[1]
“Passive Aproaches for Detecting Image Tampering: A Review”, JT, vol. 73, no. 2, Mar. 2015, doi: 10.11113/jt.v73.4189.