Image Forgery Detection Using Singular Value Decomposition with Some Attacks
To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform wit...
Uloženo v:
| Vydáno v: | National Academy science letters Ročník 44; číslo 4; s. 331 - 338 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New Delhi
Springer India
01.08.2021
Springer Nature B.V |
| Témata: | |
| ISSN: | 0250-541X, 2250-1754 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform with Singular Value Decomposition (BWT-SVD)-based feature extraction is applied to find the image forgery. The proposed method begins with dividing the test images into overlapping blocks, and then Biorthogonal Wavelet Transform (BWT) with Singular Value Decomposition (SVD) applies to extract the feature vector from the blocks. After that, the feature vectors are sorts and the duplicate vectors are identified by the similarity between two successive vectors. The occurrences of clone vectors are identified on the basis of Minkowski distance and the threshold value. Then, similarity criteria result in the existence of forgery in images. To classify images into the category of authentic images or forged images, improved version of Relevance Vector Machine (RVM) uses, which leads to efficiency and accuracy of forged image identification process. Performance of proposed scheme tests by performing experiments on CoMoFoD database. The simulation results show that the proposed IRVM scheme attained high performance when compared with existing Copy-Move based image Forgery Detection schemes in MATLAB environment. |
|---|---|
| AbstractList | To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform with Singular Value Decomposition (BWT-SVD)-based feature extraction is applied to find the image forgery. The proposed method begins with dividing the test images into overlapping blocks, and then Biorthogonal Wavelet Transform (BWT) with Singular Value Decomposition (SVD) applies to extract the feature vector from the blocks. After that, the feature vectors are sorts and the duplicate vectors are identified by the similarity between two successive vectors. The occurrences of clone vectors are identified on the basis of Minkowski distance and the threshold value. Then, similarity criteria result in the existence of forgery in images. To classify images into the category of authentic images or forged images, improved version of Relevance Vector Machine (RVM) uses, which leads to efficiency and accuracy of forged image identification process. Performance of proposed scheme tests by performing experiments on CoMoFoD database. The simulation results show that the proposed IRVM scheme attained high performance when compared with existing Copy-Move based image Forgery Detection schemes in MATLAB environment. |
| Author | Rathore, Neeraj Kumar Shukla, Prashant Kumar Dubey, Rachana Jain, Neelesh Kumar Rawat, UmaShankar |
