.03.009 – volume: 463–464 start-page: 33 year: 2018 end-page: 55 ident: CR22 article-title: A two-stage localization for copy-move forgery detection publication-title: Inf Sci (NY) doi: 10.1016/j.ins.2018.06.040 – year: 2011 ident: CR28 article-title: Fast rule identification and neighborhood selection for cellular automata publication-title: IEEE Trans Syst Man Cybern Part B Cybern doi: 10.1109/TSMCB.2010.2091271 – volume: 26 start-page: 189 year: 2011 end-page: 205 ident: CR3 article-title: An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving Takagi—Sugeno fuzzy systems publication-title: Int J Intell Syst doi: 10.1002/int.20462 – volume: 2018 start-page: 6853696 year: 2018 ident: CR31 article-title: Perceptual hashing-based image copy-move forgery detection publication-title: Secur Commun Netw doi: 10.1155/2018/6853696 – ident: CR33 – year: 2015 ident: CR14 article-title: Digital photo forensics, handbook of digital publication-title: Imaging doi: 10.1002/9781118798706.hdi044 – volume: 9 start-page: 62 year: 1979 end-page: 66 ident: CR21 article-title: A threshold selection method from gray-level histograms publication-title: IEEE Trans Syst Man Cybern doi: 10.1109/TSMC.1979.4310076 – ident: CR29 – year: 2018 ident: CR17 article-title: Recent advances in passive digital image security forensics: a brief review publication-title: Engineering doi: 10.1016/j.eng.2018.02.008 – volume: 8 start-page: 1355 year: 2013 end-page: 1370 ident: CR26 article-title: Rotation invariant localization of duplicated image regions based on zernike moments publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2013.2272377 – volume: 75 start-page: 16881 year: 2016 end-page: 16903 ident: CR30 article-title: Combining cellular automata and local binary patterns for copy-move forgery detection publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2961-2 – volume: 7 start-page: 1841 issue: 6 year: 2012 end-page: 1854 ident: CR7 article-title: An evaluation of popular copy-move forgery detection approaches publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2012.2218597 – volume: 206 start-page: 178 year: 2011 end-page: 184 ident: CR11 article-title: Improved DCT-based detection of copy-move forgery in images publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2010.08.001 – ident: CR27 – volume: 2 start-page: 30 year: 2017 ident: CR20 article-title: Can people identify original and manipulated photos of real-world scenes? publication-title: Cogn Res Princ Implic doi: 10.1186/s41235-017-0067-2 – year: 2019 ident: CR13 article-title: Cellular automata-based approach for salt-and-pepper noise filtration publication-title: J King Saud Univ Comput Inf Sci doi: 10.1016/j.jksuci.2018.12.006 – volume: 77 start-page: 31807 year: 2018 end-page: 31833 ident: CR1 article-title: Evaluation of copy-move forgery detection: datasets and evaluation metrics publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-6201-4 – volume: 10 start-page: 2084 issue: 10 year: 2015 end-page: 2094 ident: CR4 article-title: Copy-move forgery detection by matching triangles of keypoints publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2015.2445742 – volume: 231 start-page: 61 year: 2013 end-page: 72 ident: CR8 article-title: Copy-move forgery detection using multiresolution local binary patterns publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2013.04.023 – year: 2017 ident: CR10 article-title: Forgery detection in digital images via discrete wavelet and discrete cosine transforms publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2017.03.013 – volume: 214 start-page: 33 year: 2012 end-page: 43 ident: CR6 article-title: A robust detection algorithm for copy-move forgery in digital images publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2011.07.015 – volume: 10 start-page: 529 year: 2018 end-page: 536 ident: CR23 article-title: Cellular automata-based efficient method for the removal of high-density impulsive noise from digital images publication-title: Int J Inf Technol doi: 10.1007/s41870-018-0166-4 – volume: 6 start-page: 1099 year: 2011 end-page: 1110 ident: CR2 article-title: A SIFT-based forensic method for copy—move attack detection and transformation recovery publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2011.2129512 – year: 2003 ident: CR9 article-title: Detection of copy-move forgery in digital images publication-title: Int J Comput Sci Issues doi: 10.1109/PACIIA.2008.240 – ident: CR32 – ident: CR34 – volume: 33 start-page: 332 year: 2003 end-page: 339 ident: CR5 article-title: Identification of the neighborhood and CA rules from spatio-temporal CA patterns publication-title: IEEE Trans Syst Man Cybern Part B Cybern doi: 10.1109/TSMCB.2003.810438 – ident: CR36 – volume: 11 start-page: 353 year: 2018 end-page: 370 ident: CR12 article-title: Cellular automata-based approach for digital image scrambling publication-title: Int J Intell Comput Cybern doi: 10.1108/IJICC-10-2017-0132 – year: 2010 ident: CR25 article-title: Image processing using 3-state cellular automata publication-title: Comput Vis Image Underst doi: 10.1016/j.cviu.2010.02.005 – volume: 5 start-page: 36 year: 2013 end-page: 41 ident: CR24 article-title: Digital image scrambling based on two dimensional cellular automata publication-title: Int J Comput Netw Inf Secur doi: 10.5815/ijcnis.2013.02.05 – volume: 4 start-page: 46 year: 2013 end-page: 56 ident: CR16 article-title: An efficient scheme for detecting copy-move forged images by local binary patterns publication-title: J Inf Hiding Multimed Signal Process – volume: 71 start-page: 16 year: 2016 end-page: 22 ident: CR19 article-title: Dominant rotated local binary patterns (DRLBP) for texture classification publication-title: Pattern Recognit Lett doi: 10.1016/j.patrec.2015.11.019 – ident: 9309_CR27 doi: 10.1145/2905055.2905134 – volume: 77 start-page: 31807 year: 2018 ident: 9309_CR1 publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-6201-4 – volume: 321 start-page: 250 year: 2015 ident: 9309_CR15 publication-title: Inf Sci (NY) doi: 10.1016/j.ins.2015.03.009 – volume: 10 start-page: 529 year: 2018 ident: 9309_CR23 publication-title: Int J Inf Technol doi: 10.1007/s41870-018-0166-4 – ident: 9309_CR36 doi: 10.1109/CISDA.2007.368145 – volume: 6 start-page: 1099 year: 2011 ident: 9309_CR2 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2011.2129512 – volume: 26 start-page: 189 year: 2011 ident: 9309_CR3 publication-title: Int J Intell Syst doi: 10.1002/int.20462 – year: 2018 ident: 9309_CR17 publication-title: Engineering doi: 10.1016/j.eng.2018.02.008 – year: 2015 ident: 9309_CR14 publication-title: Imaging doi: 10.1002/9781118798706.hdi044 – volume: 214 start-page: 33 year: 2012 ident: 9309_CR6 publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2011.07.015 – volume: 2018 start-page: 6853696 year: 2018 ident: 9309_CR31 publication-title: Secur Commun Netw doi: 10.1155/2018/6853696 – volume: 71 start-page: 16 year: 2016 ident: 9309_CR19 publication-title: Pattern Recognit Lett doi: 10.1016/j.patrec.2015.11.019 – volume: 53 start-page: 202 year: 2018 ident: 9309_CR18 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2018.03.015 – ident: 9309_CR29 – volume: 4 start-page: 46 year: 2013 ident: 9309_CR16 publication-title: J Inf Hiding Multimed Signal Process – volume: 9 start-page: 62 year: 1979 ident: 9309_CR21 publication-title: IEEE Trans Syst Man Cybern doi: 10.1109/TSMC.1979.4310076 – ident: 9309_CR33 – ident: 9309_CR34 doi: 10.1109/MINES.2010.189 – volume: 7 start-page: 1841 issue: 6 year: 2012 ident: 9309_CR7 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2012.2218597 – ident: 9309_CR32 doi: 10.1109/ICIP.2016.7532339 – volume: 11 start-page: 353 year: 2018 ident: 9309_CR12 publication-title: Int J Intell Comput Cybern doi: 10.1108/IJICC-10-2017-0132 – year: 2003 ident: 9309_CR9 publication-title: Int J Comput Sci Issues doi: 10.1109/PACIIA.2008.240 – volume: 206 start-page: 178 year: 2011 ident: 9309_CR11 publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2010.08.001 – year: 2010 ident: 9309_CR25 publication-title: Comput Vis Image Underst doi: 10.1016/j.cviu.2010.02.005 – year: 2011 ident: 9309_CR28 publication-title: IEEE Trans Syst Man Cybern Part B Cybern doi: 10.1109/TSMCB.2010.2091271 – volume: 10 start-page: 2084 issue: 10 year: 2015 ident: 9309_CR4 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2015.2445742 – volume: 5 start-page: 36 year: 2013 ident: 9309_CR24 publication-title: Int J Comput Netw Inf Secur doi: 10.5815/ijcnis.2013.02.05 – volume: 8 start-page: 1355 year: 2013 ident: 9309_CR26 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2013.2272377 – volume: 233 start-page: 158 year: 2013 ident: 9309_CR35 publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2013.09.013 – year: 2019 ident: 9309_CR13 publication-title: J King Saud Univ Comput Inf Sci doi: 10.1016/j.jksuci.2018.12.006 – volume: 2 start-page: 30 year: 2017 ident: 9309_CR20 publication-title: Cogn Res Princ Implic doi: 10.1186/s41235-017-0067-2 – volume: 463–464 start-page: 33 year: 2018 ident: 9309_CR22 publication-title: Inf Sci (NY) doi: 10.1016/j.ins.2018.06.040 – volume: 33 start-page: 332 year: 2003 ident: 9309_CR5 publication-title: IEEE Trans Syst Man Cybern Part B Cybern doi: 10.1109/TSMCB.2003.810438 – volume: 75 start-page: 16881 year: 2016 ident: 9309_CR30 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2961-2 – volume: 231 start-page: 61 year: 2013 ident: 9309_CR8 publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2013.04.023 – year: 2017 ident: 9309_CR10 publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2017.03.013 |
| SSID | ssj0002140047 ssib031263332 |
| Score | 2.262242 |
| Snippet | Copy-Move Forgery Detection (CMFD) methods aim to forensically analyze a digital image for a possible content duplication manipulation. In the past, many... |
| SourceID | crossref springer |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 503 |
| SubjectTerms | Artificial Intelligence Complex Systems Complexity Engineering Original Paper |
