Image Forgery Detection Using Singular Value Decomposition with Some Attacks

To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform wit...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:National Academy science letters Ročník 44; číslo 4; s. 331 - 338
Hlavní autoři: Rathore, Neeraj Kumar, Jain, Neelesh Kumar, Shukla, Prashant Kumar, Rawat, UmaShankar, Dubey, Rachana
Médium: Journal Article
Jazyk:angličtina
Vydáno: New Delhi Springer India 01.08.2021
Springer Nature B.V
Témata:
ISSN:0250-541X, 2250-1754
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform with Singular Value Decomposition (BWT-SVD)-based feature extraction is applied to find the image forgery. The proposed method begins with dividing the test images into overlapping blocks, and then Biorthogonal Wavelet Transform (BWT) with Singular Value Decomposition (SVD) applies to extract the feature vector from the blocks. After that, the feature vectors are sorts and the duplicate vectors are identified by the similarity between two successive vectors. The occurrences of clone vectors are identified on the basis of Minkowski distance and the threshold value. Then, similarity criteria result in the existence of forgery in images. To classify images into the category of authentic images or forged images, improved version of Relevance Vector Machine (RVM) uses, which leads to efficiency and accuracy of forged image identification process. Performance of proposed scheme tests by performing experiments on CoMoFoD database. The simulation results show that the proposed IRVM scheme attained high performance when compared with existing Copy-Move based image Forgery Detection schemes in MATLAB environment.
AbstractList To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform with Singular Value Decomposition (BWT-SVD)-based feature extraction is applied to find the image forgery. The proposed method begins with dividing the test images into overlapping blocks, and then Biorthogonal Wavelet Transform (BWT) with Singular Value Decomposition (SVD) applies to extract the feature vector from the blocks. After that, the feature vectors are sorts and the duplicate vectors are identified by the similarity between two successive vectors. The occurrences of clone vectors are identified on the basis of Minkowski distance and the threshold value. Then, similarity criteria result in the existence of forgery in images. To classify images into the category of authentic images or forged images, improved version of Relevance Vector Machine (RVM) uses, which leads to efficiency and accuracy of forged image identification process. Performance of proposed scheme tests by performing experiments on CoMoFoD database. The simulation results show that the proposed IRVM scheme attained high performance when compared with existing Copy-Move based image Forgery Detection schemes in MATLAB environment.
Author Rathore, Neeraj Kumar
Shukla, Prashant Kumar
Dubey, Rachana
Jain, Neelesh Kumar
Rawat, UmaShankar
Author_xml – sequence: 1
  givenname: Neeraj Kumar
  surname: Rathore
  fullname: Rathore, Neeraj Kumar
  email: neerajrathore37@gmail.com
  organization: Shri G. S. Institute of Technology and Science
– sequence: 2
  givenname: Neelesh Kumar
  surname: Jain
  fullname: Jain, Neelesh Kumar
  organization: Jaypee University of Engineering and Technology
– sequence: 3
  givenname: Prashant Kumar
  surname: Shukla