| Author_xml | – sequence: 1 givenname: Neeraj Kumar surname: Rathore fullname: Rathore, Neeraj Kumar email: neerajrathore37@gmail.com organization: Shri G. S. Institute of Technology and Science – sequence: 2 givenname: Neelesh Kumar surname: Jain fullname: Jain, Neelesh Kumar organization: Jaypee University of Engineering and Technology – sequence: 3 givenname: Prashant Kumar surname: Shukla fullname: Shukla, Prashant Kumar organization: Department of Computer Science, School of Engineering and Technology, Jagran Lake City University – sequence: 4 givenname: UmaShankar surname: Rawat fullname: Rawat, UmaShankar organization: School of Computing and IT, Manipal University Jaipur – sequence: 5 givenname: Rachana surname: Dubey fullname: Dubey, Rachana organization: Lakshmi Nariman College of Technology |
| BookMark | eNp9kE9PwyAYh4mZiXPuC3hq4sVLFSj0z3GZTpcs8TBnvBFKYTLbMoFm2beXrSYmO-zCC-H5ve-b5xoMWtNKAG4RfEAQZo-OQAiLGGIYh1rk8e4CDDGmMEYZJQMwhIc7JejzCoyd2wQa0pRShIdgMW_4WkYzY9fS7qMn6aXw2rTRyul2HS3D0dXcRh-87mT4FqbZGqePyE77r2hpGhlNvOfi292AS8VrJ8d_dQRWs-f36Wu8eHuZTyeLWCQU-xiLAiuiSpWWihCuUHjlKk8TrCiiGa-qvCJJhoqqrDjHKUdJnhElMSpFzrFIRuC-77u15qeTzrNGOyHrmrfSdI7hNEWQwCKlAb07QTems23YjmFKioKkCUGBwj0lrHHOSsW2Vjfc7hmC7OCY9Y5ZcMyOjtkuhPKTkNCeH8x4y3V9Ppr0URfmtMH8_1ZnUr9aKpMJ |
| CitedBy_id | crossref_primary_10_1155_2022_4545139 crossref_primary_10_48084_etasr_10151 crossref_primary_10_1155_2022_3242092 crossref_primary_10_1155_2022_1907511 crossref_primary_10_1155_2022_2592365 crossref_primary_10_1155_2023_3923667 crossref_primary_10_1007_s11042_022_14163_6 crossref_primary_10_1155_2022_1684017 crossref_primary_10_1155_2022_8154523 crossref_primary_10_1155_2022_8470496 crossref_primary_10_1155_2022_8794749 crossref_primary_10_1155_2022_2874497 crossref_primary_10_1155_2022_7194419 crossref_primary_10_4218_etrij_2024_0477 crossref_primary_10_1155_2022_9155349 crossref_primary_10_1155_2022_2988262 crossref_primary_10_1108_BPMJ_08_2022_0389 crossref_primary_10_1155_2022_8209256 crossref_primary_10_1007_s11277_023_10277_8 crossref_primary_10_1155_2022_8662254 crossref_primary_10_1016_j_asej_2025_103752 crossref_primary_10_1016_j_sasc_2025_200226 crossref_primary_10_1371_journal_pone_0283725 crossref_primary_10_1155_2022_3767912 crossref_primary_10_1155_2022_9737511 crossref_primary_10_32604_cmc_2023_032315 crossref_primary_10_1155_2022_5346476 crossref_primary_10_32604_cmc_2023_036216 crossref_primary_10_1155_2022_9169568 crossref_primary_10_4108_eetpht_10_5244 crossref_primary_10_1155_2022_9185731 crossref_primary_10_1007_s11042_023_15475_x crossref_primary_10_1016_j_asoc_2020_106728 crossref_primary_10_1155_2022_3612433 crossref_primary_10_1155_2022_5256133 crossref_primary_10_1155_2022_2206530 crossref_primary_10_1002_cpe_7191 crossref_primary_10_1155_2022_7359210 crossref_primary_10_1155_2022_6574825 crossref_primary_10_1155_2022_1621258 crossref_primary_10_52711_2321_581X_2022_00015 crossref_primary_10_1155_2022_2792639 crossref_primary_10_1007_s11042_024_18980_9 crossref_primary_10_1155_2022_7348488 crossref_primary_10_1007_s11277_023_10343_1 crossref_primary_10_1016_j_rineng_2025_106183 |
| Cites_doi | 10.1109/TIFS.2011.2129512 10.1007/s40009-019-00834-w 10.3233/IFS-141243 10.18287/2412-6179-2016-40-2-284-293 10.1016/j.procs.2015.12.160 10.1007/s11277-014-1975-9 10.1007/s11277-018-5758-6 10.1016/j.aeue.2016.05.005 10.1007/s11277-016-3452-0 10.4156/ijact 10.1007/s10845-014-0914-7 10.1007/s11277-018-5802-6 10.5121/acij.2016.7301 10.1007/s00366-014-0364-z 10.1016/j.forsciint.2013.05.027 10.1007/s11277-016-3264-2 10.1109/WICT.2011.6141221 |
