Efficient image duplicated region detection model using sequential block clustering

Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the block-matching algorithm. Hence, a coarse-to-fine approach is applied...

Full description

Saved in:
Bibliographic Details
Published inDigital investigation Vol. 10; no. 1; pp. 73 - 84
Main Authors Akbarpour Sekeh, Mohammad, Maarof, Mohd. Aizaini, Rohani, Mohd. Foad, Mahdian, Babak
Format Journal Article
LanguageEnglish
Published Kidlington Elsevier Ltd 01.06.2013
Elsevier Science Ltd
Subjects
Online AccessGet full text
ISSN1742-2876
1873-202X
DOI10.1016/j.diin.2013.02.007

Cover

Loading…
Abstract Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the block-matching algorithm. Hence, a coarse-to-fine approach is applied to propose an enhanced duplicated region detection model by using sequential block clustering. Clustering minimizes the search space in block matching. This significantly improves time complexity as it eliminates several extra block-comparing operations. We determine time complexity function of the proposed algorithm to measure the performance. The experimental results and mathematical analysis demonstrate that our proposed algorithm has more improvement in time complexity when the block size is small.
AbstractList Apart from robustness and accuracy of copy-paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the block-matching algorithm. Hence, a coarse-to-fine approach is applied to propose an enhanced duplicated region detection model by using sequential block clustering. Clustering minimizes the search space in block matching. This significantly improves time complexity as it eliminates several extra block-comparing operations. We determine time complexity function of the proposed algorithm to measure the performance. The experimental results and mathematical analysis demonstrate that our proposed algorithm has more improvement in time complexity when the block size is small. [PUBLICATION ABSTRACT]
Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the block-matching algorithm. Hence, a coarse-to-fine approach is applied to propose an enhanced duplicated region detection model by using sequential block clustering. Clustering minimizes the search space in block matching. This significantly improves time complexity as it eliminates several extra block-comparing operations. We determine time complexity function of the proposed algorithm to measure the performance. The experimental results and mathematical analysis demonstrate that our proposed algorithm has more improvement in time complexity when the block size is small.
Author Rohani, Mohd. Foad
Maarof, Mohd. Aizaini
Mahdian, Babak
Akbarpour Sekeh, Mohammad
Author_xml – sequence: 1
  givenname: Mohammad
  surname: Akbarpour Sekeh
  fullname: Akbarpour Sekeh, Mohammad
  email: moh_akb_s@yahoo.com, mohammad.akbarpour@gmail.com
  organization: Faculty of Computing, Universiti Teknologi Malaysia, Skudai 81300, Johor, Malaysia
– sequence: 2
  givenname: Mohd. Aizaini
  surname: Maarof
  fullname: Maarof, Mohd. Aizaini
  email: aizaini@utm.my
  organization: Faculty of Computing, Universiti Teknologi Malaysia, Skudai 81300, Johor, Malaysia
– sequence: 3
  givenname: Mohd. Foad
  surname: Rohani
  fullname: Rohani, Mohd. Foad
  email: foad@utm.my
  organization: Faculty of Computing, Universiti Teknologi Malaysia, Skudai 81300, Johor, Malaysia
– sequence: 4
  givenname: Babak
  surname: Mahdian
  fullname: Mahdian, Babak
  email: mahdianb@gmail.com
  organization: Department of Image Processing, Institute of Information Theory and Automation of the ASCR, Praha 8, Czech Republic