| Title | A novel method for digital image copy-move forgery detection and localization using evolving cellular automata and local binary patterns |
| URI | https://link.springer.com/article/10.1007/s12530-019-09309-1 |
| Volume | 12 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1868-6486 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002140047 issn: 1868-6478 databaseCode: AFBBN dateStart: 20100801 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1868-6486 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002140047 issn: 1868-6478 databaseCode: AGYKE dateStart: 20100101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1868-6486 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002140047 issn: 1868-6478 databaseCode: U2A dateStart: 20100801 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEN4oXPTg24gPMgdvWkO3L3oEIxJNOEmCp2ZfJUQpRIqJ_gJ_tjNLK2KMiefONu3udB6db75h7FyT2_Cl78RRyh0_jX1HxMYlJkwe8tTQoBpCW_TCbt-_GwSDoilsVqLdy5KktdTLZjeOCzH1JYgP1QUw56lavq0Kq7ZuH-9vSj3yXB56JS0XWWTukqbaOSvNsOlQe2XRP_P7jVd91GqB1Pqdzjbrl0-8gJs8Xc1zeaXef5A5_veVdthWEYhCa6E5u2zNZHts8xs94T77aEE2eTXPsBgzDRjfgh4NacwIjMZoiEBNpm_OGGXoGrVXgza5BXdlIDIN1lMWnZ5AEPshGLSH9BMDqGRAGFgQ83yCcbNYrgBpu4Rhask_s9kB63duHq67TjG5wVE8dnNHi4artW88KQJhMALFoDRK3VhFKmwqriXmxcIXNLwy4h76UO7pZhCrsGGEDHEvDlklm2TmiAGmjxGepx-kVIZOpQxlFGBaRbz0qmHiGnPLs0pUQWtO0zWekyUhM-1ygruc2F1O3Bq7-FozXZB6_Cl9WZ5eUnzgsz_Ej_8nfsI2OMFk7I-dU1bJX-bmDOOcXNZRrTvtdq9eqHedrfd56xPnyvKv |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kHtSD-MT6nIM3DTSb97GIUrX21EJvYV8phTYpNhX8B_5sZ7aJtSAFz5nNYWd3HjvffMPYrSa34UvfSaKMO36W-I5IjEtMmDzkmaFBNYS26IWdgf8yDIZVU9i8RrvXJUlrqVfNbhwXYupLEB-qC2DOs00EVsSYP-Dt-hR5Lg-9mpSL7DF36ZzaKStxGDvUXFl1z_z923UPtV4etV7n6YDtV-EitJf6PWRbJj9ie79IBI_ZVxvy4sNMYDkMGjAKBT0e0TAQGE_RXIAqZp_OFGXoGzVBgzalhWDlIHIN1p9V_ZhAQPgRGLRa9NQA9LBPSFUQi7LA6FasVoC0vbwwsxSd-fyEDZ4e-w8dp5qv4CieuKWjRcvV2jeeFIEwGCdi6BhlbqIiFcaKa4nZq_AFjZiMuIeejns6DhIVtoyQIe7WKWvkRW7OGGCSF-G--0FGxeJMylBGASY_xB6vWiZpMrfe01RV5OM0A2OSrmiTSQ8p6iG1ekjdJrv7WTNbUm9slL6vVZVW13C-Qfz8f-I3bKfTf-um3efe6wXb5QRssU8xl6xRvi_MFUYmpby2B_EbwmjWNg |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kguhBfGJ9zsGbhjabTdIci1p8UTxY6C3sZjel0KbBpoL_wJ_tzDaxLUjBc2b3sDPZmdmZ7xvGrjW5DaGEE4Upd0QaCUdGxiUmTB7w1NCgGuq26AaPPfHc9_tLKH7b7V6VJOeYBmJpyopGrtPGAvjGcRNMg6ndh2oEmP9sCiJKQIvu8XZlUZ7LA68i6KK7mbtks3biSitoOQS0LJE0f2-76q1WS6XWA3X22G4ZOkJ7rut9tmGyA7azRCh4yL7bkE0-zQjmg6EBI1LQwwENBoHhGK8OSCb5lzNGGfpGgGjQprDtWBnITIP1bSU2E6gpfgAGbzB6dgB65KeuVZCzYoKRrlysAGVxvZBbus5sesR6nYf3u0ennLXgJDxyC0fLpqu1MJ6SvjQYM2IYGaZulIRJ0Eq4VpjJSiFp3GTIPfR63NMtP0qCppEqwNM6ZrVskpkTBpjwhXjuwk-pcJwqFajQx0SImOSTponqzK3ONE5KInKahzGKFxTKpIcY9RBbPcRund38rsnnNBxrpW8rVcXlLzldI376P_ErtvV234lfn7ovZ2ybU4-LfZU5Z7XiY2YuMEgp1KW1wx9lnNpy |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+method+for+digital+image+copy-move+forgery+detection+and+localization+using+evolving+cellular+automata+and+local+binary+patterns&rft.jtitle=Evolving+systems&rft.au=Gani%2C+Gulnawaz&rft.au=Qadir%2C+Fasel&rft.date=2021-06-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=1868-6478&rft.eissn=1868-6486&rft.volume=12&rft.issue=2&rft.spage=503&rft.epage=517&rft_id=info:doi/10.1007%2Fs12530-019-09309-1&rft.externalDocID=10_1007_s12530_019_09309_1 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1868-6478&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1868-6478&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1868-6478&client=summon |