<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.651435</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>A Novel Approach for Copy-move Forgery Detection using Bilateral Filtering</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-4156-9098</contrib-id>
                                                                <name>
                                    <surname>Karabey Aksakallı</surname>
                                    <given-names>İşıl</given-names>
                                </name>
                                                                    <aff>ERZURUM TEKNİK ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-4740-3259</contrib-id>
                                                                <name>
                                    <surname>Kaplan</surname>
                                    <given-names>Nur Hüseyin</given-names>
                                </name>
                                                                    <aff>ERZURUM TEKNİK ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-4092-3785</contrib-id>
                                                                <name>
                                    <surname>Kılıç</surname>
                                    <given-names>Uğur</given-names>
                                </name>
                                                                    <aff>ERZURUM TEKNİK ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2225-6379</contrib-id>
                                                                <name>
                                    <surname>Erer</surname>
                                    <given-names>İşın</given-names>
                                </name>
                                                                    <aff>İSTANBUL TEKNİK ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20200430">
                    <day>04</day>
                    <month>30</month>
                    <year>2020</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>2</issue>
                                        <fpage>114</fpage>
                                        <lpage>120</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20191127">
                        <day>11</day>
                        <month>27</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20200206">
                        <day>02</day>
                        <month>06</month>
                        <year>2020</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Digital image processing methods have a wide area of usage and their complexity is increasing, as well as the tampering methods. A widely used tampering method is copy-move forgery. In this study, a hybrid method combining the DCT and Bilateral filtering is developed. In this method, first overlapping blocks are obtained from the input image. Then, bilateral filtering and DCT of these blocks are multiplied to obtain the refined block features. The block features are scanned by a zig-zag process followed by a lexicographic sorting. Finally, a similarity detection by a predetermined threshold parameter is applied to detect the forgery. Both visual and quantitative results demonstrated that the proposed method can determine the copy-move forgery regions.</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>copy-move forgery</kwd>
                                                    <kwd>  bilateral filtering</kwd>
                                                    <kwd>  zigzag scanning</kwd>
                                                    <kwd>  DCT (Discrete Cosinus Transformation</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	A. J. Fridrich, B. D. Soukal, and A. J. Luk´aˇs, “Detection of copymove forgery in digital images,” in in Proceedings of Digital Forensic Research Workshop. Citeseer, 2003.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	N. H. Kaplan and I. Erer, “Bilateral pyramid based pansharpening of multispectral satellite images,” in 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012, pp. 2376–2379.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	S. Paris, P. Kornprobst, and J. Tumblin, “Bilateral filtering: Theory and applications,” Foundations and Trends in Computer Graphics and Vision, vol. 4, no. 1, pp. 1–73, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	N. H. Kaplan and I. Erer, “Bilateral filtering-based enhanced pansharpening of multispectral satellite images,” IEEE geoscience and remote sensing letters, vol. 11, no. 11, pp. 1941–1945, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	H. A. Alberry, A. A. Hegazy, and G. I. Salama, “A fast sift based method for copy move forgery detection,” Future Computing and Informatics Journal, vol. 3, no. 2, pp. 159–165, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	A. Novoz´amsk`y and M. ˇ Sorel, “Detection of copy-move image modification using jpeg compression model,” Forensic science international, vol. 283, pp. 47–57, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	A. Parveen, Z. H. Khan, and S. N. Ahmad, “Block-based copy–move image forgery detection using dct,” Iran Journal of Computer Science, pp. 1–11, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	N. B. A. Warif, A. W. A. Wahab, M. Y. I. Idris, R. Ramli, R. Salleh, S. Shamshirband, and K.-K. R. Choo, “Copy-move forgery detection: survey, challenges and future directions,” Journal of Network and Computer Applications, vol. 75, pp. 259–278, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	R. Lionnie, R. B. Bahaweres, S. Attamimi, and M. Alaydrus, “A study on pre-processing methods for copy-move forgery detection based on sift,” in TENCON 2017-2017 IEEE Region 10 Conference. IEEE, 2017, pp. 1142–1147.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	D. Chauhan, D. Kasat, S. Jain, and V. Thakare, “Survey on keypoint based copy-move forgery detection methods on image,” Procedia Computer Science, vol. 85, pp. 206–212, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	N. D. Wandji, S. Xingming, and M. F. Kue, “Detection of copy-move forgery in digital images based on dct,” arXiv preprint arXiv:1308.5661, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Y. Huang, W. Lu, W. Sun, and D. Long, “Improved dct-based detection of copy-move forgery in images,” Forensic science international, vol. 206, no. 1-3, pp. 178–184, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004-515, pp. 1–11, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	V. Manu and B. Mehtre, “Tamper detection of social media images using quality artifacts and texture features,” Forensic science international, vol. 295, pp. 100–112, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	M. H. Alkawaz, G. Sulong, T. Saba, and A. Rehman, “Detection of copy-move image forgery based on discrete cosine transform,” Neural Computing and Applications, vol. 30, no. 1, pp. 183–192, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	VCL, “Comofod - image database for copy-move forgery detection,” http://www.vcl.fer.hr/comofod/, Access Date: February 27, 2019).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, “Comofodnew database for copy-move forgery detection,” in Proceedings ELMAR-2013. IEEE, 2013, pp. 49–54.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	A. Boz and H. S¸ . Bilge, “Copy-move image forgery detection based on lbp and dct,” in 2016 24th Signal Processing and Communication Application Conference (SIU). IEEE, 2016, pp. 561–564.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
