Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 0.825
JCR 5-Year IF: 0.752
SCOPUS CiteScore: 2.5
Issues per year: 4
Current issue: May 2022
Next issue: Aug 2022
Avg review time: 79 days
Avg accept to publ: 48 days
APC: 300 EUR


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


TRAFFIC STATS

1,942,376 unique visits
768,962 downloads
Since November 1, 2009



Robots online now
Googlebot
SemanticScholar


SCOPUS CiteScore

SCOPUS CiteScore


SJR SCImago RANK

SCImago Journal & Country Rank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 22 (2022)
 
     »   Issue 2 / 2022
 
     »   Issue 1 / 2022
 
 
 Volume 21 (2021)
 
     »   Issue 4 / 2021
 
     »   Issue 3 / 2021
 
     »   Issue 2 / 2021
 
     »   Issue 1 / 2021
 
 
 Volume 20 (2020)
 
     »   Issue 4 / 2020
 
     »   Issue 3 / 2020
 
     »   Issue 2 / 2020
 
     »   Issue 1 / 2020
 
 
 Volume 19 (2019)
 
     »   Issue 4 / 2019
 
     »   Issue 3 / 2019
 
     »   Issue 2 / 2019
 
     »   Issue 1 / 2019
 
 
 Volume 18 (2018)
 
     »   Issue 4 / 2018
 
     »   Issue 3 / 2018
 
     »   Issue 2 / 2018
 
     »   Issue 1 / 2018
 
 
  View all issues  








LATEST NEWS

2022-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2021. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.825 (0.722 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.752.

2022-Jun-16
SCOPUS published the CiteScore for 2021, computed by using an improved methodology, counting the citations received in 2018-2021 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering in 2021 is 2.5, the same as for 2020 but better than all our previous results.

2021-Jun-30
Clarivate Analytics published the InCites Journal Citations Report for 2020. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.221 (1.053 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.961.

2021-Jun-06
SCOPUS published the CiteScore for 2020, computed by using an improved methodology, counting the citations received in 2017-2020 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering in 2020 is 2.5, better than all our previous results.

2021-Apr-15
Release of the v3 version of AECE Journal website. We moved to a new server and implemented the latest cryptographic protocols to assure better compatibility with the most recent browsers. Our website accepts now only TLS 1.2 and TLS 1.3 secure connections.

Read More »


    
 

  1/2022 - 7

Image Forgery Detection Using Noise and Edge Weighted Local Texture Features

ASGHAR, K. See more information about ASGHAR, K. on SCOPUS See more information about ASGHAR, K. on IEEExplore See more information about ASGHAR, K. on Web of Science, SADDIQUE, M. See more information about  SADDIQUE, M. on SCOPUS See more information about  SADDIQUE, M. on SCOPUS See more information about SADDIQUE, M. on Web of Science, HUSSAIN, M. See more information about  HUSSAIN, M. on SCOPUS See more information about  HUSSAIN, M. on SCOPUS See more information about HUSSAIN, M. on Web of Science, BEBIS, G. See more information about  BEBIS, G. on SCOPUS See more information about  BEBIS, G. on SCOPUS See more information about BEBIS, G. on Web of Science, HABIB, Z. See more information about HABIB, Z. on SCOPUS See more information about HABIB, Z. on SCOPUS See more information about HABIB, Z. on Web of Science
 
View the paper record and citations in View the paper record and citations in Google Scholar
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (1,652 KB) | Citation | Downloads: 409 | Views: 340

Author keywords
artificial intelligence, forgery, Fourier transforms, machine learning, pattern recognition

References keywords
image(54), detection(35), forgery(28), noise(20), forensics(18), information(15), features(14), security(13), processing(13), multimedia(12)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2022-02-28
Volume 22, Issue 1, Year 2022, On page(s): 57 - 69
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2022.01007
Web of Science Accession Number: 000762769600006
SCOPUS ID: 85126766756

