Efficient image duplicated region detection model using sequential block clustering
Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the block-matching algorithm. Hence, a coarse-to-fine approach is applied...
Saved in:
Published in | Digital investigation Vol. 10; no. 1; pp. 73 - 84 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Kidlington
Elsevier Ltd
01.06.2013
Elsevier Science Ltd |
Subjects | |
Online Access | Get full text |
ISSN | 1742-2876 1873-202X |
DOI | 10.1016/j.diin.2013.02.007 |
Cover
Loading…
Abstract | Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the block-matching algorithm. Hence, a coarse-to-fine approach is applied to propose an enhanced duplicated region detection model by using sequential block clustering. Clustering minimizes the search space in block matching. This significantly improves time complexity as it eliminates several extra block-comparing operations. We determine time complexity function of the proposed algorithm to measure the performance. The experimental results and mathematical analysis demonstrate that our proposed algorithm has more improvement in time complexity when the block size is small. |
---|---|
AbstractList | Apart from robustness and accuracy of copy-paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the block-matching algorithm. Hence, a coarse-to-fine approach is applied to propose an enhanced duplicated region detection model by using sequential block clustering. Clustering minimizes the search space in block matching. This significantly improves time complexity as it eliminates several extra block-comparing operations. We determine time complexity function of the proposed algorithm to measure the performance. The experimental results and mathematical analysis demonstrate that our proposed algorithm has more improvement in time complexity when the block size is small. [PUBLICATION ABSTRACT] Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the system. In this paper, the focus point is to improve time complexity of the block-matching algorithm. Hence, a coarse-to-fine approach is applied to propose an enhanced duplicated region detection model by using sequential block clustering. Clustering minimizes the search space in block matching. This significantly improves time complexity as it eliminates several extra block-comparing operations. We determine time complexity function of the proposed algorithm to measure the performance. The experimental results and mathematical analysis demonstrate that our proposed algorithm has more improvement in time complexity when the block size is small. |
Author | Rohani, Mohd. Foad Maarof, Mohd. Aizaini Mahdian, Babak Akbarpour Sekeh, Mohammad |
Author_xml | – sequence: 1 givenname: Mohammad surname: Akbarpour Sekeh fullname: Akbarpour Sekeh, Mohammad email: moh_akb_s@yahoo.com, mohammad.akbarpour@gmail.com organization: Faculty of Computing, Universiti Teknologi Malaysia, Skudai 81300, Johor, Malaysia – sequence: 2 givenname: Mohd. Aizaini surname: Maarof fullname: Maarof, Mohd. Aizaini email: aizaini@utm.my organization: Faculty of Computing, Universiti Teknologi Malaysia, Skudai 81300, Johor, Malaysia – sequence: 3 givenname: Mohd. Foad surname: Rohani fullname: Rohani, Mohd. Foad email: foad@utm.my organization: Faculty of Computing, Universiti Teknologi Malaysia, Skudai 81300, Johor, Malaysia – sequence: 4 givenname: Babak surname: Mahdian fullname: Mahdian, Babak email: mahdianb@gmail.com organization: Department of Image Processing, Institute of Information Theory and Automation of the ASCR, Praha 8, Czech Republic |