| ContentType | Journal Article |
| Copyright | The National Academy of Sciences, India 2020 The National Academy of Sciences, India 2020. |
| Copyright_xml | – notice: The National Academy of Sciences, India 2020 – notice: The National Academy of Sciences, India 2020. |
| DBID | AAYXX CITATION 7S9 L.6 |
| DOI | 10.1007/s40009-020-00998-w |
| DatabaseName | CrossRef AGRICOLA AGRICOLA - Academic |
| DatabaseTitle | CrossRef AGRICOLA AGRICOLA - Academic |
| DatabaseTitleList | AGRICOLA |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) |
| EISSN | 2250-1754 |
| EndPage | 338 |
| ExternalDocumentID | 10_1007_s40009_020_00998_w |
| GroupedDBID | -EM 06D 0R~ 203 30V 4.4 406 408 96X AAAVM AACDK AAHBH AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAZMS ABAKF ABDZT ABECU ABFTV ABJNI ABJOX ABKCH ABMQK ABQBU ABTEG ABTHY ABTKH ABTMW ABULA ABXPI ACAOD ACCUX ACDTI ACGFS ACHSB ACIWK ACKNC ACMLO ACOKC ACPIV ACPRK ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AESKC AETCA AEVLU AEXYK AFLOW AFQWF AFRAH AFWTZ AFZKB AGAYW AGDGC AGMZJ AGQEE AGQMX AGRTI AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKLTO ALFXC ALMA_UNASSIGNED_HOLDINGS AMKLP AMXSW AMYLF AMYQR ANMIH AUKKA AXYYD AYQZM BGNMA CSCUP DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FIGPU FINBP FNLPD FRRFC FSGXE FYJPI GGCAI GGRSB GJIRD GQ6 GQ7 HMJXF HRMNR HZ~ I0C IKXTQ IWAJR IXD J-C JBSCW JZLTJ KOV LLZTM M4Y NPVJJ NQJWS NU0 O9- O93 O9G O9J PT4 RLLFE ROL RSV SHS SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE TSG UG4 UOJIU UTJUX UZXMN VFIZW W48 ZMTXR ~A9 AAYXX ABBRH ABDBE ABRTQ AFDZB AFOHR AHPBZ ATHPR AYFIA CITATION 7S9 L.6 |
| ID | FETCH-LOGICAL-c352t-2c92f4fbf6bf44af12f48f8632f5157add8d43719dbdaa26a13874fe21bc8a2c3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 50 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000555665800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0250-541X |
| IngestDate | Mon Jul 21 10:11:34 EDT 2025 Thu Sep 25 00:38:48 EDT 2025 Tue Nov 18 21:28:55 EST 2025 Sat Nov 29 03:44:55 EST 2025 Fri Feb 21 02:48:19 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Minkowski distance Biorthogonal wavelet transform (BWT) Copy-move forgery (CMF) Glowworm swarm optimization (GSO) Improved relevance vector machine (IRVM) Similarity measure |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c352t-2c92f4fbf6bf44af12f48f8632f5157add8d43719dbdaa26a13874fe21bc8a2c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| PQID | 2549946341 |
| PQPubID | 2044000 |
| PageCount | 8 |
| ParticipantIDs | proquest_miscellaneous_2661040965 proquest_journals_2549946341 crossref_primary_10_1007_s40009_020_00998_w crossref_citationtrail_10_1007_s40009_020_00998_w springer_journals_10_1007_s40009_020_00998_w |
| PublicationCentury | 2000 |
| PublicationDate | 2021-08-01 |
| PublicationDateYYYYMMDD | 2021-08-01 |