BookMark eNp9kM9LwzAUx4NMcJv-A54Cnlvzq20KXmTMHzDwoIK30CWvI7VrZpIK_vemzJOH5ZIHeZ-89_0s0GxwAyB0TUlOCS1vu9xYO-SMUJ4TlhNSnaE5lRXPGGEfs1RXgmVMVuUFWoTQEcLquhBz9LpuW6stDBHbfbMDbMZDb3UTwWAPO-sGbCCCjlO1dwZ6PAY77HCArzFRtunxtnf6E-t-DBF8ertE523TB7j6u5fo_WH9tnrKNi-Pz6v7TaY5kzGTUrISuCCCgWRaQ9MWbclrXhojm5LIgtW6LuS2EiUzegs0HQIChNYFFTVfopvjvwfv0jIhqs6NfkgjFeUFpzUtaJG62LFLexeCh1YdfIrqfxQlapKnOjXJU5M8RZhK8hIk_0HaxmaSEH1j-9Po3RGFFP3bgldh8qvBWJ88KuPsKfwXO4ONEw
CitedBy_id crossref_primary_10_3390_s20247339
crossref_primary_10_1007_s10489_017_1038_5
crossref_primary_10_1371_journal_pone_0221627
crossref_primary_10_3390_sym8070062
crossref_primary_10_1016_j_image_2015_08_008
crossref_primary_10_1016_j_procs_2016_03_059
crossref_primary_10_1080_18756891_2016_1161364
crossref_primary_10_1007_s11042_022_13312_1
crossref_primary_10_1016_j_jnca_2016_09_008
crossref_primary_10_5370_JEET_2015_10_4_1886
crossref_primary_10_1080_13682199_2024_2390793
crossref_primary_10_1007_s11042_018_5836_5
crossref_primary_10_1016_j_procs_2016_02_089
Cites_doi 10.1016/j.forsciint.2006.11.002
10.1016/j.image.2010.05.003
10.1016/j.sigpro.2011.01.022
10.4156/jdcta.vol5.issue1.27
10.1109/TIFS.2010.2078506
10.4304/jmm.7.1.90-97
10.1109/TIFS.2012.2218597
10.1007/11427445_121
10.1016/j.forsciint.2010.08.001
10.21136/AM.1981.103933
ContentType Journal Article
Copyright 2013 Elsevier Ltd
Copyright Elsevier Science Ltd. Jun 2013
Copyright_xml – notice: 2013 Elsevier Ltd
– notice: Copyright Elsevier Science Ltd. Jun 2013
DBID AAYXX
CITATION
DOI 10.1016/j.diin.2013.02.007
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Social Welfare & Social Work
EISSN 1873-202X
EndPage 84
ExternalDocumentID 2974780231
10_1016_j_diin_2013_02_007
S174228761300025X
Genre Feature
GroupedDBID --K
--M
..I
.~1
0R~
0SF
13V
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABKBG
ABMAC
ABMVD
ABXDB
ABYKQ
ACDAQ
ACGFS
ACHRH
ACNNM
ACNTT
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGJBL
AGUBO
AGUMN
AGYEJ
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALEQD
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BKOJK
BLXMC
BNSAS
CS3
DU5
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
KOM
M41
MO0
N9A
NCXOZ
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
RIG
ROL
RPZ
SDF
SDG
SES
SEW
SPC
SSB
SSL
SSV
SSZ
T5K
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEIPS
AEUPX
AFPUW
AFXIZ
AGCQF
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
CITATION
EFKBS
SSH
ID FETCH-LOGICAL-c328t-88826e34042e82cceaf5f63936dd8a608529c958b7462dcbe11110e4e4cc51493
IEDL.DBID .~1
ISSN 1742-2876
IngestDate Sun Jul 13 04:29:03 EDT 2025
Thu Aug 07 15:32:09 EDT 2025
Thu Apr 24 23:03:06 EDT 2025
Fri Feb 23 02:17:15 EST 2024
IsPeerReviewed false
IsScholarly false
Issue 1
Keywords Duplicated region detection
Block clustering
Image forensic
Time complexity
Local block matching
Copy–paste forgery
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c328t-88826e34042e82cceaf5f63936dd8a608529c958b7462dcbe11110e4e4cc51493
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
PQID 1353191515
PQPubID 186255
PageCount 12
ParticipantIDs proquest_journals_1353191515
crossref_primary_10_1016_j_diin_2013_02_007
crossref_citationtrail_10_1016_j_diin_2013_02_007
elsevier_sciencedirect_doi_10_1016_j_diin_2013_02_007
PublicationCentury 2000
PublicationDate 2013-06-01
PublicationDateYYYYMMDD 2013-06-01
PublicationDate_xml – month: 06
  year: 2013
  text: 2013-06-01
  day: 01
PublicationDecade 2010
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
PublicationTitle Digital investigation
PublicationYear 2013
Publisher Elsevier Ltd
Elsevier Science Ltd
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Science Ltd
References Lin, Wang, Kao (bib13) 2009; 5
Richard Neapolitan (bib22) 2011
Abramowitz, Stegun (bib1) 1972
Zhang (bib30) 2008
Jing, Shao (bib10) 2012; 7
Huang, Lu, Sun, Long (bib9) 2011; 206
Li, Wang (bib12) 2005; 3497
Christlein, Riess, Jordan, Angelopoulou (bib6) 2012; 7
Bayram (bib3) 2009