Abstract
Quick view
Full text preview
Image forgery detection is important for sensitive domains such as courts of law. The main challenge is to develop a robust model that is sensitive to tampering traces. Existing techniques perform well on a limited dataset but do not generalize well across the datasets. Moreover, these techniques cannot reliably detect tampering that distorts the texture pattern of the image. The noise patterns remain consistent throughout a digital image if its contents are not altered. Based on this hypothesis, a robust descriptor FFT-DRLBP (Fast Fourier Transformation - Discriminative Robust Local Binary Patterns) is introduced, which first estimates noise patterns using FFT and encodes the discrepancies in noise patterns using DRLBP. Features extracted are passed to Support Vector Machine (SVM) for deciding whether the image is authentic or tampered. Intensive experiments are performed on benchmark datasets to validate the performance of the method. It achieved an accuracy of 99.21% on the combination of two challenging datasets. The comparison shows that it outperforms state-of-the-art methods and is vigorous to image forgery attacks even in the presence of various post-processing operations. The performance of the method is also validated using cross-dataset experiments, which ensures its robustness and generalization.


References | Cited By  «-- Click to see who has cited this paper

[1] R. Pandey, S. Singh, and K. Shukla, "Passive forensics in image and video using noise features: A review," Digital Investigation, vol. 19, pp. 1-28, 2016.
[CrossRef] [Web of Science Times Cited 28] [SCOPUS Times Cited 42]


[2] H. Gou, A. Swaminathan, and M. Wu, "Noise features for image tampering detection and steganalysis," in IEEE International Conference on Image Processing, San Antonio, Texas, USA, 2007, pp. 97-100.
[CrossRef] [SCOPUS Times Cited 74]


[3] J. Fan, H. Cao, and A. C. Kot, "Estimating EXIF parameters based on noise features for image manipulation detection," IEEE Transactions on Information Forensics and Security, vol. 8, pp. 608-618, 2013.
[CrossRef] [Web of Science Times Cited 26] [SCOPUS Times Cited 30]


[4] Y. Ke, C. Zhang, M. Qiang, Z. Weidong and Shuguang, "Detecting image forgery based on noise estimation," International Journal of Multimedia and Ubiquitous Engineering, vol. 9, pp. 325-336, 2014.
[CrossRef] [SCOPUS Times Cited 20]


[5] C. M. Pun, B. Liu, and X. C. Yuan, "Multi-scale noise estimation for image splicing forgery detection," Journal of Visual Communication and Image Representation, vol. 38, pp. 195-206, 2016.
[CrossRef] [Web of Science Times Cited 36] [SCOPUS Times Cited 44]


[6] J. Lukas, J. Fridrich, and M. Goljan, "Detecting digital image forgeries using sensor pattern noise," in Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006, p. 60720Y.
[CrossRef] [Web of Science Times Cited 102] [SCOPUS Times Cited 255]


[7] C.-C. Hsu, T.-Y. Hung, C.-W. Lin, and C.-T. Hsu, "Video forgery detection using correlation of noise residue," in 2008 IEEE 10th workshop on multimedia signal processing, 2008, pp. 170-174

[8] X. Pan, X. Zhang, and S. Lyu, "Exposing image forgery with blind noise estimation," in Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011, pp. 15-20

[9] C. Liu, R. Szeliski, S. B. Kang, C. L. Zitnick, W. T. Freeman, "Automatic estimation and removal of noise from a single image," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, pp. 299-314, 2007.
[CrossRef] [Web of Science Times Cited 319] [SCOPUS Times Cited 382]


[10] C. Liu, W. T. Freeman, R. Szeliski, and S. B. Kang, "Noise estimation from a single image," in IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06), 2006, pp. 901-908.
[CrossRef] [SCOPUS Times Cited 273]


[11] B. Goyal, A. Dogra, S. Agrawal, B. Sohi, and A. Sharma, "Image denoising review: From classical to state-of-the-art approaches," Information Fusion, vol. 55, pp. 220-244, 2020.
[CrossRef] [Web of Science Times Cited 89] [SCOPUS Times Cited 119]


[12] [12] A. Khurshid, G. Ghulam , S. Mubbashar, and H. Zulfiqar, "Automatic enhancement of digital images using Cubic Bézier Curve and Fourier transformation," Malaysian Journal of Computer Science, vol. 30, pp. 300-310, 2017.
[CrossRef] [SCOPUS Times Cited 5]