| PublicationDate_xml | – month: 08 year: 2021 text: 2021-08-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New Delhi |
| PublicationPlace_xml | – name: New Delhi – name: Dordrecht |
| PublicationTitle | National Academy science letters |
| PublicationTitleAbbrev | Natl. Acad. Sci. Lett |
| PublicationYear | 2021 |
| Publisher | Springer India Springer Nature B.V |
| Publisher_xml | – name: Springer India – name: Springer Nature B.V |
| References | Kuznetsov, Myasnikov (CR3) 2016; 40 Rathore, Chana (CR34) 2013; 2 Rathore (CR7) 2016; 5 Rathore, Chana (CR32) 2016; 89 Ayumi, Fanany (CR18) 2015; 72 CR17 Al-Qershi, Khoo (CR29) 2013; 231 Huynh-Kha, Le-Tien, Ha-Viet-Uyen, Huynh-Van, Luong (CR22) 2016; 7 CR13 CR11 Ustubioglu, Ulutas, Ulutas, Nabiyev (CR8) 2016; 70 Rathore (CR23) 2018; 101 Sharma, Kumar, Rathore (CR33) 2015; 6 Amerini, Ballan, Caldelli, Del Bimbo, Serra (CR1) 2011; 6 Amerini, Ballan, Caldelli, Del Bimbo, Serra (CR12) 2011; 6 Rathore, Rawat, Kulhari (CR30) 2019 Zainal, Zain, Radzi, Othman (CR20) 2016; 27 Rathore, Chana (CR15) 2015; 31 Kaur, Dadhwal (CR27) 2015; 7 Goyal, Gulati (CR10) 2014; 97 Rathore, Chana (CR2) 2014; 79 Li, Li, Zhu (CR16) 2013; 4 Rathore (CR25) 2015; 3 Ranjani, Poovendran (CR4) 2016; 11 CR24 Puri, Chopra (CR6) 2016; 3 Zhang, Wang (CR14) 2012 Jain, Rathore, Mishra (CR26) 2017; 42 Jain, Rathore, Mishra (CR31) 2018; 101 CR21 Rathore (CR28) 2016; 91 Rathore, Chana (CR9) 2014; 27 Ustubioglu, Ulutas, Ulutas, Nabiyev (CR5) 2016; 70 Rathore (CR19) 2015; 10 V Sharma (998_CR33) 2015; 6 B Ustubioglu (998_CR5) 2016; 70 N Rathore (998_CR15) 2015; 31 L Li (998_CR16) 2013; 4 N Zainal (998_CR20) 2016; 27 T Huynh-Kha (998_CR22) 2016; 7 NK Rathore (998_CR34) 2013; 2 V Ayumi (998_CR18) 2015; 72 NK Rathore (998_CR25) 2015; 3 I Amerini (998_CR1) 2011; 6 998_CR17 N Rathore (998_CR9) 2014; 27 998_CR13 998_CR11 N Jain (998_CR31) 2018; 101 MB Ranjani (998_CR4) 2016; 11 N Rathore (998_CR28) 2016; 91 H Goyal (998_CR10) 2014; 97 OM Al-Qershi (998_CR29) 2013; 231 N Rathore (998_CR2) 2014; 79 N Rathore (998_CR23) 2018; 101 I Amerini (998_CR12) 2011; 6 Savroop Kaur (998_CR27) 2015; 7 N Rathore (998_CR32) 2016; 89 AV Kuznetsov (998_CR3) 2016; 40 N Rathore (998_CR30) 2019 NK Rathore (998_CR19) 2015; 10 998_CR24 N Jain (998_CR26) 2017; 42 NK Rathore (998_CR7) 2016; 5 998_CR21 B Ustubioglu (998_CR8) 2016; 70 M Puri (998_CR6) 2016; 3 G Zhang (998_CR14) 2012 |
| References_xml | – volume: 11 start-page: 2671 issue: 4 year: 2016 end-page: 2674 ident: CR4 article-title: Image duplication copy move forgery detection using discrete cosine transforms method publication-title: Int J Appl Eng Res – volume: 6 start-page: 1099 issue: 3 year: 2011 end-page: 1110 ident: CR12 article-title: A sift-based forensic method for copy–move attack detection and transformation recovery publication-title: IEEE Trans Forensics Secur doi: 10.1109/TIFS.2011.2129512 – year: 2019 ident: CR30 article-title: Efficient hybrid load balancing algorithm publication-title: Natl Acad Sci Lett doi: 10.1007/s40009-019-00834-w – volume: 6 start-page: 1099 issue: 3 year: 2011 end-page: 1110 ident: CR1 article-title: A SIFT-based forensic method for copy move attack