BookMark | eNp9kM9LwzAUx4NMcJv-A54Cnlvzq20KXmTMHzDwoIK30CWvI7VrZpIK_vemzJOH5ZIHeZ-89_0s0GxwAyB0TUlOCS1vu9xYO-SMUJ4TlhNSnaE5lRXPGGEfs1RXgmVMVuUFWoTQEcLquhBz9LpuW6stDBHbfbMDbMZDb3UTwWAPO-sGbCCCjlO1dwZ6PAY77HCArzFRtunxtnf6E-t-DBF8ertE523TB7j6u5fo_WH9tnrKNi-Pz6v7TaY5kzGTUrISuCCCgWRaQ9MWbclrXhojm5LIgtW6LuS2EiUzegs0HQIChNYFFTVfopvjvwfv0jIhqs6NfkgjFeUFpzUtaJG62LFLexeCh1YdfIrqfxQlapKnOjXJU5M8RZhK8hIk_0HaxmaSEH1j-9Po3RGFFP3bgldh8qvBWJ88KuPsKfwXO4ONEw |
CitedBy_id | crossref_primary_10_3390_s20247339 crossref_primary_10_1007_s10489_017_1038_5 crossref_primary_10_1371_journal_pone_0221627 crossref_primary_10_3390_sym8070062 crossref_primary_10_1016_j_image_2015_08_008 crossref_primary_10_1016_j_procs_2016_03_059 crossref_primary_10_1080_18756891_2016_1161364 crossref_primary_10_1007_s11042_022_13312_1 crossref_primary_10_1016_j_jnca_2016_09_008 crossref_primary_10_5370_JEET_2015_10_4_1886 crossref_primary_10_1080_13682199_2024_2390793 crossref_primary_10_1007_s11042_018_5836_5 crossref_primary_10_1016_j_procs_2016_02_089 |
Cites_doi | 10.1016/j.forsciint.2006.11.002 10.1016/j.image.2010.05.003 10.1016/j.sigpro.2011.01.022 10.4156/jdcta.vol5.issue1.27 10.1109/TIFS.2010.2078506 10.4304/jmm.7.1.90-97 10.1109/TIFS.2012.2218597 10.1007/11427445_121 10.1016/j.forsciint.2010.08.001 10.21136/AM.1981.103933 |
ContentType | Journal Article |
Copyright | 2013 Elsevier Ltd Copyright Elsevier Science Ltd. Jun 2013 |
Copyright_xml | – notice: 2013 Elsevier Ltd – notice: Copyright Elsevier Science Ltd. Jun 2013 |
DBID | AAYXX CITATION |
DOI | 10.1016/j.diin.2013.02.007 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Social Welfare & Social Work |
EISSN | 1873-202X |
EndPage | 84 |
ExternalDocumentID | 2974780231 10_1016_j_diin_2013_02_007 S174228761300025X |
Genre | Feature |
GroupedDBID | --K --M ..I .~1 0R~ 0SF 13V 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABKBG ABMAC ABMVD ABXDB ABYKQ ACDAQ ACGFS ACHRH ACNNM ACNTT ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AENEX AFKWA AFTJW AGHFR AGJBL AGUBO AGUMN AGYEJ AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALEQD ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BKOJK BLXMC BNSAS CS3 DU5 EBS EFJIC EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W KOM M41 MO0 N9A NCXOZ O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 RIG ROL RPZ SDF SDG SES SEW SPC SSB SSL SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACRPL ACVFH ADCNI ADNMO ADVLN AEIPS AEUPX AFPUW AFXIZ AGCQF AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU CITATION EFKBS SSH |
ID | FETCH-LOGICAL-c328t-88826e34042e82cceaf5f63936dd8a608529c958b7462dcbe11110e4e4cc51493 |
IEDL.DBID | .~1 |
ISSN | 1742-2876 |
IngestDate | Sun Jul 13 04:29:03 EDT 2025 Thu Aug 07 15:32:09 EDT 2025 Thu Apr 24 23:03:06 EDT 2025 Fri Feb 23 02:17:15 EST 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 1 |
Keywords | Duplicated region detection Block clustering Image forensic Time complexity Local block matching Copy–paste forgery |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c328t-88826e34042e82cceaf5f63936dd8a608529c958b7462dcbe11110e4e4cc51493 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 |
PQID | 1353191515 |
PQPubID | 186255 |
PageCount | 12 |
ParticipantIDs | proquest_journals_1353191515 crossref_primary_10_1016_j_diin_2013_02_007 crossref_citationtrail_10_1016_j_diin_2013_02_007 elsevier_sciencedirect_doi_10_1016_j_diin_2013_02_007 |
PublicationCentury | 2000 |
PublicationDate | 2013-06-01 |
PublicationDateYYYYMMDD | 2013-06-01 |
PublicationDate_xml | – month: 06 year: 2013 text: 2013-06-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Kidlington |
PublicationPlace_xml | – name: Kidlington |