  fullname: Shukla, Prashant Kumar
  organization: Department of Computer Science, School of Engineering and Technology, Jagran Lake City University
– sequence: 4
  givenname: UmaShankar
  surname: Rawat
  fullname: Rawat, UmaShankar
  organization: School of Computing and IT, Manipal University Jaipur
– sequence: 5
  givenname: Rachana
  surname: Dubey
  fullname: Dubey, Rachana
  organization: Lakshmi Nariman College of Technology
BookMark eNp9kE9PwyAYh4mZiXPuC3hq4sVLFSj0z3GZTpcs8TBnvBFKYTLbMoFm2beXrSYmO-zCC-H5ve-b5xoMWtNKAG4RfEAQZo-OQAiLGGIYh1rk8e4CDDGmMEYZJQMwhIc7JejzCoyd2wQa0pRShIdgMW_4WkYzY9fS7qMn6aXw2rTRyul2HS3D0dXcRh-87mT4FqbZGqePyE77r2hpGhlNvOfi292AS8VrJ8d_dQRWs-f36Wu8eHuZTyeLWCQU-xiLAiuiSpWWihCuUHjlKk8TrCiiGa-qvCJJhoqqrDjHKUdJnhElMSpFzrFIRuC-77u15qeTzrNGOyHrmrfSdI7hNEWQwCKlAb07QTems23YjmFKioKkCUGBwj0lrHHOSsW2Vjfc7hmC7OCY9Y5ZcMyOjtkuhPKTkNCeH8x4y3V9Ppr0URfmtMH8_1ZnUr9aKpMJ
CitedBy_id crossref_primary_10_1155_2022_4545139
crossref_primary_10_48084_etasr_10151
crossref_primary_10_1155_2022_3242092
crossref_primary_10_1155_2022_1907511
crossref_primary_10_1155_2022_2592365
crossref_primary_10_1155_2023_3923667
crossref_primary_10_1007_s11042_022_14163_6
crossref_primary_10_1155_2022_1684017
crossref_primary_10_1155_2022_8154523
crossref_primary_10_1155_2022_8470496
crossref_primary_10_1155_2022_8794749
crossref_primary_10_1155_2022_2874497
crossref_primary_10_1155_2022_7194419
crossref_primary_10_4218_etrij_2024_0477
crossref_primary_10_1155_2022_9155349
crossref_primary_10_1155_2022_2988262
crossref_primary_10_1108_BPMJ_08_2022_0389
crossref_primary_10_1155_2022_8209256
crossref_primary_10_1007_s11277_023_10277_8
crossref_primary_10_1155_2022_8662254
crossref_primary_10_1016_j_asej_2025_103752
crossref_primary_10_1016_j_sasc_2025_200226
crossref_primary_10_1371_journal_pone_0283725
crossref_primary_10_1155_2022_3767912
crossref_primary_10_1155_2022_9737511
crossref_primary_10_32604_cmc_2023_032315
crossref_primary_10_1155_2022_5346476
crossref_primary_10_32604_cmc_2023_036216
crossref_primary_10_1155_2022_9169568
crossref_primary_10_4108_eetpht_10_5244
crossref_primary_10_1155_2022_9185731
crossref_primary_10_1007_s11042_023_15475_x
crossref_primary_10_1016_j_asoc_2020_106728
crossref_primary_10_1155_2022_3612433
crossref_primary_10_1155_2022_5256133
crossref_primary_10_1155_2022_2206530
crossref_primary_10_1002_cpe_7191
crossref_primary_10_1155_2022_7359210
crossref_primary_10_1155_2022_6574825
crossref_primary_10_1155_2022_1621258
crossref_primary_10_52711_2321_581X_2022_00015
crossref_primary_10_1155_2022_2792639
crossref_primary_10_1007_s11042_024_18980_9
crossref_primary_10_1155_2022_7348488
crossref_primary_10_1007_s11277_023_10343_1
crossref_primary_10_1016_j_rineng_2025_106183
Cites_doi 10.1109/TIFS.2011.2129512
10.1007/s40009-019-00834-w
10.3233/IFS-141243
10.18287/2412-6179-2016-40-2-284-293
10.1016/j.procs.2015.12.160
10.1007/s11277-014-1975-9
10.1007/s11277-018-5758-6
10.1016/j.aeue.2016.05.005
10.1007/s11277-016-3452-0
10.4156/ijact
10.1007/s10845-014-0914-7
10.1007/s11277-018-5802-6
10.5121/acij.2016.7301
10.1007/s00366-014-0364-z
10.1016/j.forsciint.2013.05.027
10.1007/s11277-016-3264-2
10.1109/WICT.2011.6141221
ContentType Journal Article
Copyright The National Academy of Sciences, India 2020
The National Academy of Sciences, India 2020.
Copyright_xml – notice: The National Academy of Sciences, India 2020
– notice: The National Academy of Sciences, India 2020.