[13] A. Satpathy, X. Jiang, and H. L. Eng, "LBP-based edge-texture features for object recognition," IEEE Transactions on Image Processing, vol. 23, pp. 1953-1964, 2014.
[CrossRef] [Web of Science Times Cited 160] [SCOPUS Times Cited 202]


[14] A. Khurshid, H. Zulfiqar, and H. Muhammad, "Copy-move and splicing image forgery detection and localization techniques: a review," Australian Journal of Forensic Sciences, vol. 49, pp. 281-307, 2017.
[CrossRef] [Web of Science Times Cited 59] [SCOPUS Times Cited 68]


[15] E.-S. M. El-Alfy and M. A. Qureshi, "Robust content authentication of gray and color images using lbp-dct markov-based features," Multimedia Tools and Applications, vol. 76, pp. 1-22, 2016.
[CrossRef] [Web of Science Times Cited 4] [SCOPUS Times Cited 6]


[16] W. Luo, J. Huang, and G. Qiu, "Robust detection of region-duplication forgery in digital image," in 18th International Conference on Pattern Recognition,( ICPR), Hong Kong, 2006, pp. 746-749.
[CrossRef] [SCOPUS Times Cited 242]


[17] S. Bayram, H. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Taipei, Taiwan, 2009, pp. 1053-1056.
[CrossRef] [Web of Science Times Cited 244] [SCOPUS Times Cited 416]


[18] B. Mahdian and S. Saic, "Blind methods for detecting image fakery," IEEE Aerospace and Electronic Systems Magazine, vol. 25, pp. 18-24, 2010.
[CrossRef] [SCOPUS Times Cited 18]


[19] Y. Wu, Y. Deng, H. Duan, and L. Zhou, "Dual tree complex wavelet transform approach to copy-rotate-move forgery detection," Science China Information Sciences, vol. 57, pp. 1-12, 2014.
[CrossRef] [Web of Science Times Cited 4] [SCOPUS Times Cited 19]


[20] F. Peng, Y.-Y. Nie, and M. Long, "A complete passive blind image copy-move forensics scheme based on compound statistics features," vol. 212, pp. e21-e25, 2011.
[CrossRef] [Web of Science Times Cited 23] [SCOPUS Times Cited 40]


[21] R. C. Pandey, S. K. Singh, and K. K. Shukla, "A passive forensic method for video: Exposing dynamic object removal and frame duplication in the digital video using sensor noise features," Journal of Intelligent Fuzzy Systems, vol. 32, pp. 3339-3353, 2017.
[CrossRef] [Web of Science Times Cited 4] [SCOPUS Times Cited 5]


[22] A. C. Popescu and H. Farid, "Statistical tools for digital forensics," in Information Hiding, 2004, pp. 395-407.
[CrossRef] [SCOPUS Times Cited 227]


[23] H. Gou, A. Swaminathan, and M. Wu, "Noise features for image tampering detection and steganalysis," in 2007 IEEE International Conference on Image Processing, 2007, pp. VI-97-VI-100

[24] B. Mahdian and S. Saic, "Using noise inconsistencies for blind image forensics," Image and Vision Computing, vol. 27, pp. 1497-1503, 2009.
[CrossRef] [Web of Science Times Cited 170] [SCOPUS Times Cited 219]


[25] X. Kang, Y. Li, Z. Qu, and J. Huang, "Enhancing source camera identification performance with a camera reference phase sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 7, pp. 393-402, 2012.
[CrossRef] [Web of Science Times Cited 128] [SCOPUS Times Cited 176]


[26] M. C. Stamm and K. R. Liu, "Forensic detection of image manipulation using statistical intrinsic fingerprints," IEEE Transactions on Information Forensics and Security, vol. 5, pp. 492-506, 2010.
[CrossRef] [Web of Science Times Cited 196] [SCOPUS Times Cited 234]


[27] B. Liu, C. M. Pun, and X. C. Yuan, "Digital image forgery detection using JPEG features and local noise discrepancies," The Scientific World Journal, vol. 14, pp. 1-12, 2014.
[CrossRef] [Web of Science Times Cited 7] [SCOPUS Times Cited 25]


[28] G. Chierchia, G. Poggi, C. Sansone, and L. Verdoliva, "A Bayesian-MRF approach for PRNU-based image forgery detection," IEEE Transactions on Information Forensics and Security, vol. 9, pp. 554-567, 2014.
[CrossRef] [Web of Science Times Cited 92] [SCOPUS Times Cited 124]