PublicationTitle | Digital investigation |
PublicationYear | 2013 |
Publisher | Elsevier Ltd Elsevier Science Ltd |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier Science Ltd |
References | Lin, Wang, Kao (bib13) 2009; 5 Richard Neapolitan (bib22) 2011 Abramowitz, Stegun (bib1) 1972 Zhang (bib30) 2008 Jing, Shao (bib10) 2012; 7 Huang, Lu, Sun, Long (bib9) 2011; 206 Li, Wang (bib12) 2005; 3497 Christlein, Riess, Jordan, Angelopoulou (bib6) 2012; 7 Bayram (bib3) 2009 Senjian, Peursum, Wanquan, Venkatesh (bib23) 2009 Bravo-Solorio, Nandi (bib5) 2011; 91 Pitas (bib20) 2000 Blanco, Gonzalez, FernÂ'andez-Madrigal (bib4) 2010 Akbarpour Sekeh, Maarof, Rohani, Motiei (bib2) 2011; 74 Pan, Siwei (bib19) 2010; 5 Fridrich (bib8) 2003 Luo (bib14) 2006 Mahdian (bib15) 2010; 25 Mahdian, Saic (bib16) 2007; 171 Nixon, Aguado (bib18) 2008 Wiedermann (bib25) 1981; 26 Xiaoyuan, Guoqiang, Huaqing (bib27) 2004 Yang, Huang (bib28) 2009 Sergois, Koutroumbas (bib24) 2009 Ledwich, Williams (bib11) 2004 Popescu, Farid (bib21) 2004 William Ford (bib26) 2005 Zhang, Guo, Cao (bib29) 2010; vol. 6297 Michael Zimba (bib17) 2011; 5 Elena Deza (bib7) 2009 Lin (10.1016/j.diin.2013.02.007_bib13) 2009; 5 Yang (10.1016/j.diin.2013.02.007_bib28) 2009 Ledwich (10.1016/j.diin.2013.02.007_bib11) 2004 Michael Zimba (10.1016/j.diin.2013.02.007_bib17) 2011; 5 Huang (10.1016/j.diin.2013.02.007_bib9) 2011; 206 Fridrich (10.1016/j.diin.2013.02.007_bib8) 2003 Bayram (10.1016/j.diin.2013.02.007_bib3) 2009 Senjian (10.1016/j.diin.2013.02.007_bib23) 2009 William Ford (10.1016/j.diin.2013.02.007_bib26) 2005 Christlein (10.1016/j.diin.2013.02.007_bib6) 2012; 7 Mahdian (10.1016/j.diin.2013.02.007_bib15) 2010; 25 Wiedermann (10.1016/j.diin.2013.02.007_bib25) 1981; 26 Nixon (10.1016/j.diin.2013.02.007_bib18) 2008 Richard Neapolitan (10.1016/j.diin.2013.02.007_bib22) 2011 Xiaoyuan (10.1016/j.diin.2013.02.007_bib27) 2004 Sergois (10.1016/j.diin.2013.02.007_bib24) 2009 Luo (10.1016/j.diin.2013.02.007_bib14) 2006 Akbarpour Sekeh (10.1016/j.diin.2013.02.007_bib2) 2011; 74 Zhang (10.1016/j.diin.2013.02.007_bib29) 2010; vol. 6297 Bravo-Solorio (10.1016/j.diin.2013.02.007_bib5) 2011; 91 Zhang (10.1016/j.diin.2013.02.007_bib30) 2008 Jing (10.1016/j.diin.2013.02.007_bib10) 2012; 7 Abramowitz (10.1016/j.diin.2013.02.007_bib1) 1972 Elena Deza (10.1016/j.diin.2013.02.007_bib7) 2009 Mahdian (10.1016/j.diin.2013.02.007_bib16) 2007; 171 Blanco (10.1016/j.diin.2013.02.007_bib4) 2010 Popescu (10.1016/j.diin.2013.02.007_bib21) 2004 Pan (10.1016/j.diin.2013.02.007_bib19) 2010; 5 Pitas (10.1016/j.diin.2013.02.007_bib20) 2000 Li (10.1016/j.diin.2013.02.007_bib12) 2005; 3497 |
References_xml | – year: 2010 ident: bib4 article-title: An experimental comparison of image feature detectors and descriptors applied to grid map matching – year: 1972 ident: bib1 article-title: Handbook of mathematical functions – volume: 26 start-page: 432 year: 1981 end-page: 436 ident: bib25 article-title: The complexity of lexicographic sorting and searching publication-title: Applications of Mathematics – volume: 206 start-page: 178 year: 2011 end-page: 184 ident: bib9 article-title: Improved DCT-based detection of copy-move forgery in images publication-title: Forensic Science International – volume: 7 start-page: 90 year: 2012 end-page: 97 ident: bib10 article-title: Image copy-move forgery detecting based on local invariant feature publication-title: Journal of Multimedia – volume: 7 start-page: 1841 year: 2012 end-page: 1854 ident: bib6 article-title: An evaluation of popular copy-move forgery detection approaches publication-title: Transactions on Information