DBID AAYXX
CITATION
7S9
L.6
DOI 10.1007/s40009-020-00998-w
DatabaseName CrossRef
AGRICOLA
AGRICOLA - Academic
DatabaseTitle CrossRef
AGRICOLA
AGRICOLA - Academic
DatabaseTitleList

AGRICOLA
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 2250-1754
EndPage 338
ExternalDocumentID 10_1007_s40009_020_00998_w
GroupedDBID -EM
06D
0R~
203
30V
4.4
406
408
96X
AAAVM
AACDK
AAHBH
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAZMS
ABAKF
ABDZT
ABECU
ABFTV
ABJNI
ABJOX
ABKCH
ABMQK
ABQBU
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABXPI
ACAOD
ACCUX
ACDTI
ACGFS
ACHSB
ACIWK
ACKNC
ACMLO
ACOKC
ACPIV
ACPRK
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGNC
AEJHL
AEJRE
AEMSY
AEOHA
AEPYU
AESKC
AETCA
AEVLU
AEXYK
AFLOW
AFQWF
AFRAH
AFWTZ
AFZKB
AGAYW
AGDGC
AGMZJ
AGQEE
AGQMX
AGRTI
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
AKLTO
ALFXC
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMXSW
AMYLF
AMYQR
ANMIH
AUKKA
AXYYD
AYQZM
BGNMA
CSCUP
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FYJPI
GGCAI
GGRSB
GJIRD
GQ6
GQ7
HMJXF
HRMNR
HZ~
I0C
IKXTQ
IWAJR
IXD
J-C
JBSCW
JZLTJ
KOV
LLZTM
M4Y
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9J
PT4
RLLFE
ROL
RSV
SHS
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
TSG
UG4
UOJIU
UTJUX
UZXMN
VFIZW
W48
ZMTXR
~A9
AAYXX
ABBRH
ABDBE
ABRTQ
AFDZB
AFOHR
AHPBZ
ATHPR
AYFIA
CITATION
7S9
L.6
ID FETCH-LOGICAL-c352t-2c92f4fbf6bf44af12f48f8632f5157add8d43719dbdaa26a13874fe21bc8a2c3
IEDL.DBID RSV
ISICitedReferencesCount 50
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000555665800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0250-541X
IngestDate Mon Jul 21 10:11:34 EDT 2025
Thu Sep 25 00:38:48 EDT 2025
Tue Nov 18 21:28:55 EST 2025
Sat Nov 29 03:44:55 EST 2025
Fri Feb 21 02:48:19 EST 2025
IsPeerReviewed false
IsScholarly true
Issue 4
Keywords Minkowski distance
Biorthogonal wavelet transform (BWT)
Copy-move forgery (CMF)
Glowworm swarm optimization (GSO)
Improved relevance vector machine (IRVM)
Similarity measure
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c352t-2c92f4fbf6bf44af12f48f8632f5157add8d43719dbdaa26a13874fe21bc8a2c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
PQID 2549946341
PQPubID 2044000
PageCount 8
ParticipantIDs proquest_miscellaneous_2661040965
proquest_journals_2549946341
crossref_primary_10_1007_s40009_020_00998_w
crossref_citationtrail_10_1007_s40009_020_00998_w
springer_journals_10_1007_s40009_020_00998_w
PublicationCentury 2000
PublicationDate 2021-08-01
PublicationDateYYYYMMDD 2021-08-01
PublicationDate_xml – month: 08
  year: 2021
  text: 2021-08-01
  day: 01
PublicationDecade 2020
PublicationPlace New Delhi
PublicationPlace_xml – name: New Delhi
– name: Dordrecht
PublicationTitle National Academy science letters
PublicationTitleAbbrev Natl. Acad. Sci. Lett
PublicationYear 2021
Publisher Springer India
Springer Nature B.V
Publisher_xml – name: Springer India
– name: Springer Nature B.V
References Kuznetsov, Myasnikov (CR3) 2016; 40
Rathore, Chana (CR34) 2013; 2
Rathore (CR7) 2016; 5
Rathore, Chana (CR32) 2016; 89
Ayumi, Fanany (CR18) 2015; 72
CR17
