{"id":"https://openalex.org/W2995832588","doi":"https://doi.org/10.1093/comjnl/bxz148","title":"Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection","display_name":"Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W2995832588","doi":"https://doi.org/10.1093/comjnl/bxz148","mag":"2995832588"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxz148","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxz148","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067135110","display_name":"V. Vinolin","orcid":null},"institutions":[{"id":"https://openalex.org/I96797292","display_name":"Noorul Islam University","ror":"https://ror.org/01y2gf490","country_code":"IN","type":"education","lineage":["https://openalex.org/I96797292"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"V Vinolin","raw_affiliation_strings":["Research Scholar, Noorul Islam Centre For Higher Education, Kumaracoil, Kanyakumari, Tamilnadu, India - 629180"],"affiliations":[{"raw_affiliation_string":"Research Scholar, Noorul Islam Centre For Higher Education, Kumaracoil, Kanyakumari, Tamilnadu, India - 629180","institution_ids":["https://openalex.org/I96797292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008914202","display_name":"M. Sucharitha","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134386","display_name":"G Pulla Reddy Dental College & Hospital","ror":"https://ror.org/04p93kz40","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210134386"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M Sucharitha","raw_affiliation_strings":["Professor, Malla Reddy College of Engineering and Technology, Maisammaguda, Medchal, Telangana, India - 500100"],"affiliations":[{"raw_affiliation_string":"Professor, Malla Reddy College of Engineering and Technology, Maisammaguda, Medchal, Telangana, India - 500100","institution_ids":["https://openalex.org/I4210134386"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067135110"],"corresponding_institution_ids":["https://openalex.org/I96797292"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.2024,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.5582142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"64","issue":"11","first_page":"1692","last_page":"1704"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13877","display_name":"Law in Society and Culture","score":0.9488999843597412,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.801857054233551},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.6610503196716309},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.5662246942520142},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5473934412002563},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5238052606582642},{"id":"https://openalex.org/keywords/image-editing","display_name":"Image editing","score":0.5021820068359375},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.48095670342445374},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46904808282852173},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.44106611609458923},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4195531904697418},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.398243248462677}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.801857054233551},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.6610503196716309},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.5662246942520142},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5473934412002563},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5238052606582642},{"id":"https://openalex.org/C2776674983","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image editing","level":3,"score":0.5021820068359375},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.48095670342445374},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46904808282852173},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.44106611609458923},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4195531904697418},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.398243248462677},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxz148","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxz148","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W33658992","https://openalex.org/W1581253957","https://openalex.org/W1751423146","https://openalex.org/W1797993979","https://openalex.org/W1967749904","https://openalex.org/W1983586459","https://openalex.org/W2021465448","https://openalex.org/W2022436565","https://openalex.org/W2033984216","https://openalex.org/W2038168805","https://openalex.org/W2044193890","https://openalex.org/W2048365718","https://openalex.org/W2068575457","https://openalex.org/W2077094335","https://openalex.org/W2093512257","https://openalex.org/W2096754397","https://openalex.org/W2140117117","https://openalex.org/W2142738546","https://openalex.org/W2155319953","https://openalex.org/W2162192649","https://openalex.org/W2163773153","https://openalex.org/W2281375574","https://openalex.org/W2515227998","https://openalex.org/W2560625046","https://openalex.org/W2571578418","https://openalex.org/W2787655010","https://openalex.org/W3119329791","https://openalex.org/W4235593161","https://openalex.org/W4253716310","https://openalex.org/W6659039248","https://openalex.org/W6748228592"],"related_works":["https://openalex.org/W2621153692","https://openalex.org/W3036827782","https://openalex.org/W1504972346","https://openalex.org/W2951194758","https://openalex.org/W2356087891","https://openalex.org/W2553152692","https://openalex.org/W1997609524","https://openalex.org/W4242919564","https://openalex.org/W2183514925","https://openalex.org/W3022867133"],"abstract_inverted_index":{"Abstract":[0],"Information":[1],"in":[2,78],"the":[3,6,24,28,31,52,69,79,90,93,101,132,148,154,157,161,172],"form":[4,14],"of":[5,15,30,92,124],"image":[7,37,57,81,107,115,125],"conveys":[8],"more":[9],"details":[10],"than":[11],"any":[12,48],"other":[13],"information.":[16],"Several":[17,36],"software":[18,151],"packages":[19],"are":[20,40,61,118,138],"available":[21,41],"to":[22,42,63,99,114,135],"manipulate":[23],"images":[25,32,45],"so":[26],"that":[27],"authenticity":[29],"is":[33,129,143],"being":[34],"questioned.":[35],"processing":[38],"approaches":[39,103],"create":[43],"fake":[44,86],"without":[46],"leaving":[47],"visual":[49],"clue":[50],"about":[51],"forging":[53],"operation.":[54],"So,":[55],"proper":[56],"forgery":[58,66,116,126],"detection":[59,117,127],"tools":[60],"required":[62],"detect":[64],"such":[65],"images.":[67,94],"Over":[68],"past":[70],"few":[71],"years,":[72],"several":[73,110],"research":[74,111,162],"papers":[75,112],"were":[76,168],"published":[77],"digital":[80],"forensics":[82],"domain":[83],"for":[84,105,153,174],"detecting":[85,106],"images,":[87],"thus":[88],"escalating":[89],"legitimacy":[91],"This":[95],"survey":[96],"paper":[97],"attempts":[98],"review":[100],"recent":[102],"proposed":[104],"forgery.":[108],"Accordingly,":[109],"related":[113,134],"reviewed":[119],"and":[120,131,156],"analyzed.":[121],"The":[122,140],"taxonomy":[123],"techniques":[128],"presented,":[130],"algorithms":[133],"each":[136],"technique":[137],"discussed.":[139],"comprehensive":[141],"analysis":[142],"carried":[144],"out":[145],"based":[146],"on":[147],"dataset":[149],"used,":[150],"used":[152],"implementation":[155],"performance":[158],"achievement.":[159],"Besides,":[160],"issues":[163],"associated":[164],"with":[165,171],"every":[166],"approach":[167],"scrutinized":[169],"together":[170],"recommendation":[173],"future":[175],"work.":[176]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-02-26T08:16:20.718346","created_date":"2025-10-10T00:00:00"}