detection and transformation recovery publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2011.2129512 – volume: 6 start-page: 54 issue: 3 year: 2015 end-page: 72 ident: CR33 article-title: Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks publication-title: J Wirel Mob Netw Ubiquitous Comput Dependable Appl – volume: 27 start-page: 2821 issue: 6 year: 2014 end-page: 2833 ident: CR9 article-title: Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing publication-title: J Intell Fuzzy Syst doi: 10.3233/IFS-141243 – volume: 97 start-page: 14 year: 2014 end-page: 19 ident: CR10 article-title: Robust copy-move image forgery detection using SIFT publication-title: Int J Comput Sci Appl – volume: 40 start-page: 284 year: 2016 end-page: 293 ident: CR3 article-title: A copy-move detection algorithm based on binary gradient contours publication-title: Comput Opt doi: 10.18287/2412-6179-2016-40-2-284-293 – volume: 42 start-page: 95 issue: 11 year: 2017 end-page: 120 ident: CR26 article-title: An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks publication-title: Interciencia J – volume: 72 start-page: 527 year: 2015 end-page: 534 ident: CR18 article-title: Distribution-sensitive learning on relevance vector machine for pose-based human gesture recognition publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2015.12.160 – volume: 79 start-page: 2089 issue: 3 year: 2014 end-page: 2125 ident: CR2 article-title: Load balancing and job migration techniques in grid: a survey of recent trends publication-title: Wirel Pers Commun doi: 10.1007/s11277-014-1975-9 – volume: 2 start-page: 21 issue: 4 year: 2013 end-page: 35 ident: CR34 article-title: Report on hierarchal load balancing technique in grid environment publication-title: J Inf Technol – volume: 3 start-page: 582 issue: 9 year: 2016 end-page: 586 ident: CR6 article-title: A survey: copy-move forgery detection methods publication-title: Int J Comput Syst – ident: CR21 – volume: 101 start-page: 1233 issue: 4 year: 2018 end-page: 1246 ident: CR23 article-title: Performance of hybrid load balancing algorithm in distributed web server system publication-title: Wirel Pers Commun doi: 10.1007/s11277-018-5758-6 – volume: 4 start-page: 46 year: 2013 end-page: 56 ident: CR16 article-title: An efficient scheme for detecting copy-move forged images by local binary patterns publication-title: J Inf Hiding Multimed Signal Process – volume: 10 start-page: 21 issue: 1 year: 2015 end-page: 30 ident: CR19 article-title: Map reduce architecture for grid publication-title: J Softw Eng – volume: 70 start-page: 1076 year: 2016 end-page: 1087 ident: CR8 article-title: A new copy move forgery detection technique with automatic threshold determination publication-title: Int J Electron Commun doi: 10.1016/j.aeue.2016.05.005 – volume: 91 start-page: 151 issue: 1 year: 2016 end-page: 185 ident: CR28 article-title: Dynamic threshold based load balancing algorithms publication-title: Wirel Pers Commun doi: 10.1007/s11277-016-3452-0 – year: 2012 ident: CR14 article-title: SURF based detection of copy-move forgery in flat region publication-title: Int J Adv Comput Technol doi: 10.4156/ijact – volume: 7 start-page: 37 issue: 3 year: 2015 ident: CR27 article-title: Biorthogonal wavelet transform using bilateral filter and adaptive histogram equalization publication-title: Int J Intell Syst Appl – ident: CR17 – ident: CR13 – volume: 5 start-page: 7 issue: 1 year: 2016 end-page: 11 ident: CR7 article-title: Ethical hacking & security against cyber Crime publication-title: J Inf Technol – ident: CR11 – volume: 27 start-page: 797 issue: 4 year: 2016 end-page: 804 ident: CR20 article-title: Glowworm swarm optimization (GSO) for optimization of machining parameters publication-title: J Intell Manuf doi: 10.1007/s10845-014-0914-7 – volume: 3 start-page: 11 issue: 3 year: 2015 end-page: 22 ident: CR25 article-title: Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing publication-title: J Comput Sci – volume: 101 start-page: 1983 issue: 4 year: 2018 end-page: 2008 ident: CR31 article-title: An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine publication-title: Wirel Pers Commun doi: 10.1007/s11277-018-5802-6 – volume: 7 start-page: 1 issue: 3 year: 2016 end-page: 8 ident: CR22 article-title: A robust algorithm of forgery detection in copy-move and spliced images publication-title: Int J Adv Comput Sci Appl doi: 10.5121/acij.2016.7301 – volume: 31 start-page: 597 issue: 3 year: 2015 end-page: 615 ident: CR15 article-title: Variable threshold-based hierarchical load balancing technique in Grid publication-title: Eng Comput doi: 10.1007/s00366-014-0364-z – volume: 231 start-page: 284 issue: 1 year: 2013 end-page: 295 ident: CR29 article-title: Passive detection of copy-move forgery in digital images: state-of-the-art publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2013.05.027 – volume: 70 start-page: 1076 issue: 8 year: 2016 end-page: 1087 ident: CR5 article-title: A new copy move forgery detection technique with automatic threshold determination publication-title: Int J Electron Commun doi: 10.1016/j.aeue.2016.05.005 – ident: CR24 – volume: 89 start-page: 241 issue: 1 year: 2016 end-page: 269 ident: CR32 article-title: Job migration policies for grid environment publication-title: Wirel Pers Commun doi: 10.1007/s11277-016-3264-2 – volume: 11 start-page: 2671 issue: 4 year: 2016 ident: 998_CR4 publication-title: Int J Appl Eng Res – volume: 4 start-page: 46 year: 2013 ident: 998_CR16 publication-title: J Inf Hiding Multimed Signal Process – volume: 6 start-page: 1099 issue: 3 year: 2011 ident: 998_CR1 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2011.2129512 – ident: 998_CR17 – year: 2019 ident: 998_CR30 publication-title: Natl Acad Sci Lett doi: 10.1007/s40009-019-00834-w – ident: 998_CR21 – ident: 998_CR11 – volume: 91 start-page: 151 issue: 1 year: 2016 ident: 998_CR28 publication-title: Wirel Pers Commun doi: 10.1007/s11277-016-3452-0 – volume: 10 start-page: 21 issue: 1 year: 2015 ident: 998_CR19 publication-title: J Softw Eng – volume: 231 start-page: 284 issue: 1 year: 2013 ident: 998_CR29 publication-title: Forensic Sci Int doi: 10.1016/j.forsciint.2013.05.027 – volume: 70 start-page: 1076 issue: 