{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:27:59Z","timestamp":1743049679999,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031783111"},{"type":"electronic","value":"9783031783128"}],"license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78312-8_21","type":"book-chapter","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T12:36:54Z","timestamp":1733229414000},"page":"321-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DSTNet: Distinguishing Source and Target Areas for Image Copy-Move Forgery Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3436-2249","authenticated-orcid":false,"given":"Kaiqi","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7490-6695","authenticated-orcid":false,"given":"Xiaochen","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3640-3229","authenticated-orcid":false,"given":"Guoheng","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5735-2696","authenticated-orcid":false,"given":"Kun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,4]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TIFS.2020.3045903","volume":"16","author":"M Barni","year":"2020","unstructured":"Barni, M., Phan, Q.T., Tondi, B.: Copy move source-target disambiguation through multi-branch cnns. IEEE Trans. Inf. Forensics Secur. 16, 1825\u20131840 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"3506","DOI":"10.1109\/TMM.2020.3026868","volume":"23","author":"B Chen","year":"2020","unstructured":"Chen, B., Tan, W., Coatrieux, G., Zheng, Y., Shi, Y.Q.: A serial image copy-move forgery localization scheme with source\/target distinguishment. IEEE Trans. Multimedia 23, 3506\u20133517 (2020)","journal-title":"IEEE Trans. Multimedia"},{"issue":"6","key":"21_CR3","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"21_CR4","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284\u20132297 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"14429","DOI":"10.1007\/s00500-020-04795-x","volume":"24","author":"S Dhivya","year":"2020","unstructured":"Dhivya, S., Sangeetha, J., Sudhakar, B.: Copy-move forgery detection using surf feature extraction and svm supervised learning technique. Soft. Comput. 24, 14429\u201314440 (2020)","journal-title":"Soft. Comput."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. pp. 422\u2013426. IEEE (2013)","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"11513","DOI":"10.1007\/s11042-015-2872-2","volume":"75","author":"M Emam","year":"2016","unstructured":"Emam, M., Han, Q., Niu, X.: Pcet based copy-move forgery detection in images under geometric transforms. Multimedia Tools and Applications 75, 11513\u201311527 (2016)","journal-title":"Multimedia Tools and Applications"},{"key":"21_CR8","unstructured":"Fridrich, J., Soukal, D., Lukas, J., et\u00a0al.: Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop. vol.\u00a03, pp. 652\u201363. Cleveland, OH (2003)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"23535","DOI":"10.1007\/s11042-019-7629-x","volume":"78","author":"CS Prakash","year":"2019","unstructured":"Prakash, C.S., Panzade, P.P., Om, H., Maheshkar, S.: Detection of copy-move forgery using akaze and sift keypoint extraction. Multimedia Tools and Applications 78, 23535\u201323558 (2019)","journal-title":"Multimedia Tools and Applications"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision. pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"21_CR13","unstructured":"Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: Comofod-new database for copy-move forgery detection. In: Proceedings ELMAR-2013. pp. 49\u201354. IEEE (2013)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., Natarajan, P.: Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. In: Proceedings of the 25th ACM international conference on Multimedia. pp. 1480\u20131502 (2017)","DOI":"10.1145\/3123266.3123411"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., Natarajan, P.: Busternet: Detecting copy-move image forgery with source\/target localization. In: Proceedings of the European conference on computer vision (ECCV). pp. 168\u2013184 (2018)","DOI":"10.1007\/978-3-030-01231-1_11"},{"issue":"14","key":"21_CR16","doi-asserted-by":"publisher","first-page":"6430","DOI":"10.3390\/s23146430","volume":"23","author":"K Zhao","year":"2023","unstructured":"Zhao, K., Yuan, X., Xie, Z., Xiang, Y., Huang, G., Feng, L.: Spa-net: A deep learning approach enhanced using a span-partial structure and attention mechanism for image copy-move forgery detection. Sensors 23(14), 6430 (2023)","journal-title":"Sensors"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","volume":"15","author":"JL Zhong","year":"2019","unstructured":"Zhong, J.L., Pun, C.M.: An end-to-end dense-inceptionnet for image copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 15, 2134\u20132146 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"21_CR18","doi-asserted-by":"publisher","first-page":"6714","DOI":"10.1109\/TII.2020.2982705","volume":"16","author":"Y Zhu","year":"2020","unstructured":"Zhu, Y., Chen, C., Yan, G., Guo, Y., Dong, Y.: Ar-net: Adaptive attention and residual refinement network for copy-move forgery detection. IEEE Trans. Industr. Inf. 16(10), 6714\u20136723 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"21_CR19","doi-asserted-by":"publisher","first-page":"251","DOI":"10.4156\/jdcta.vol5.issue1.27","volume":"5","author":"M Zimba","year":"2011","unstructured":"Zimba, M., Xingming, S.: Dwt-pca (evd) based copy-move image forgery detection. International Journal of Digital Content Technology and its Applications 5(1), 251\u2013258 (2011)","journal-title":"International Journal of Digital Content Technology and its Applications"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78312-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T13:08:12Z","timestamp":1733231292000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78312-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"ISBN":["9783031783111","9783031783128"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78312-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,4]]},"assertion":[{"value":"4 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}