Al-Qershi, Khoo (CR29) 2013; 231
Huynh-Kha, Le-Tien, Ha-Viet-Uyen, Huynh-Van, Luong (CR22) 2016; 7
CR13
CR11
Ustubioglu, Ulutas, Ulutas, Nabiyev (CR8) 2016; 70
Rathore (CR23) 2018; 101
Sharma, Kumar, Rathore (CR33) 2015; 6
Amerini, Ballan, Caldelli, Del Bimbo, Serra (CR1) 2011; 6
Amerini, Ballan, Caldelli, Del Bimbo, Serra (CR12) 2011; 6
Rathore, Rawat, Kulhari (CR30) 2019
Zainal, Zain, Radzi, Othman (CR20) 2016; 27
Rathore, Chana (CR15) 2015; 31
Kaur, Dadhwal (CR27) 2015; 7
Goyal, Gulati (CR10) 2014; 97
Rathore, Chana (CR2) 2014; 79
Li, Li, Zhu (CR16) 2013; 4
Rathore (CR25) 2015; 3
Ranjani, Poovendran (CR4) 2016; 11
CR24
Puri, Chopra (CR6) 2016; 3
Zhang, Wang (CR14) 2012
Jain, Rathore, Mishra (CR26) 2017; 42
Jain, Rathore, Mishra (CR31) 2018; 101
CR21
Rathore (CR28) 2016; 91
Rathore, Chana (CR9) 2014; 27
Ustubioglu, Ulutas, Ulutas, Nabiyev (CR5) 2016; 70
Rathore (CR19) 2015; 10
V Sharma (998_CR33) 2015; 6
B Ustubioglu (998_CR5) 2016; 70
N Rathore (998_CR15) 2015; 31
L Li (998_CR16) 2013; 4
N Zainal (998_CR20) 2016; 27
T Huynh-Kha (998_CR22) 2016; 7
NK Rathore (998_CR34) 2013; 2
V Ayumi (998_CR18) 2015; 72
NK Rathore (998_CR25) 2015; 3
I Amerini (998_CR1) 2011; 6
998_CR17
N Rathore (998_CR9) 2014; 27
998_CR13
998_CR11
N Jain (998_CR31) 2018; 101
MB Ranjani (998_CR4) 2016; 11
N Rathore (998_CR28) 2016; 91
H Goyal (998_CR10) 2014; 97
OM Al-Qershi (998_CR29) 2013; 231
N Rathore (998_CR2) 2014; 79
N Rathore (998_CR23) 2018; 101
I Amerini (998_CR12) 2011; 6
Savroop Kaur (998_CR27) 2015; 7
N Rathore (998_CR32) 2016; 89
AV Kuznetsov (998_CR3) 2016; 40
N Rathore (998_CR30) 2019
NK Rathore (998_CR19) 2015; 10
998_CR24
N Jain (998_CR26) 2017; 42
NK Rathore (998_CR7) 2016; 5
998_CR21
B Ustubioglu (998_CR8) 2016; 70
M Puri (998_CR6) 2016; 3
G Zhang (998_CR14) 2012
References_xml – volume: 11
  start-page: 2671
  issue: 4
  year: 2016
  end-page: 2674
  ident: CR4
  article-title: Image duplication copy move forgery detection using discrete cosine transforms method
  publication-title: Int J Appl Eng Res
– volume: 6
  start-page: 1099
  issue: 3
  year: 2011
  end-page: 1110
  ident: CR12
  article-title: A sift-based forensic method for copy–move attack detection and transformation recovery
  publication-title: IEEE Trans Forensics Secur
  doi: 10.1109/TIFS.2011.2129512
– year: 2019
  ident: CR30
  article-title: Efficient hybrid load balancing algorithm
  publication-title: Natl Acad Sci Lett
  doi: 10.1007/s40009-019-00834-w
– volume: 6
  start-page: 1099
  issue: 3
  year: 2011
  end-page: 1110
  ident: CR1
  article-title: A SIFT-based forensic method for copy move attack detection and transformation recovery
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2011.2129512
– volume: 6
  start-page: 54
  issue: 3
  year: 2015
  end-page: 72
  ident: CR33
  article-title: Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks
  publication-title: J Wirel Mob Netw Ubiquitous Comput Dependable Appl
– volume: 27
  start-page: 2821
  issue: 6
  year: 2014
  end-page: 2833
  ident: CR9
  article-title: Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing
  publication-title: J Intell Fuzzy Syst