8 year: 2016 ident: 998_CR5 publication-title: Int J Electron Commun doi: 10.1016/j.aeue.2016.05.005 – volume: 7 start-page: 1 issue: 3 year: 2016 ident: 998_CR22 publication-title: Int J Adv Comput Sci Appl doi: 10.5121/acij.2016.7301 – ident: 998_CR24 – volume: 5 start-page: 7 issue: 1 year: 2016 ident: 998_CR7 publication-title: J Inf Technol – volume: 7 start-page: 37 issue: 3 year: 2015 ident: 998_CR27 publication-title: Int J Intell Syst Appl – volume: 6 start-page: 1099 issue: 3 year: 2011 ident: 998_CR12 publication-title: IEEE Trans Forensics Secur doi: 10.1109/TIFS.2011.2129512 – volume: 27 start-page: 797 issue: 4 year: 2016 ident: 998_CR20 publication-title: J Intell Manuf doi: 10.1007/s10845-014-0914-7 – volume: 31 start-page: 597 issue: 3 year: 2015 ident: 998_CR15 publication-title: Eng Comput doi: 10.1007/s00366-014-0364-z – volume: 89 start-page: 241 issue: 1 year: 2016 ident: 998_CR32 publication-title: Wirel Pers Commun doi: 10.1007/s11277-016-3264-2 – volume: 27 start-page: 2821 issue: 6 year: 2014 ident: 998_CR9 publication-title: J Intell Fuzzy Syst doi: 10.3233/IFS-141243 – volume: 3 start-page: 582 issue: 9 year: 2016 ident: 998_CR6 publication-title: Int J Comput Syst – volume: 97 start-page: 14 year: 2014 ident: 998_CR10 publication-title: Int J Comput Sci Appl – volume: 42 start-page: 95 issue: 11 year: 2017 ident: 998_CR26 publication-title: Interciencia J – volume: 6 start-page: 54 issue: 3 year: 2015 ident: 998_CR33 publication-title: J Wirel Mob Netw Ubiquitous Comput Dependable Appl – volume: 79 start-page: 2089 issue: 3 year: 2014 ident: 998_CR2 publication-title: Wirel Pers Commun doi: 10.1007/s11277-014-1975-9 – volume: 72 start-page: 527 year: 2015 ident: 998_CR18 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2015.12.160 – year: 2012 ident: 998_CR14 publication-title: Int J Adv Comput Technol doi: 10.4156/ijact – volume: 2 start-page: 21 issue: 4 year: 2013 ident: 998_CR34 publication-title: J Inf Technol – volume: 70 start-page: 1076 year: 2016 ident: 998_CR8 publication-title: Int J Electron Commun doi: 10.1016/j.aeue.2016.05.005 – volume: 101 start-page: 1233 issue: 4 year: 2018 ident: 998_CR23 publication-title: Wirel Pers Commun doi: 10.1007/s11277-018-5758-6 – volume: 40 start-page: 284 year: 2016 ident: 998_CR3 publication-title: Comput Opt doi: 10.18287/2412-6179-2016-40-2-284-293 – volume: 101 start-page: 1983 issue: 4 year: 2018 ident: 998_CR31 publication-title: Wirel Pers Commun doi: 10.1007/s11277-018-5802-6 – ident: 998_CR13 doi: 10.1109/WICT.2011.6141221 – volume: 3 start-page: 11 issue: 3 year: 2015 ident: 998_CR25 publication-title: J Comput Sci |
| SSID | ssj0000565512 |
| Score | 2.459343 |
| Snippet | To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 331 |
| SubjectTerms | Decomposition digital images Digital imaging exhibitions extracts Feature extraction Forgery genetic vectors History of Science Humanities and Social Sciences image analysis Image classification Image manipulation Machine learning multidisciplinary occurrence Science Science (multidisciplinary) Short Communication Similarity Singular value decomposition sorting testing wavelet Wavelet transforms |