Senjian, Peursum, Wanquan, Venkatesh (bib23) 2009
Bravo-Solorio, Nandi (bib5) 2011; 91
Pitas (bib20) 2000
Blanco, Gonzalez, FernÂ'andez-Madrigal (bib4) 2010
Akbarpour Sekeh, Maarof, Rohani, Motiei (bib2) 2011; 74
Pan, Siwei (bib19) 2010; 5
Fridrich (bib8) 2003
Luo (bib14) 2006
Mahdian (bib15) 2010; 25
Mahdian, Saic (bib16) 2007; 171
Nixon, Aguado (bib18) 2008
Wiedermann (bib25) 1981; 26
Xiaoyuan, Guoqiang, Huaqing (bib27) 2004
Yang, Huang (bib28) 2009
Sergois, Koutroumbas (bib24) 2009
Ledwich, Williams (bib11) 2004
Popescu, Farid (bib21) 2004
William Ford (bib26) 2005
Zhang, Guo, Cao (bib29) 2010; vol. 6297
Michael Zimba (bib17) 2011; 5
Elena Deza (bib7) 2009
Lin (10.1016/j.diin.2013.02.007_bib13) 2009; 5
Yang (10.1016/j.diin.2013.02.007_bib28) 2009
Ledwich (10.1016/j.diin.2013.02.007_bib11) 2004
Michael Zimba (10.1016/j.diin.2013.02.007_bib17) 2011; 5
Huang (10.1016/j.diin.2013.02.007_bib9) 2011; 206
Fridrich (10.1016/j.diin.2013.02.007_bib8) 2003
Bayram (10.1016/j.diin.2013.02.007_bib3) 2009
Senjian (10.1016/j.diin.2013.02.007_bib23) 2009
William Ford (10.1016/j.diin.2013.02.007_bib26) 2005
Christlein (10.1016/j.diin.2013.02.007_bib6) 2012; 7
Mahdian (10.1016/j.diin.2013.02.007_bib15) 2010; 25
Wiedermann (10.1016/j.diin.2013.02.007_bib25) 1981; 26
Nixon (10.1016/j.diin.2013.02.007_bib18) 2008
Richard Neapolitan (10.1016/j.diin.2013.02.007_bib22) 2011
Xiaoyuan (10.1016/j.diin.2013.02.007_bib27) 2004
Sergois (10.1016/j.diin.2013.02.007_bib24) 2009
Luo (10.1016/j.diin.2013.02.007_bib14) 2006
Akbarpour Sekeh (10.1016/j.diin.2013.02.007_bib2) 2011; 74
Zhang (10.1016/j.diin.2013.02.007_bib29) 2010; vol. 6297
Bravo-Solorio (10.1016/j.diin.2013.02.007_bib5) 2011; 91
Zhang (10.1016/j.diin.2013.02.007_bib30) 2008
Jing (10.1016/j.diin.2013.02.007_bib10) 2012; 7
Abramowitz (10.1016/j.diin.2013.02.007_bib1) 1972
Elena Deza (10.1016/j.diin.2013.02.007_bib7) 2009
Mahdian (10.1016/j.diin.2013.02.007_bib16) 2007; 171
Blanco (10.1016/j.diin.2013.02.007_bib4) 2010
Popescu (10.1016/j.diin.2013.02.007_bib21) 2004
Pan (10.1016/j.diin.2013.02.007_bib19) 2010; 5
Pitas (10.1016/j.diin.2013.02.007_bib20) 2000
Li (10.1016/j.diin.2013.02.007_bib12) 2005; 3497
References_xml – year: 2010
  ident: bib4
  article-title: An experimental comparison of image feature detectors and descriptors applied to grid map matching
– year: 1972
  ident: bib1
  article-title: Handbook of mathematical functions
– volume: 26
  start-page: 432
  year: 1981
  end-page: 436
  ident: bib25
  article-title: The complexity of lexicographic sorting and searching
  publication-title: Applications of Mathematics
– volume: 206
  start-page: 178
  year: 2011
  end-page: 184
  ident: bib9
  article-title: Improved DCT-based detection of copy-move forgery in images
  publication-title: Forensic Science International
– volume: 7
  start-page: 90
  year: 2012
  end-page: 97
  ident: bib10
  article-title: Image copy-move forgery detecting based on local invariant feature
  publication-title: Journal of Multimedia
– volume: 7
  start-page: 1841
  year: 2012
  end-page: 1854
  ident: bib6
  article-title: An evaluation of popular copy-move forgery detection approaches
  publication-title: Transactions on Information Forensics and Security
– year: 2009
  ident: bib7
  article-title: Encyclopedia of distances – book
– volume: 5
  start-page: 188
  year: 2009
  end-page: 197
  ident: bib13
  article-title: Fast copy-move forgery detection
  publication-title: WSEAS Transactions on Signal Processing
– volume: 25
  start-page: 389
  year: 2010
  end-page: 399
  ident: bib15
  article-title: A bibliography on blind methods for identifying image forgery
  publication-title: Signal Processing: Image Communication
– volume: vol. 6297
  start-page: 578
  year: 2010
  end-page: 589
  ident: bib29
  article-title: Duplication localization and segmentation