  doi: 10.3233/IFS-141243
– volume: 97
  start-page: 14
  year: 2014
  end-page: 19
  ident: CR10
  article-title: Robust copy-move image forgery detection using SIFT
  publication-title: Int J Comput Sci Appl
– volume: 40
  start-page: 284
  year: 2016
  end-page: 293
  ident: CR3
  article-title: A copy-move detection algorithm based on binary gradient contours
  publication-title: Comput Opt
  doi: 10.18287/2412-6179-2016-40-2-284-293
– volume: 42
  start-page: 95
  issue: 11
  year: 2017
  end-page: 120
  ident: CR26
  article-title: An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks
  publication-title: Interciencia J
– volume: 72
  start-page: 527
  year: 2015
  end-page: 534
  ident: CR18
  article-title: Distribution-sensitive learning on relevance vector machine for pose-based human gesture recognition
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2015.12.160
– volume: 79
  start-page: 2089
  issue: 3
  year: 2014
  end-page: 2125
  ident: CR2
  article-title: Load balancing and job migration techniques in grid: a survey of recent trends
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-014-1975-9
– volume: 2
  start-page: 21
  issue: 4
  year: 2013
  end-page: 35
  ident: CR34
  article-title: Report on hierarchal load balancing technique in grid environment
  publication-title: J Inf Technol
– volume: 3
  start-page: 582
  issue: 9
  year: 2016
  end-page: 586
  ident: CR6
  article-title: A survey: copy-move forgery detection methods
  publication-title: Int J Comput Syst
– ident: CR21
– volume: 101
  start-page: 1233
  issue: 4
  year: 2018
  end-page: 1246
  ident: CR23
  article-title: Performance of hybrid load balancing algorithm in distributed web server system
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-018-5758-6
– volume: 4
  start-page: 46
  year: 2013
  end-page: 56
  ident: CR16
  article-title: An efficient scheme for detecting copy-move forged images by local binary patterns
  publication-title: J Inf Hiding Multimed Signal Process
– volume: 10
  start-page: 21
  issue: 1
  year: 2015
  end-page: 30
  ident: CR19
  article-title: Map reduce architecture for grid
  publication-title: J Softw Eng
– volume: 70
  start-page: 1076
  year: 2016
  end-page: 1087
  ident: CR8
  article-title: A new copy move forgery detection technique with automatic threshold determination
  publication-title: Int J Electron Commun
  doi: 10.1016/j.aeue.2016.05.005
– volume: 91
  start-page: 151
  issue: 1
  year: 2016
  end-page: 185
  ident: CR28
  article-title: Dynamic threshold based load balancing algorithms
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-016-3452-0
– year: 2012
  ident: CR14
  article-title: SURF based detection of copy-move forgery in flat region
  publication-title: Int J Adv Comput Technol
  doi: 10.4156/ijact
– volume: 7
  start-page: 37
  issue: 3
  year: 2015
  ident: CR27
  article-title: Biorthogonal wavelet transform using bilateral filter and adaptive histogram equalization
  publication-title: Int J Intell Syst Appl
– ident: CR17
– ident: CR13
– volume: 5
  start-page: 7
  issue: 1
  year: 2016
  end-page: 11
  ident: CR7
  article-title: Ethical hacking & security against cyber Crime
  publication-title: J Inf Technol
– ident: CR11
– volume: 27
  start-page: 797
  issue: 4
  year: 2016
  end-page: 804
  ident: CR20
  article-title: Glowworm swarm optimization (GSO) for optimization of machining parameters
  publication-title: J Intell Manuf
  doi: 10.1007/s10845-014-0914-7
– volume: 3
  start-page: 11
  issue: 3
  year: 2015
  end-page: 22
  ident: CR25
  article-title: Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing
  publication-title: J Comput Sci
– volume: 101
  start-page: 1983
  issue: 4
  year: 2018
  end-page: 2008
  ident: CR31
  article-title: An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-018-5802-6
– volume: 7
  start-page: 1
  issue: 3
  year: 2016
  end-page: 8
  ident: CR22
  article-title: A robust algorithm of forgery detection in copy-move and spliced images
  publication-title: Int J Adv Comput Sci Appl
  doi: 10.5121/acij.2016.7301
– volume: 31
  start-page: 597
  issue: 3
  year: 2015
  end-page: 615
  ident: CR15
  article-title: Variable threshold-based hierarchical load balancing technique in Grid
  publication-title: Eng Comput
  doi: 10.1007/s00366-014-0364-z
– volume: 231
  start-page: 284
  issue: 1
  year: 2013
  end-page: 295
  ident: CR29
  article-title: Passive detection of copy-move forgery in digital images: state-of-the-art
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2013.05.027
– volume: 70
  start-page: 1076
  issue: 8
  year: 2016
  end-page: 1087
  ident: CR5
  article-title: A new copy move forgery detection technique with automatic threshold determination
  publication-title: Int J Electron Commun
  doi: 10.1016/j.aeue.2016.05.005
– ident: CR24
– volume: 89
  start-page: 241
  issue: 1
  year: 2016
  end-page: 269
  ident: CR32
  article-title: Job migration policies for grid environment
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-016-3264-2
– volume: 11
  start-page: 2671
  issue: 4
  year: 2016
  ident: 998_CR4
  publication-title: Int J Appl Eng Res
– volume: 4
  start-page: 46
  year: 2013
  ident: 998_CR16
  publication-title: J Inf Hiding Multimed Signal Process
– volume: 6
  start-page: 1099
  issue: 3
  year: 2011
  ident: 998_CR1
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2011.2129512
– ident: 998_CR17
– year: 2019
  ident: 998_CR30
  publication-title: Natl Acad Sci Lett
  doi: 10.1007/s40009-019-00834-w
– ident: 998_CR21
– ident: 998_CR11
– volume: 91
  start-page: 151
  issue: 1
  year: 2016
  ident: 998_CR28
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-016-3452-0
– volume: 10
  start-page: 21
  issue: 1
  year: 2015
  ident: 998_CR19
  publication-title: J Softw Eng
– volume: 231
  start-page: 284
  issue: 1
  year: 2013
  ident: 998_CR29
  publication-title: Forensic Sci Int
  doi: 10.1016/j.forsciint.2013.05.027
– volume: 70
  start-page: 1076
  issue: 8
  year: 2016
  ident: 998_CR5
  publication-title: Int J Electron Commun
  doi: 10.1016/j.aeue.2016.05.005
– volume: 7
  start-page: 1
  issue: 3
  year: 2016
  ident: 998_CR22