[29] H. Y. Yang, Y. Niu, L. Jiao, Y. Liu, X. Wang, and Z. Zhou, "Robust copy-move forgery detection based on multi-granularity Superpixels matching," Multimedia Tools and Applications, pp. 1-27, 2017.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 4]


[30] L. Wang and S.-i. Kamata, "Forgery image detection via mask filter banks based CNN," in 10th International Conference on Graphics and Image Processing, Chengdu, China, 2019, pp. 1-6.
[CrossRef] [Web of Science Record] [SCOPUS Times Cited 2]


[31] K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," in IEEE conference on computer vision and pattern recognition, Las Vegas, Nevada, USA, 2016, pp. 770-778.
[CrossRef] [Web of Science Times Cited 34186] [SCOPUS Times Cited 76408]


[32] V. Mall, K. Bhatt, S. K. Mitra, and A. K. Roy, "Exposing structural tampering in digital images," in 2012 IEEE International Conference on Signal Processing, Computing and Control, 2012, pp. 1-6.
[CrossRef] [SCOPUS Times Cited 7]


[33] G. Gilanie, U. I. Bajwa, M. M. Waraich, Z. Habib, H. Ullah, and M. Nasir, "Classification of normal and abnormal brain MRI slices using Gabor texture and support vector machines," Signal, Image and Video Processing, vol. 12, pp. 479-487, 2018.
[CrossRef] [Web of Science Times Cited 16] [SCOPUS Times Cited 21]


[34] G. Gilanie, N. Nasir, U. I. Bajwa, and H. Ullah, "RiceNet: convolutional neural networks-based model to classify Pakistani grown rice seed types," Multimedia Systems, pp. 1-9, 2021.
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 4]


[35] M. Saddique, K. Asghar, U. I. Bajwa, M. Hussain, H. A. Aboalsamh, and Z. Habib, "Classification of authentic and tampered video using motion residual and parasitic layers," IEEE Access, vol. 8, pp. 56782-56797, 2020.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 6]


[36] R.-E. Precup, T.-A. Teban, A. Albu, A.-B. Borlea, I. A. Zamfirache, and E. M. Petriu, "Evolving fuzzy models for prosthetic hand myoelectric-based control," IEEE Transactions on Instrumentation and Measurement, vol. 69, pp. 4625-4636, 2020.
[CrossRef] [Web of Science Times Cited 88] [SCOPUS Times Cited 95]


[37] I.-D. Borlea, R.-E. Precup, A.-B. Borlea, and D. Iercan, "A unified form of fuzzy C-means and K-means algorithms and its partitional implementation," Knowledge-Based Systems, vol. 214, p. 106731, 2021.
[CrossRef] [Web of Science Times Cited 42] [SCOPUS Times Cited 50]


[38] H. Gou, A. Swaminathan, and M. Wu, "Intrinsic sensor noise features for forensic analysis on scanners and scanned images," IEEE Transactions on Information Forensics Security, vol. 4, pp. 476-491, 2009.
[CrossRef] [Web of Science Times Cited 43] [SCOPUS Times Cited 54]


[39] X. Sun, Y. Li, S. Niu, and Y. Huang, "The detecting system of image forgeries with noise features and EXIF information," Journal of Systems Science and Complexity, vol. 28, pp. 1164-1176, 2015.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 6]


[40] C. C. Hsu, T. Y. Hung, C. W. Lin, and C. T. Hsu, "Video forgery detection using correlation of noise residue," in IEEE 10th Workshop on Multimedia Signal Processing, 2008, pp. 170-174.
[CrossRef] [Web of Science Times Cited 102] [SCOPUS Times Cited 156]


[41] K. Asghar, X. Sun, P. L. Rosin, M. Saddique, M. Hussain, and Z. Habib, "Edge-texture feature-based image forgery detection with cross-dataset evaluation," Machine Vision and Applications, vol. 30, pp. 1243-1262, 2019.
[CrossRef] [Web of Science Times Cited 7] [SCOPUS Times Cited 10]