Forensics and Security – year: 2009 ident: bib7 article-title: Encyclopedia of distances – book – volume: 5 start-page: 188 year: 2009 end-page: 197 ident: bib13 article-title: Fast copy-move forgery detection publication-title: WSEAS Transactions on Signal Processing – volume: 25 start-page: 389 year: 2010 end-page: 399 ident: bib15 article-title: A bibliography on blind methods for identifying image forgery publication-title: Signal Processing: Image Communication – volume: vol. 6297 start-page: 578 year: 2010 end-page: 589 ident: bib29 article-title: Duplication localization and segmentation publication-title: Lecture Notes in Computer Science – year: 2009 ident: bib28 article-title: Copy-move forgery detection in digital image – volume: 91 start-page: 1759 year: 2011 end-page: 1770 ident: bib5 article-title: Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics publication-title: Signal Processing – year: 2008 ident: bib18 article-title: Feature extraction and image processing – year: 2004 ident: bib11 article-title: Reduced sift features for image retrieval and indoor localisation – year: 2009 ident: bib3 article-title: An efficient and robust method for detecting copy-move forgery publication-title: IEEE international conference on acoustics, speech and signal processing – year: 2011 ident: bib22 article-title: Foundations of algorithms – year: 2004 ident: bib21 article-title: Exposing digital forgeries by detecting duplicated image regions, TR2004-515 – year: 2005 ident: bib26 article-title: Data structures with Java – year: 2000 ident: bib20 article-title: Digital image processing algorithms and applications – volume: 171 start-page: 180 year: 2007 end-page: 189 ident: bib16 article-title: "Detection of copy-move forgery using a method based on blur moment invariants." publication-title: Forensic Science International – volume: 5 start-page: 857 year: 2010 end-page: 867 ident: bib19 article-title: Region duplication detection using image feature matching publication-title: Information Forensics and Security, IEEE Transactions – year: 2004 ident: bib27 article-title: A novel algorithm for associative classification of image blocks publication-title: Computer and information technology, 2004. CIT '04. The fourth international conference on – year: 2006 ident: bib14 article-title: Robust detection of region-duplication forgery in digital image – year: 2008 ident: bib30 article-title: A survey on passive-blind image forgery by doctor method detection publication-title: Proceedings of the seventh international conference on machine learning and cybernetics – volume: 5 start-page: 251 year: 2011 end-page: 258 ident: bib17 article-title: DWT-PCA (EVD) based copy-move image forgery detection publication-title: International Journal of Digital Content Technology and Its Applications – year: 2009 ident: bib24 article-title: Pattern recognition – book – volume: 3497 start-page: 753 year: 2005 end-page: 758 ident: bib12 article-title: Multifocus image fusion using spatial features and support vector machine publication-title: Lecture Notes in Computer Science. Advances in Neural Networks – year: 2003 ident: bib8 article-title: Detection of copy-move forgery in digital images publication-title: Proceedings of digital forensic research workshop – year: 2009 ident: bib23 article-title: Efficient algorithms for subwindow search in object detection and localization publication-title: Computer vision and pattern recognition, 2009. CVPR 2009. IEEE Conference on – volume: 74 start-page: 775 year: 2011 end-page: 779 ident: bib2 article-title: Sequential straightforward clustering for