  publication-title: Int J Adv Comput Sci Appl
  doi: 10.5121/acij.2016.7301
– ident: 998_CR24
– volume: 5
  start-page: 7
  issue: 1
  year: 2016
  ident: 998_CR7
  publication-title: J Inf Technol
– volume: 7
  start-page: 37
  issue: 3
  year: 2015
  ident: 998_CR27
  publication-title: Int J Intell Syst Appl
– volume: 6
  start-page: 1099
  issue: 3
  year: 2011
  ident: 998_CR12
  publication-title: IEEE Trans Forensics Secur
  doi: 10.1109/TIFS.2011.2129512
– volume: 27
  start-page: 797
  issue: 4
  year: 2016
  ident: 998_CR20
  publication-title: J Intell Manuf
  doi: 10.1007/s10845-014-0914-7
– volume: 31
  start-page: 597
  issue: 3
  year: 2015
  ident: 998_CR15
  publication-title: Eng Comput
  doi: 10.1007/s00366-014-0364-z
– volume: 89
  start-page: 241
  issue: 1
  year: 2016
  ident: 998_CR32
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-016-3264-2
– volume: 27
  start-page: 2821
  issue: 6
  year: 2014
  ident: 998_CR9
  publication-title: J Intell Fuzzy Syst
  doi: 10.3233/IFS-141243
– volume: 3
  start-page: 582
  issue: 9
  year: 2016
  ident: 998_CR6
  publication-title: Int J Comput Syst
– volume: 97
  start-page: 14
  year: 2014
  ident: 998_CR10
  publication-title: Int J Comput Sci Appl
– volume: 42
  start-page: 95
  issue: 11
  year: 2017
  ident: 998_CR26
  publication-title: Interciencia J
– volume: 6
  start-page: 54
  issue: 3
  year: 2015
  ident: 998_CR33
  publication-title: J Wirel Mob Netw Ubiquitous Comput Dependable Appl
– volume: 79
  start-page: 2089
  issue: 3
  year: 2014
  ident: 998_CR2
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-014-1975-9
– volume: 72
  start-page: 527
  year: 2015
  ident: 998_CR18
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2015.12.160
– year: 2012
  ident: 998_CR14
  publication-title: Int J Adv Comput Technol
  doi: 10.4156/ijact
– volume: 2
  start-page: 21
  issue: 4
  year: 2013
  ident: 998_CR34
  publication-title: J Inf Technol
– volume: 70
  start-page: 1076
  year: 2016
  ident: 998_CR8
  publication-title: Int J Electron Commun
  doi: 10.1016/j.aeue.2016.05.005
– volume: 101
  start-page: 1233
  issue: 4
  year: 2018
  ident: 998_CR23
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-018-5758-6
– volume: 40
  start-page: 284
  year: 2016
  ident: 998_CR3
  publication-title: Comput Opt
  doi: 10.18287/2412-6179-2016-40-2-284-293
– volume: 101
  start-page: 1983
  issue: 4
  year: 2018
  ident: 998_CR31
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-018-5802-6
– ident: 998_CR13
  doi: 10.1109/WICT.2011.6141221
– volume: 3
  start-page: 11
  issue: 3
  year: 2015
  ident: 998_CR25
  publication-title: J Comput Sci
SSID ssj0000565512
Score 2.459343
Snippet To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 331
SubjectTerms Decomposition
digital images
Digital imaging
exhibitions
extracts
Feature extraction
Forgery
genetic vectors
History of Science
Humanities and Social Sciences
image analysis
Image classification
Image manipulation
Machine learning
multidisciplinary
occurrence
Science
Science (multidisciplinary)
Short Communication
Similarity