  publication-title: Lecture Notes in Computer Science
– year: 2009
  ident: bib28
  article-title: Copy-move forgery detection in digital image
– volume: 91
  start-page: 1759
  year: 2011
  end-page: 1770
  ident: bib5
  article-title: Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
  publication-title: Signal Processing
– year: 2008
  ident: bib18
  article-title: Feature extraction and image processing
– year: 2004
  ident: bib11
  article-title: Reduced sift features for image retrieval and indoor localisation
– year: 2009
  ident: bib3
  article-title: An efficient and robust method for detecting copy-move forgery
  publication-title: IEEE international conference on acoustics, speech and signal processing
– year: 2011
  ident: bib22
  article-title: Foundations of algorithms
– year: 2004
  ident: bib21
  article-title: Exposing digital forgeries by detecting duplicated image regions, TR2004-515
– year: 2005
  ident: bib26
  article-title: Data structures with Java
– year: 2000
  ident: bib20
  article-title: Digital image processing algorithms and applications
– volume: 171
  start-page: 180
  year: 2007
  end-page: 189
  ident: bib16
  article-title: "Detection of copy-move forgery using a method based on blur moment invariants."
  publication-title: Forensic Science International
– volume: 5
  start-page: 857
  year: 2010
  end-page: 867
  ident: bib19
  article-title: Region duplication detection using image feature matching
  publication-title: Information Forensics and Security, IEEE Transactions
– year: 2004
  ident: bib27
  article-title: A novel algorithm for associative classification of image blocks
  publication-title: Computer and information technology, 2004. CIT '04. The fourth international conference on
– year: 2006
  ident: bib14
  article-title: Robust detection of region-duplication forgery in digital image
– year: 2008
  ident: bib30
  article-title: A survey on passive-blind image forgery by doctor method detection
  publication-title: Proceedings of the seventh international conference on machine learning and cybernetics
– volume: 5
  start-page: 251
  year: 2011
  end-page: 258
  ident: bib17
  article-title: DWT-PCA (EVD) based copy-move image forgery detection
  publication-title: International Journal of Digital Content Technology and Its Applications
– year: 2009
  ident: bib24
  article-title: Pattern recognition – book
– volume: 3497
  start-page: 753
  year: 2005
  end-page: 758
  ident: bib12
  article-title: Multifocus image fusion using spatial features and support vector machine
  publication-title: Lecture Notes in Computer Science. Advances in Neural Networks
– year: 2003
  ident: bib8
  article-title: Detection of copy-move forgery in digital images
  publication-title: Proceedings of digital forensic research workshop
– year: 2009
  ident: bib23
  article-title: Efficient algorithms for subwindow search in object detection and localization
  publication-title: Computer vision and pattern recognition, 2009. CVPR 2009. IEEE Conference on
– volume: 74
  start-page: 775
  year: 2011
  end-page: 779
  ident: bib2
  article-title: Sequential straightforward clustering for local image block matching
  publication-title: World Academy of Science, Engineering and Technology
– year: 2010
  ident: 10.1016/j.diin.2013.02.007_bib4
– volume: 5
  start-page: 188
  year: 2009
  ident: 10.1016/j.diin.2013.02.007_bib13
  article-title: Fast copy-move forgery detection
  publication-title: WSEAS Transactions on Signal Processing
– year: 2000
  ident: 10.1016/j.diin.2013.02.007_bib20
– year: 2011
  ident: 10.1016/j.diin.2013.02.007_bib22
– volume: 171
  start-page: 180
  year: 2007
  ident: 10.1016/j.diin.2013.02.007_bib16
  article-title: "Detection of copy-move forgery using a method based on blur moment invariants."