[42] M. Saddique, K. Asghar, U. I. Bajwa, M. Hussain, and Z. Habib, "Spatial video forgery detection and localization using texture analysis of consecutive frames," Advances in Electrical and Computer Engineering, vol. 19, pp. 97-108, 2019.
[CrossRef] [Full Text] [Web of Science Times Cited 13] [SCOPUS Times Cited 15]


[43] N. Kanwal, A. Girdhar, L. Kaur, and J. S. Bhullar, "Detection of digital image forgery using fast fourier transform and local features," in 2019 International Conference on Automation, Computational and Technology Management (ICACTM), 2019, pp. 262-267.
[CrossRef] [SCOPUS Times Cited 12]


[44] J. Dong and W. Wang, "CASIA image tampering detection evaluation databases," in Signal and Information Processing (ChinaSIP), Beijing, China, 2011, pp. 422-426.
[CrossRef] [SCOPUS Times Cited 217]


[45] Christlein, V. Riess, C. Jordan, and J. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1841-1854, 2012.
[CrossRef] [Web of Science Times Cited 425] [SCOPUS Times Cited 562]


[46] D. Cozzolino, G. Poggi, and L. Verdoliva, "Efficient dense-field copy-move forgery detection," IEEE Transactions on Information Forensics and Security, vol. 10, pp. 2284-2297, 2015.
[CrossRef] [Web of Science Times Cited 182] [SCOPUS Times Cited 244]


[47] M. Zampoglou and R. Bouwmeester, The Deutsche Welle Image Forensics Dataset [Online]. Available: https://revealproject.eu/the-deutsche-welle-image-forensics-dataset/

[48] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A sift-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1099-1110, 2011.
[CrossRef] [Web of Science Times Cited 518] [SCOPUS Times Cited 721]


[49] V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1841-1854, 2012.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 10]


[50] E. Silva, T. Carvalho, A. Ferreira, and A. Rocha, "Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes," Journal of Visual Communication and Image Representation, vol. 29, pp. 16-32, 2015.
[CrossRef] [Web of Science Times Cited 119] [SCOPUS Times Cited 154]


[51] [51] G. Cattaneo, G. Roscigno, and U. F. Petrillo, "Improving the experimental analysis of tampered image detection algorithms for biometric systems," Pattern Recognition Letters, vol. 113, pp. 93-101, 2017.
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 3]


[52] D. Cozzolino, D. Gragnaniello, and L. Verdoliva, "Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques," in IEEE International Conference on Image Processing (ICIP), 2014, pp. 5302-5306.
[CrossRef] [SCOPUS Times Cited 78]


[53] M. Zampoglou, S. Papadopoulos, and Y. Kompatsiaris, "Detecting image splicing in the wild (web)," in IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 2015, pp. 1-6.
[CrossRef] [SCOPUS Times Cited 54]


[54] M. Sokolova, N. Japkowicz, and S. Szpakowicz, "Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation," in Australasian joint conference on artificial intelligence, Berlin, Germany 2006, pp. 1015-1021.
[CrossRef]


[55] R. A. Melter, "Some characterizations of city block distance," vol. 6, pp. 235-240, 1987.
[CrossRef] [Web of Science Times Cited 21] [SCOPUS Times Cited 28]


[56] L. Bai, A. Velichko, and B. W. Drinkwater, "Ultrasonic characterization of crack-like defects using scattering matrix similarity metrics," IEEE transactions on ultrasonics, ferroelectrics, and frequency control, vol. 62, pp. 545-559, 2015.
[CrossRef] [Web of Science Times Cited 39] [SCOPUS Times Cited 44]


[57] J. Y. Hesterman, L. Caucci, M. A. Kupinski, H. H. Barrett, and L. R. Furenlid, "Maximum-likelihood estimation with a contracting-grid search algorithm," IEEE transactions on nuclear science, vol. 57, pp. 1077-1084, 2010.
[CrossRef] [Web of Science Times Cited 75] [SCOPUS Times Cited 86]


[58] J. Byun, H. A. Patel, and C. T. Yavuz, "Magnetic BaFe12O19 nanofiber filter for effective separation of Fe3O4 nanoparticles and removal of arsenic," Journal of nanoparticle research, vol. 16, p. 2787, 2014.
[CrossRef] [Web of Science Times Cited 7] [SCOPUS Times Cited 12]