Singular value decomposition
sorting
testing
wavelet
Wavelet transforms
Title Image Forgery Detection Using Singular Value Decomposition with Some Attacks
URI https://link.springer.com/article/10.1007/s40009-020-00998-w
https://www.proquest.com/docview/2549946341
https://www.proquest.com/docview/2661040965
Volume 44
WOSCitedRecordID wos000555665800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2250-1754
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000565512
  issn: 0250-541X
  databaseCode: RSV
  dateStart: 20120201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58Hbz4FtcXETwoWjBpNk2Pi7ooiIirsreSpgkI2hW36_59J9m0oqigl0KbNC2TzqMz38wA7GtR4HVjozxJRcRTgzxnlYnitkqoyvPYTrqWXCXX17LfT29CUtiwRrvXIUkvqZtkN37iHfnMZUK7xLDxNMyiupOuYcNt76HxrKBKRzPAhw9Qv0dtTvshW-b7ZT5rpA8z80tk1Cuc7uL_XnUJFoKBSTqTL2IZpky5AsuBhYfkINSZPlyFq8tnFCakO_CJ0eTMVB6WVRIPIyA9PDiMKnlQTyODww59HiBexLlvSW_wbEinqlya_hrcd8_vTi-i0Fwh0mhzVRHTKbPc5lbklnNlKZ5JK0XMLJo4CYo9WfA4oWmRF0oxoWgsE24No7mWiul4HWbKQWk2gLBCCmNT504teH4ilaCK6jhONK6Luq8FtCZwpkPlcdcA4ylraiZ7gmVIsMwTLBu34Ki552VSd-PX2dv1vmWBB4eZ__XlAtV0C_aaYeQeFxJRpRmMcA6aJyjGUtFuwXG9lx9L_PzEzb9N34J55sAwHjm4DTPV68jswJx-qx6Hr7v--30HZg_qoQ
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58gV58i-szggdFCybNpu1R1EVxXcRV2VtJ0wQE7Yrb1b_vJJtWFBX0UmiTpmWSeWTmmwnArhI5PtcmyKJEBDzRyHNG6iBsyojKLAvN6NSSdtTpxL1ecu2TwgYV2r0KSTpJXSe78SPnyGc2E9omhr2NwyRHjWUr5t9072vPCqp0NANc-AD1e9DktOezZb4f5rNG-jAzv0RGncJpzf3vV-dh1huY5Hi0IhZgTBeLsOBZeED2fJ3p_SVoXzyhMCGtvkuMJqe6dLCsgjgYAenixWJUyb18HGpstuhzD_Ei1n1Luv0nTY7L0qbpL8Nd6-z25DzwhysECm2uMmAqYYabzIjMcC4NxbvYxCJkBk2cCMVenPMwokme5VIyIWkYR9xoRjMVS6bCFZgo-oVeBcLyWGiTWHdqzrOjWAoqqQrDSOG4qPsaQCsCp8pXHrcHYDymdc1kR7AUCZY6gqVvDTio33ke1d34tfdGNW-p58FB6ra-XKCabsBO3YzcY0MistD9IfZB8wTFWCKaDTis5vJjiJ-_uPa37tswfX571U7bF53LdZhhFhjjUIQbMFG-DPUmTKnX8mHwsuXW8jttje2F
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFD54Q3xR5wXnNYIPihaXNEvbR1GHwzGEqeytpGkCguvG1unf9yTr6gUVxJdCmzQtJ5dzcs73nQAcKZHic228JIiExyONc85I7fl1GVCZJL6ZnFrSCtrtsNuN7j6w-B3afRqSnHAabJamLD8fpOa8JL7xmnPqM8uKtiSx11mY5xZIb_frncfSy4LqHU0CF0pAXe_VOe0WzJnvm_msnd5Nzi9RUqd8Giv__-1VWC4MT3IxGSkVmNHZGlSKqT0ix0X-6ZN1aDV7uMiQRt8RpsmVzh1cKyMOXkA6eLHYVfIon8caiy0qvYB-EevWJZ1-T5OLPLf0_Q14aFzfX954xaELnkJbLPeYipjhJjEiMZxLQ_EuNKHwmUHTJ8DlMEy5H9AoTVIpmZDUDwNuNKOJCiVT_ibMZf1MbwFhaSi0iaybNeVJLZSCSqp8P1DYLurEKtCpsGNVZCS3B2M8x2UuZSewGAUWO4HFr1U4Ld8ZTPJx_Fp7d9qHcTE3R7HbEnOB6rsKh2UxziobKpGZ7o-xDpotuLxFol6Fs2m_vjfx8xe3_1b9ABbvrhpxq9m-3YElZvEyDly4C3P5cKz3YEG95E-j4b4b1m84WvZp
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Forgery+Detection+Using+Singular+Value+Decomposition+with+Some+Attacks&rft.jtitle=National+Academy+science+letters&rft.au=Rathore%2C+Neeraj+Kumar&rft.au=Jain%2C+Neelesh+Kumar&rft.au=Shukla%2C+Prashant+Kumar&rft.au=Rawat%2C+UmaShankar&rft.date=2021-08-01&rft.issn=0250-541X&rft.volume=44&rft.issue=4+p.331-338&rft.spage=331&rft.epage=338&rft_id=info:doi/10.1007%2Fs40009-020-00998-w&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0250-541X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0250-541X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0250-541X&client=summon