| Title | Image Forgery Detection Using Singular Value Decomposition with Some Attacks |
| URI | https://link.springer.com/article/10.1007/s40009-020-00998-w https://www.proquest.com/docview/2549946341 https://www.proquest.com/docview/2661040965 |
| Volume | 44 |
| WOSCitedRecordID | wos000555665800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 2250-1754 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000565512 issn: 0250-541X databaseCode: RSV dateStart: 20120201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58Hbz4FtcXETwoWjBpNk2Pi7ooiIirsreSpgkI2hW36_59J9m0oqigl0KbNC2TzqMz38wA7GtR4HVjozxJRcRTgzxnlYnitkqoyvPYTrqWXCXX17LfT29CUtiwRrvXIUkvqZtkN37iHfnMZUK7xLDxNMyiupOuYcNt76HxrKBKRzPAhw9Qv0dtTvshW-b7ZT5rpA8z80tk1Cuc7uL_XnUJFoKBSTqTL2IZpky5AsuBhYfkINSZPlyFq8tnFCakO_CJ0eTMVB6WVRIPIyA9PDiMKnlQTyODww59HiBexLlvSW_wbEinqlya_hrcd8_vTi-i0Fwh0mhzVRHTKbPc5lbklnNlKZ5JK0XMLJo4CYo9WfA4oWmRF0oxoWgsE24No7mWiul4HWbKQWk2gLBCCmNT504teH4ilaCK6jhONK6Luq8FtCZwpkPlcdcA4ylraiZ7gmVIsMwTLBu34Ki552VSd-PX2dv1vmWBB4eZ__XlAtV0C_aaYeQeFxJRpRmMcA6aJyjGUtFuwXG9lx9L_PzEzb9N34J55sAwHjm4DTPV68jswJx-qx6Hr7v--30HZg_qoQ |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58gV58i-szggdFCybNpu1R1EVxXcRV2VtJ0wQE7Yrb1b_vJJtWFBX0UmiTpmWSeWTmmwnArhI5PtcmyKJEBDzRyHNG6iBsyojKLAvN6NSSdtTpxL1ecu2TwgYV2r0KSTpJXSe78SPnyGc2E9omhr2NwyRHjWUr5t9072vPCqp0NANc-AD1e9DktOezZb4f5rNG-jAzv0RGncJpzf3vV-dh1huY5Hi0IhZgTBeLsOBZeED2fJ3p_SVoXzyhMCGtvkuMJqe6dLCsgjgYAenixWJUyb18HGpstuhzD_Ei1n1Luv0nTY7L0qbpL8Nd6-z25DzwhysECm2uMmAqYYabzIjMcC4NxbvYxCJkBk2cCMVenPMwokme5VIyIWkYR9xoRjMVS6bCFZgo-oVeBcLyWGiTWHdqzrOjWAoqqQrDSOG4qPsaQCsCp8pXHrcHYDymdc1kR7AUCZY6gqVvDTio33ke1d34tfdGNW-p58FB6ra-XKCabsBO3YzcY0MistD9IfZB8wTFWCKaDTis5vJjiJ-_uPa37tswfX571U7bF53LdZhhFhjjUIQbMFG-DPUmTKnX8mHwsuXW8jttje2F |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFD54Q3xR5wXnNYIPihaXNEvbR1GHwzGEqeytpGkCguvG1unf9yTr6gUVxJdCmzQtJ5dzcs73nQAcKZHic228JIiExyONc85I7fl1GVCZJL6ZnFrSCtrtsNuN7j6w-B3afRqSnHAabJamLD8fpOa8JL7xmnPqM8uKtiSx11mY5xZIb_frncfSy4LqHU0CF0pAXe_VOe0WzJnvm_msnd5Nzi9RUqd8Giv__-1VWC4MT3IxGSkVmNHZGlSKqT0ix0X-6ZN1aDV7uMiQRt8RpsmVzh1cKyMOXkA6eLHYVfIon8caiy0qvYB-EevWJZ1-T5OLPLf0_Q14aFzfX954xaELnkJbLPeYipjhJjEiMZxLQ_EuNKHwmUHTJ8DlMEy5H9AoTVIpmZDUDwNuNKOJCiVT_ibMZf1MbwFhaSi0iaybNeVJLZSCSqp8P1DYLurEKtCpsGNVZCS3B2M8x2UuZSewGAUWO4HFr1U4Ld8ZTPJx_Fp7d9qHcTE3R7HbEnOB6rsKh2UxziobKpGZ7o-xDpotuLxFol6Fs2m_vjfx8xe3_1b9ABbvrhpxq9m-3YElZvEyDly4C3P5cKz3YEG95E-j4b4b1m84WvZp |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+Forgery+Detection+Using+Singular+Value+Decomposition+with+Some+Attacks&rft.jtitle=National+Academy+science+letters&rft.au=Rathore%2C+Neeraj+Kumar&rft.au=Jain%2C+Neelesh+Kumar&rft.au=Shukla%2C+Prashant+Kumar&rft.au=Rawat%2C+UmaShankar&rft.date=2021-08-01&rft.issn=0250-541X&rft.volume=44&rft.issue=4+p.331-338&rft.spage=331&rft.epage=338&rft_id=info:doi/10.1007%2Fs40009-020-00998-w&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0250-541X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0250-541X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0250-541X&client=summon |