local image block matching publication-title: World Academy of Science, Engineering and Technology – year: 2010 ident: 10.1016/j.diin.2013.02.007_bib4 – volume: 5 start-page: 188 year: 2009 ident: 10.1016/j.diin.2013.02.007_bib13 article-title: Fast copy-move forgery detection publication-title: WSEAS Transactions on Signal Processing – year: 2000 ident: 10.1016/j.diin.2013.02.007_bib20 – year: 2011 ident: 10.1016/j.diin.2013.02.007_bib22 – volume: 171 start-page: 180 year: 2007 ident: 10.1016/j.diin.2013.02.007_bib16 article-title: "Detection of copy-move forgery using a method based on blur moment invariants." publication-title: Forensic Science International doi: 10.1016/j.forsciint.2006.11.002 – volume: 74 start-page: 775 year: 2011 ident: 10.1016/j.diin.2013.02.007_bib2 article-title: Sequential straightforward clustering for local image block matching publication-title: World Academy of Science, Engineering and Technology – volume: 25 start-page: 389 year: 2010 ident: 10.1016/j.diin.2013.02.007_bib15 article-title: A bibliography on blind methods for identifying image forgery publication-title: Signal Processing: Image Communication doi: 10.1016/j.image.2010.05.003 – volume: 91 start-page: 1759 issue: 8 year: 2011 ident: 10.1016/j.diin.2013.02.007_bib5 article-title: Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics publication-title: Signal Processing doi: 10.1016/j.sigpro.2011.01.022 – year: 2004 ident: 10.1016/j.diin.2013.02.007_bib11 – year: 2009 ident: 10.1016/j.diin.2013.02.007_bib28 – year: 2008 ident: 10.1016/j.diin.2013.02.007_bib30 article-title: A survey on passive-blind image forgery by doctor method detection – volume: 5 start-page: 251 year: 2011 ident: 10.1016/j.diin.2013.02.007_bib17 article-title: DWT-PCA (EVD) based copy-move image forgery detection publication-title: International Journal of Digital Content Technology and Its Applications doi: 10.4156/jdcta.vol5.issue1.27 – year: 1972 ident: 10.1016/j.diin.2013.02.007_bib1 – year: 2009 ident: 10.1016/j.diin.2013.02.007_bib24 – volume: 5 start-page: 857 year: 2010 ident: 10.1016/j.diin.2013.02.007_bib19 article-title: Region duplication detection using image feature matching publication-title: Information Forensics and Security, IEEE Transactions doi: 10.1109/TIFS.2010.2078506 – year: 2003 ident: 10.1016/j.diin.2013.02.007_bib8 article-title: Detection of copy-move forgery in digital images – year: 2006 ident: 10.1016/j.diin.2013.02.007_bib14 – year: 2009 ident: 10.1016/j.diin.2013.02.007_bib23 article-title: Efficient algorithms for subwindow search in object detection and localization – year: 2009 ident: 10.1016/j.diin.2013.02.007_bib7 – volume: 7 start-page: 90 issue: 1 year: 2012 ident: 10.1016/j.diin.2013.02.007_bib10 article-title: Image copy-move forgery detecting based on local invariant feature publication-title: Journal of Multimedia doi: 10.4304/jmm.7.1.90-97 – volume: 7 start-page: 1841 issue: 6 year: 2012 ident: 10.1016/j.diin.2013.02.007_bib6 article-title: An evaluation of popular copy-move forgery detection approaches publication-title: Transactions on Information Forensics and Security doi: 10.1109/TIFS.2012.2218597 – volume: 3497 start-page: 753 year: 2005 ident: 10.1016/j.diin.2013.02.007_bib12 article-title: Multifocus image fusion using spatial features and support vector machine publication-title: Lecture Notes in Computer Science. Advances in Neural Networks doi: 10.1007/11427445_121 – volume: 206 start-page: 178 year: 2011 ident: 10.1016/j.diin.2013.02.007_bib9 article-title: Improved DCT-based detection of copy-move forgery in images publication-title: Forensic Science