  publication-title: Forensic Science International
  doi: 10.1016/j.forsciint.2006.11.002
– volume: 74
  start-page: 775
  year: 2011
  ident: 10.1016/j.diin.2013.02.007_bib2
  article-title: Sequential straightforward clustering for local image block matching
  publication-title: World Academy of Science, Engineering and Technology
– volume: 25
  start-page: 389
  year: 2010
  ident: 10.1016/j.diin.2013.02.007_bib15
  article-title: A bibliography on blind methods for identifying image forgery
  publication-title: Signal Processing: Image Communication
  doi: 10.1016/j.image.2010.05.003
– volume: 91
  start-page: 1759
  issue: 8
  year: 2011
  ident: 10.1016/j.diin.2013.02.007_bib5
  article-title: Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
  publication-title: Signal Processing
  doi: 10.1016/j.sigpro.2011.01.022
– year: 2004
  ident: 10.1016/j.diin.2013.02.007_bib11
– year: 2009
  ident: 10.1016/j.diin.2013.02.007_bib28
– year: 2008
  ident: 10.1016/j.diin.2013.02.007_bib30
  article-title: A survey on passive-blind image forgery by doctor method detection
– volume: 5
  start-page: 251
  year: 2011
  ident: 10.1016/j.diin.2013.02.007_bib17
  article-title: DWT-PCA (EVD) based copy-move image forgery detection
  publication-title: International Journal of Digital Content Technology and Its Applications
  doi: 10.4156/jdcta.vol5.issue1.27
– year: 1972
  ident: 10.1016/j.diin.2013.02.007_bib1
– year: 2009
  ident: 10.1016/j.diin.2013.02.007_bib24
– volume: 5
  start-page: 857
  year: 2010
  ident: 10.1016/j.diin.2013.02.007_bib19
  article-title: Region duplication detection using image feature matching
  publication-title: Information Forensics and Security, IEEE Transactions
  doi: 10.1109/TIFS.2010.2078506
– year: 2003
  ident: 10.1016/j.diin.2013.02.007_bib8
  article-title: Detection of copy-move forgery in digital images
– year: 2006
  ident: 10.1016/j.diin.2013.02.007_bib14
– year: 2009
  ident: 10.1016/j.diin.2013.02.007_bib23
  article-title: Efficient algorithms for subwindow search in object detection and localization
– year: 2009
  ident: 10.1016/j.diin.2013.02.007_bib7
– volume: 7
  start-page: 90
  issue: 1
  year: 2012
  ident: 10.1016/j.diin.2013.02.007_bib10
  article-title: Image copy-move forgery detecting based on local invariant feature
  publication-title: Journal of Multimedia
  doi: 10.4304/jmm.7.1.90-97
– volume: 7
  start-page: 1841
  issue: 6
  year: 2012
  ident: 10.1016/j.diin.2013.02.007_bib6
  article-title: An evaluation of popular copy-move forgery detection approaches
  publication-title: Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2012.2218597
– volume: 3497
  start-page: 753
  year: 2005
  ident: 10.1016/j.diin.2013.02.007_bib12
  article-title: Multifocus image fusion using spatial features and support vector machine
  publication-title: Lecture Notes in Computer Science. Advances in Neural Networks
  doi: 10.1007/11427445_121
– volume: 206
  start-page: 178
  year: 2011
  ident: 10.1016/j.diin.2013.02.007_bib9
  article-title: Improved DCT-based detection of copy-move forgery in images
  publication-title: Forensic Science International
  doi: 10.1016/j.forsciint.2010.08.001
– volume: 26
  start-page: 432
  year: 1981
  ident: 10.1016/j.diin.2013.02.007_bib25
  article-title: The complexity of lexicographic sorting and searching
  publication-title: Applications of Mathematics
  doi: 10.21136/AM.1981.103933
– year: 2008
  ident: 10.1016/j.diin.2013.02.007_bib18
– year: 2004
  ident: 10.1016/j.diin.2013.02.007_bib21
– year: 2005
  ident: 10.1016/j.diin.2013.02.007_bib26
– year: 2004
  ident: 10.1016/j.diin.2013.02.007_bib27
  article-title: A novel algorithm for associative classification of image blocks
– year: 2009
  ident: 10.1016/j.diin.2013.02.007_bib3
  article-title: An efficient and robust method for detecting copy-move forgery
– volume: vol. 6297
  start-page: 578
  year: 2010
  ident: 10.1016/j.diin.2013.02.007_bib29
  article-title: Duplication localization and segmentation
SSID ssj0029954
Score 1.686275
Snippet Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the...