[59] D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, "CoMoFoD-New database for copy-move forgery detection," in 55th ELMAR International Symposium, Zadar, Croatia, 2013, pp. 49-54.
[CrossRef] [SCOPUS Times Cited 110]


[60] B. Mahdian, S. J. I. Saic, "Using noise inconsistencies for blind image forensics," Image and Vision Computing, vol. 27, pp. 1497-1503, 2009.
[CrossRef] [Web of Science Times Cited 170] [SCOPUS Times Cited 219]


[61] X. Pan, X. Zhang, and S. Lyu, "Exposing image splicing with inconsistent local noise variances," in IEEE International Conference on Computational Photography (ICCP), 2012, pp. 1-10.
[CrossRef] [SCOPUS Times Cited 70]


[62] A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, G. Bebis, and H. Mathkour, "Passive detection of image forgery using DCT and local binary pattern," Signal, Image and Video Processing, vol. 11, pp. 81-88, 2017.
[CrossRef] [Web of Science Times Cited 54] [SCOPUS Times Cited 80]


[63] X. Shen, Z. Shi, and H. Chen, "Splicing image forgery detection using textural features based on the grey level co-occurrence matrices," IET Image Processing, vol. 11, pp. 44-53, 2016.
[CrossRef] [Web of Science Times Cited 35] [SCOPUS Times Cited 50]


[64] J. Goh and V. L. Thing, "A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection," International Journal of Electronic Security and Digital Forensics, vol. 7, pp. 76-104, 2015.
[CrossRef] [SCOPUS Times Cited 18]


[65] M. Hussain, S. Qasem, G. Bebis, G. Muhammad, H. Aboalsamh, and H. Mathkour, "Evaluation of image forgery detection using multi-scale weber local descriptors," International Journal on Artificial Intelligence Tools, vol. 24, pp. 1-28, 2015.
[CrossRef] [Web of Science Times Cited 27] [SCOPUS Times Cited 35]


[66] G. Muhammad, M. Al-Hammadi, M. Hussain, and G. Bebis, "Image forgery detection using steerable pyramid transform and local binary pattern," Machine Vision and Applications, vol. 25, pp. 985-995, 2014.
[CrossRef] [SCOPUS Times Cited 21]


[67] Y. Rao and J. Ni, "A deep learning approach to detection of splicing and copy-move forgeries in images," in IEEE International Workshop on Information Forensics and Security (WIFS), 2016, pp. 1-6.
[CrossRef] [SCOPUS Times Cited 250]


[68] N. T. Pham, J.-W. Lee, G.-R. Kwon, and C.-S. Park, "Efficient image splicing detection algorithm based on markov features," Multimedia Tools and Applications, pp. 1-15, 2018.
[CrossRef] [Web of Science Times Cited 12] [SCOPUS Times Cited 14]


[69] H. A. Jalab, T. Subramaniam, R. W. Ibrahim, H. Kahtan, and N. F. M. Noor, "New Texture Descriptor Based on Modified Fractional Entropy for Digital Image Splicing Forgery Detection," Entropy, vol. 21, p. 371, 2019.
[CrossRef] [Web of Science Times Cited 16] [SCOPUS Times Cited 19]


[70] F. M. Al_Azrak, A. Sedik, M. I. Dessowky, G. M. El Banby, A. A. Khalaf, A. S. Elkorany, and F. E. A. El-Samie, "An efficient method for image forgery detection based on trigonometric transforms and deep learning," Multimedia Tools and Applications, pp. 1-23, 2020.
[CrossRef] [Web of Science Times Cited 12] [SCOPUS Times Cited 16]


[71] G. Cattaneo, G. Roscigno, and U. F. Petrillo, "Improving the experimental analysis of tampered image detection algorithms for biometric systems," Pattern Recognition Letters, vol. 113, pp. 93-101, 2018.
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 3]




References Weight

Web of Science® Citations for all references: 37,928 TCR
SCOPUS® Citations for all references: 83,233 TCR

Web of Science® Average Citations per reference: 527 ACR
SCOPUS® Average Citations per reference: 1,156 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2022-08-09 21:58 in 393 seconds.




Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2022
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: