{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T21:18:30Z","timestamp":1769548710040,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031442032","type":"print"},{"value":"9783031442049","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44204-9_31","type":"book-chapter","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T04:02:11Z","timestamp":1695268931000},"page":"371-381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["RA-Net: A Deep Learning Approach Based on\u00a0Residual Structure and\u00a0Attention Mechanism for\u00a0Image Copy-Move Forgery Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3436-2249","authenticated-orcid":false,"given":"Kaiqi","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7490-6695","authenticated-orcid":false,"given":"Xiaochen","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4608-6895","authenticated-orcid":false,"given":"Zhiyao","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3640-3229","authenticated-orcid":false,"given":"Guoheng","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6172-8650","authenticated-orcid":false,"given":"Li","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"issue":"3","key":"31_CR1","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR2","unstructured":"Bochkovskiy, A., Wang, C.Y., Liao, H.Y.M.: YOLOv4: optimal speed and accuracy of object detection. arXiv preprint arXiv:2004.10934 (2020)"},{"issue":"11","key":"31_CR3","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284\u20132297 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"31_CR4","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using sift algorithm. In: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 2, pp. 272\u2013276. IEEE (2008)","DOI":"10.1109\/PACIIA.2008.240"},{"issue":"3","key":"31_CR6","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1109\/TIFS.2012.2188390","volume":"7","author":"P Kakar","year":"2012","unstructured":"Kakar, P., Sudha, N.: Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Trans. Inf. Forensics Secur. 7(3), 1018\u20131028 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"31_CR7","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/34.55109","volume":"12","author":"A Khotanzad","year":"1990","unstructured":"Khotanzad, A., Hong, Y.H.: Invariant image recognition by Zernike moments. IEEE Trans. Pattern Anal. Mach. Intell. 12(5), 489\u2013497 (1990)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"8","key":"31_CR8","doi-asserted-by":"publisher","first-page":"11259","DOI":"10.1007\/s11042-022-11974-5","volume":"81","author":"S Koul","year":"2022","unstructured":"Koul, S., Kumar, M., Khurana, S.S., Mushtaq, F., Kumar, K.: An efficient approach for copy-move image forgery detection using convolution neural network. Multimed. Tools Appl. 81(8), 11259\u201311277 (2022)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"31_CR9","first-page":"507","volume":"10","author":"J Li","year":"2014","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Mishra, P., Mishra, N., Sharma, S., Patel, R., et al.: Region duplication forgery detection technique based on surf and HAC. Sci. World J. 2013 (2013)","DOI":"10.1155\/2013\/267691"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/WIFS.2016.7823911"},{"issue":"8","key":"31_CR13","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu, S.J., Kirchner, M., Lee, M.J., Lee, H.K.: Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Inf. Forensics Secur. 8(8), 1355\u20131370 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","volume-title":"Information Hiding","author":"S-J Ryu","year":"2010","unstructured":"Ryu, S.-J., Lee, M.-J., Lee, H.-K.: Detection of copy-rotate-move forgery using Zernike moments. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 51\u201365. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16435-4_5"},{"key":"31_CR15","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva, E., Carvalho, T., Ferreira, A., Rocha, A.: Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J. Vis. Commun. Image Represent. 29, 16\u201332 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"31_CR16","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"31_CR17","unstructured":"Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD-new database for copy-move forgery detection. In: Proceedings ELMAR-2013, pp. 49\u201354. IEEE (2013)"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Wang, C.Y., Liao, H.Y.M., Wu, Y.H., Chen, P.Y., Hsieh, J.W., Yeh, I.H.: CSPNet: a new backbone that can enhance learning capability of CNN. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 390\u2013391 (2020)","DOI":"10.1109\/CVPRW50498.2020.00203"},{"issue":"12","key":"31_CR19","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.3724\/SP.J.1004.2009.01488","volume":"35","author":"J Wang","year":"2009","unstructured":"Wang, J., Liu, G., Zhang, Z., Dai, Y., Wang, Z.: Fast and robust forensics for image region-duplication forgery. Acta Automatica Sinica 35(12), 1488\u20131495 (2009)","journal-title":"Acta Automatica Sinica"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., Winkler, S.: Coverage-a novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 161\u2013165. IEEE (2016)","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., Natarajan, P.: BusterNet: detecting copy-move image forgery with source\/target localization. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 168\u2013184 (2018)","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Xiao, J., Hays, J., Ehinger, K.A., Oliva, A., Torralba, A.: Sun database: large-scale scene recognition from abbey to zoo. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 3485\u20133492. IEEE (2010)","DOI":"10.1109\/CVPR.2010.5539970"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44204-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T06:29:06Z","timestamp":1695277746000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44204-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031442032","9783031442049"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44204-9_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easyacademia.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"947","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"426","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"type of other papers accepted  : 9 Abstract","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}