{"id":"https://openalex.org/W4387042830","doi":"https://doi.org/10.1109/icsecs58457.2023.10256380","title":"A Comparative Analysis on Three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method","display_name":"A Comparative Analysis on Three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method","publication_year":2023,"publication_date":"2023-08-25","ids":{"openalex":"https://openalex.org/W4387042830","doi":"https://doi.org/10.1109/icsecs58457.2023.10256380"},"language":"en","primary_location":{"id":"doi:10.1109/icsecs58457.2023.10256380","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsecs58457.2023.10256380","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092942613","display_name":"Nur Izzati Nor Azaimi","orcid":null},"institutions":[{"id":"https://openalex.org/I930072361","display_name":"Tun Hussein Onn University of Malaysia","ror":"https://ror.org/01c5wha71","country_code":"MY","type":"education","lineage":["https://openalex.org/I930072361"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Nur Izzati Nor Azaimi","raw_affiliation_strings":["Universiti Tun Hussein Onn Malaysia,Faculty of Computer Science and Information Technology,Johor,Malaysia","Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Tun Hussein Onn Malaysia,Faculty of Computer Science and Information Technology,Johor,Malaysia","institution_ids":["https://openalex.org/I930072361"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Johor, Malaysia","institution_ids":["https://openalex.org/I930072361"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070925656","display_name":"Nor Bakiah Abd Warif","orcid":"https://orcid.org/0000-0002-6226-2271"},"institutions":[{"id":"https://openalex.org/I930072361","display_name":"Tun Hussein Onn University of Malaysia","ror":"https://ror.org/01c5wha71","country_code":"MY","type":"education","lineage":["https://openalex.org/I930072361"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Nor Bakiah Abd Warif","raw_affiliation_strings":["Centre for Information Security Research, Universiti Tun Hussein Onn Malaysia,Faculty of Computer Science and Information Technology,Johor,Malaysia","Faculty of Computer Science and Information Technology, Centre for Information Security Research, Universiti Tun Hussein Onn Malaysia, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Centre for Information Security Research, Universiti Tun Hussein Onn Malaysia,Faculty of Computer Science and Information Technology,Johor,Malaysia","institution_ids":["https://openalex.org/I930072361"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Centre for Information Security Research, Universiti Tun Hussein Onn Malaysia, Johor, Malaysia","institution_ids":["https://openalex.org/I930072361"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018171497","display_name":"Nor-Syahidatul N. Ismail","orcid":null},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Nor-Syahidatul N Ismail","raw_affiliation_strings":["Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Department of Computer System and Networking,Pekan,Pahang,Malaysia","Department of Computer System and Networking, Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Department of Computer System and Networking,Pekan,Pahang,Malaysia","institution_ids":["https://openalex.org/I102913810"]},{"raw_affiliation_string":"Department of Computer System and Networking, Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia","institution_ids":["https://openalex.org/I102913810"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092942613"],"corresponding_institution_ids":["https://openalex.org/I930072361"],"apc_list":null,"apc_paid":null,"fwci":0.123,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.41846162,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"357","last_page":"362"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9761000275611877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13877","display_name":"Law in Society and Culture","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gene-duplication","display_name":"Gene duplication","score":0.7706664204597473},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6796205043792725},{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.6183463335037231},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4949731230735779},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.4465062618255615},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40744760632514954},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35291534662246704},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.27760952711105347},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.1190548837184906},{"id":"https://openalex.org/keywords/gene","display_name":"Gene","score":0.10627356171607971},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08355173468589783}],"concepts":[{"id":"https://openalex.org/C7602840","wikidata":"https://www.wikidata.org/wiki/Q746284","display_name":"Gene duplication","level":3,"score":0.7706664204597473},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6796205043792725},{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.6183463335037231},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4949731230735779},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.4465062618255615},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40744760632514954},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35291534662246704},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.27760952711105347},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.1190548837184906},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.10627356171607971},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08355173468589783},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsecs58457.2023.10256380","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsecs58457.2023.10256380","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6836793530","display_name":null,"funder_award_id":"FRGS/1/2020/ICT04/UTHM/02/1","funder_id":"https://openalex.org/F4320310481","funder_display_name":"Uddannelses- og Forskningsministeriet"}],"funders":[{"id":"https://openalex.org/F4320310481","display_name":"Uddannelses- og Forskningsministeriet","ror":"https://ror.org/03ge1nb22"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W120119343","https://openalex.org/W1490753124","https://openalex.org/W1566737483","https://openalex.org/W1570958768","https://openalex.org/W2087935622","https://openalex.org/W2162963619","https://openalex.org/W2341385521","https://openalex.org/W2518397542","https://openalex.org/W2520022511","https://openalex.org/W2570525622","https://openalex.org/W2606210793","https://openalex.org/W2759823188","https://openalex.org/W2803831504","https://openalex.org/W2893847031","https://openalex.org/W2985705680","https://openalex.org/W3013076809","https://openalex.org/W3025884774","https://openalex.org/W3202603595","https://openalex.org/W6604906609","https://openalex.org/W6634031272","https://openalex.org/W6744774679","https://openalex.org/W6775585075"],"related_works":["https://openalex.org/W3144870715","https://openalex.org/W3142319788","https://openalex.org/W2587188779","https://openalex.org/W3132870970","https://openalex.org/W2943088381","https://openalex.org/W2392126150","https://openalex.org/W1485522661","https://openalex.org/W2393687301","https://openalex.org/W2371775810","https://openalex.org/W2374508065"],"abstract_inverted_index":{"Image":[0],"forgery":[1,19],"is":[2,21,91,122],"the":[3,13,24,30,34,37,41,46,54,66,98,102,120,131],"alteration":[4],"of":[5,12,23,33,45,62,73],"a":[6,126],"digital":[7],"image":[8,35],"to":[9,27,105,124],"hide":[10],"some":[11],"important":[14],"and":[15,82,87,97,117],"useful":[16],"information.":[17],"Copy-move":[18],"(CMF)":[20],"one":[22],"most":[25],"difficult":[26],"detect":[28,125],"because":[29],"copied":[31,55],"part":[32],"has":[36],"same":[38],"characteristics":[39],"as":[40],"original":[42],"image.":[43],"Most":[44],"existing":[47],"datasets":[48],"only":[49],"highlight":[50],"additional":[51],"attacks":[52],"in":[53,65,76,114,134],"part.":[56],"Since":[57],"there":[58],"are":[59,79],"no":[60],"categories":[61,72],"duplication":[63,74,112],"elements":[64,75,113],"datasets,":[67],"this":[68],"research":[69],"analyzed":[70],"three":[71],"CMF":[77],"which":[78],"animals,":[80],"food":[81,132],"non-living":[83],"things":[84],"using":[85],"DEFACTO":[86,116],"CoMo3Dataset.":[88,118],"The":[89],"analysis":[90],"performed":[92],"on":[93],"PatchMatch-based":[94],"detection":[95],"method":[96,103,121],"results":[99],"show":[100],"that":[101],"able":[104,123],"maintain":[106],"at":[107],"least":[108],"83%":[109],"for":[110,130],"all":[111],"both":[115,135],"Furthermore,":[119],"minimum":[127],"92%":[128],"score":[129],"category":[133],"datasets.":[136]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