International doi: 10.1016/j.forsciint.2010.08.001 – volume: 26 start-page: 432 year: 1981 ident: 10.1016/j.diin.2013.02.007_bib25 article-title: The complexity of lexicographic sorting and searching publication-title: Applications of Mathematics doi: 10.21136/AM.1981.103933 – year: 2008 ident: 10.1016/j.diin.2013.02.007_bib18 – year: 2004 ident: 10.1016/j.diin.2013.02.007_bib21 – year: 2005 ident: 10.1016/j.diin.2013.02.007_bib26 – year: 2004 ident: 10.1016/j.diin.2013.02.007_bib27 article-title: A novel algorithm for associative classification of image blocks – year: 2009 ident: 10.1016/j.diin.2013.02.007_bib3 article-title: An efficient and robust method for detecting copy-move forgery – volume: vol. 6297 start-page: 578 year: 2010 ident: 10.1016/j.diin.2013.02.007_bib29 article-title: Duplication localization and segmentation |
SSID | ssj0029954 |
Score | 1.686275 |
Snippet | Apart from robustness and accuracy of copy–paste image forgery detection, time complexity also plays an important role to evaluate the performance of the... Apart from robustness and accuracy of copy-paste image forgery detection, time complexity also plays an important role to evaluate the performance of the... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 73 |
SubjectTerms | Algorithms Block clustering Copy–paste forgery Duplicated region detection Forgery Image forensic Local block matching Mathematical analysis Performance evaluation Time complexity |
Title | Efficient image duplicated region detection model using sequential block clustering |
URI | https://dx.doi.org/10.1016/j.diin.2013.02.007 https://www.proquest.com/docview/1353191515 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF6kXryIT6zWsgfxIrHJZvPosZSW-kTUYm9L9hGJrWmp6dXf7kw2ERTswVNgk13C7O7Mt8k33xByFiSpZrAwHLgoh6PYkNQqctIw5pJzFJ7ED_p39-FozK8nwWSD9OtcGKRVVr7f-vTSW1ctncqanUWWdZ4ASzPA-wiAMXJPMIOdR0jru_z8pnkw1DuzSZGYhhyFVeKM5XjpLEMNVM-3up3RX8Hpl5suY89wh2xXoJH27Hvtkg2T75GWzaylL2aWJktDz2ndMF9O98nToBSHgJhCs3dwGlSv7K9qoylWY5jnVJuiJGLltKyHQ5ED_0otubrAkSREuilVsxWqKcC9AzIeDp77I6eqoOAon8WFA8dbFhqfw840MVPKJGmQAibxQ63jJAS4xbqqG8Qy4iHTShp0oK7hhisFSKrrH5JGPs_NEaGMSx-68QRzV5mrAde4RnIJ8CtK49BrEq82nVCVvDhWuZiJmkf2JtDcAs0tXCbA3E1y8d1nYcU11j4d1DMifiwRAd5_bb9WPX2i2qAfAst9wFEV0NzxP4c9IVvMlsZwXK9FGsVyZU4BoBSyXa7ANtns9R9vH_B6dTO6_wIDC-Ux |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLZgHOCCeIrHgBwQF1StS9PHjgiBxmsXQOwWNY-iwujQ6P4_dpMigQQHTpXSOqocx_7S2p8BjuO8MBwNI8CLDgSRDSmj06BIMqGEIOJJ-qB_N0qGj-J6HI8X4LythaG0Su_7nU9vvLUf6Xlt9t7LsnePWJoj3icATJF7vAhLxE4lOrB0dnUzHH2du4jyzNVFUiVymvjaGZfmZcqSaFD7kaPuTH-LTz88dRN-Ltdg1eNGduZebR0WbLUBXVdcy57spMhnlp2wdmA6e92E-4uGHwLDCivf0G8wM3d_q61h1JBhWjFj6yYXq2JNSxxGafDPzOVX1zSTwmD3yvRkToQKeG8LHi8vHs6HgW-iEOiIZ3WAJ1ye2Ejg5rQZ19rmRVwgLIkSY7I8QcTFB3oQZyoVCTdaWfKhoRVWaI1gahBtQ6eaVnYHGBcqQjGRU_kqDw1Cm9AqoRCBpUWW9Heh36pOas8wTo0uJrJNJXuRpG5J6pYhl6juXTj9knl3_Bp_Ph23KyK_WYnEAPCnXLddPun36Iekjh94WkVAt_fPaY9gefhwdytvr0Y3-7DCXaeMIOx3oVPP5vYA8UqtDr09fgK4l-ZN |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+image+duplicated+region+detection+model+using+sequential+block+clustering&rft.jtitle=Digital+investigation&rft.au=Akbarpour+Sekeh%2C+Mohammad&rft.au=Maarof%2C+Mohd.+Aizaini&rft.au=Rohani%2C+Mohd.+Foad&rft.au=Mahdian%2C+Babak&rft.date=2013-06-01&rft.issn=1742-2876&rft.volume=10&rft.issue=1&rft.spage=73&rft.epage=84&rft_id=info:doi/10.1016%2Fj.diin.2013.02.007&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_diin_2013_02_007 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1742-2876&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1742-2876&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1742-2876&client=summon |