Apart from robustness and accuracy of copy-paste image forgery detection, time complexity also plays an important role to evaluate the performance of the...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 73
SubjectTerms Algorithms
Block clustering
Copy–paste forgery
Duplicated region detection
Forgery
Image forensic
Local block matching
Mathematical analysis
Performance evaluation
Time complexity
Title Efficient image duplicated region detection model using sequential block clustering
URI https://dx.doi.org/10.1016/j.diin.2013.02.007
https://www.proquest.com/docview/1353191515
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF6kXryIT6zWsgfxIrHJZvPosZSW-kTUYm9L9hGJrWmp6dXf7kw2ERTswVNgk13C7O7Mt8k33xByFiSpZrAwHLgoh6PYkNQqctIw5pJzFJ7ED_p39-FozK8nwWSD9OtcGKRVVr7f-vTSW1ctncqanUWWdZ4ASzPA-wiAMXJPMIOdR0jru_z8pnkw1DuzSZGYhhyFVeKM5XjpLEMNVM-3up3RX8Hpl5suY89wh2xXoJH27Hvtkg2T75GWzaylL2aWJktDz2ndMF9O98nToBSHgJhCs3dwGlSv7K9qoylWY5jnVJuiJGLltKyHQ5ED_0otubrAkSREuilVsxWqKcC9AzIeDp77I6eqoOAon8WFA8dbFhqfw840MVPKJGmQAibxQ63jJAS4xbqqG8Qy4iHTShp0oK7hhisFSKrrH5JGPs_NEaGMSx-68QRzV5mrAde4RnIJ8CtK49BrEq82nVCVvDhWuZiJmkf2JtDcAs0tXCbA3E1y8d1nYcU11j4d1DMifiwRAd5_bb9WPX2i2qAfAst9wFEV0NzxP4c9IVvMlsZwXK9FGsVyZU4BoBSyXa7ANtns9R9vH_B6dTO6_wIDC-Ux
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLZgHOCCeIrHgBwQF1StS9PHjgiBxmsXQOwWNY-iwujQ6P4_dpMigQQHTpXSOqocx_7S2p8BjuO8MBwNI8CLDgSRDSmj06BIMqGEIOJJ-qB_N0qGj-J6HI8X4LythaG0Su_7nU9vvLUf6Xlt9t7LsnePWJoj3icATJF7vAhLxE4lOrB0dnUzHH2du4jyzNVFUiVymvjaGZfmZcqSaFD7kaPuTH-LTz88dRN-Ltdg1eNGduZebR0WbLUBXVdcy57spMhnlp2wdmA6e92E-4uGHwLDCivf0G8wM3d_q61h1JBhWjFj6yYXq2JNSxxGafDPzOVX1zSTwmD3yvRkToQKeG8LHi8vHs6HgW-iEOiIZ3WAJ1ye2Ejg5rQZ19rmRVwgLIkSY7I8QcTFB3oQZyoVCTdaWfKhoRVWaI1gahBtQ6eaVnYHGBcqQjGRU_kqDw1Cm9AqoRCBpUWW9Heh36pOas8wTo0uJrJNJXuRpG5J6pYhl6juXTj9knl3_Bp_Ph23KyK_WYnEAPCnXLddPun36Iekjh94WkVAt_fPaY9gefhwdytvr0Y3-7DCXaeMIOx3oVPP5vYA8UqtDr09fgK4l-ZN
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+image+duplicated+region+detection+model+using+sequential+block+clustering&rft.jtitle=Digital+investigation&rft.au=Akbarpour+Sekeh%2C+Mohammad&rft.au=Maarof%2C+Mohd.+Aizaini&rft.au=Rohani%2C+Mohd.+Foad&rft.au=Mahdian%2C+Babak&rft.date=2013-06-01&rft.issn=1742-2876&rft.volume=10&rft.issue=1&rft.spage=73&rft.epage=84&rft_id=info:doi/10.1016%2Fj.diin.2013.02.007&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_diin_2013_02_007
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1742-2876&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1742-2876&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1742-2876&client=summon