{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:29:00Z","timestamp":1770748140960,"version":"3.49.0"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s00371-022-02710-z","type":"journal-article","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T20:57:24Z","timestamp":1667422644000},"page":"6029-6040","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Non-overlapping block-level difference-based image forgery detection and localization (NB-localization)"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9977-8004","authenticated-orcid":false,"given":"Sanjeev","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Suneet Kumar","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Umesh","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,2]]},"reference":[{"key":"2710_CR1","doi-asserted-by":"publisher","unstructured":"Jain, I., Goel, N.: Advancements in image splicing and copy-move forgery detection techniques: a survey (2021). https:\/\/doi.org\/10.1109\/Confluence51648.2021.9377104","DOI":"10.1109\/Confluence51648.2021.9377104"},{"key":"2710_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02347-4","author":"S Tyagi","year":"2022","unstructured":"Tyagi, S., Yadav, D.: A detailed analysis of image and video forgery detection techniques. Vis. Comput. (2022). https:\/\/doi.org\/10.1007\/s00371-021-02347-4","journal-title":"Vis. Comput."},{"key":"2710_CR3","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2018.7498","author":"B Santhosh Kumar","year":"2018","unstructured":"Santhosh Kumar, B., Karthi, S., Karthika, K., Cristin, R.: A systematic study of image forgery detection. J. Comput. Theor. Nanosci. (2018). https:\/\/doi.org\/10.1166\/jctn.2018.7498","journal-title":"J. Comput. Theor. Nanosci."},{"key":"2710_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2021.11.004","author":"M Swain","year":"2022","unstructured":"Swain, M., Swain, D.: An effective watermarking technique using BTC and SVD for image authentication and quality recovery. Integration (2022). https:\/\/doi.org\/10.1016\/j.vlsi.2021.11.004","journal-title":"Integration"},{"key":"2710_CR5","unstructured":"Manjunatha, S., Patil, M.M.: A study on image forgery detection techniques. CiiT Int. J. Digit. Image Process. 9(5) 2017"},{"issue":"2","key":"2710_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.14257\/ijfgcn.2018.11.2.02","volume":"11","author":"S Mushtaq","year":"2018","unstructured":"Mushtaq, S., Mir, A.H.: Image copy move forgery detection: a review. Int. J. Futur. Gener. Commun. Netw. 11(2), 11\u201322 (2018). https:\/\/doi.org\/10.14257\/ijfgcn.2018.11.2.02","journal-title":"Int. J. Futur. Gener. Commun. Netw."},{"issue":"6","key":"2710_CR7","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012). https:\/\/doi.org\/10.1109\/TIFS.2012.2218597","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2710_CR8","doi-asserted-by":"publisher","unstructured":"Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Multimed. Expo, 2007 IEEE Int. Conf., pp. 1750\u20131753 (2007). https:\/\/doi.org\/10.1109\/ICME.2007.4285009","DOI":"10.1109\/ICME.2007.4285009"},{"issue":"3","key":"2710_CR9","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.3233\/JIFS-169461","volume":"34","author":"MM Isaac","year":"2018","unstructured":"Isaac, M.M., Wilscy, M.: Image forgery detection using region\u2014based rotation invariant co-occurrences among adjacent LBPs. J. Intell. Fuzzy Syst. 34(3), 1679\u20131690 (2018). https:\/\/doi.org\/10.3233\/JIFS-169461","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"5","key":"2710_CR10","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1049\/iet-ipr.2016.0537","volume":"11","author":"R Dixit","year":"2017","unstructured":"Dixit, R., Naskar, R., Mishra, S.: Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD. IET Image Process. 11(5), 301\u2013309 (2017). https:\/\/doi.org\/10.1049\/iet-ipr.2016.0537","journal-title":"IET Image Process."},{"key":"2710_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.cmpb.2017.07.011","volume":"150","author":"VK Shrivastava","year":"2017","unstructured":"Shrivastava, V.K., Londhe, N.D., Sonawane, R.S., Suri, J.S.: A novel and robust Bayesian approach for segmentation of psoriasis lesions and its risk stratification. Comput. Methods Programs Biomed. 150, 9\u201322 (2017). https:\/\/doi.org\/10.1016\/j.cmpb.2017.07.011","journal-title":"Comput. Methods Programs Biomed."},{"issue":"11","key":"2710_CR12","doi-asserted-by":"publisher","first-page":"15353","DOI":"10.1007\/s11042-018-6891-7","volume":"78","author":"MA Elaskily","year":"2019","unstructured":"Elaskily, M.A., Elnemr, H.A., Dessouky, M.M., Faragallah, O.S.: Two stages object recognition based copy-move forgery detection algorithm. Multimed. Tools Appl. 78(11), 15353\u201315373 (2019). https:\/\/doi.org\/10.1007\/s11042-018-6891-7","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"2710_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102783","volume":"59","author":"Y Gan","year":"2022","unstructured":"Gan, Y., Zhong, J., Vong, C.: A novel copy-move forgery detection algorithm via feature label matching and hierarchical segmentation filtering. Inf. Process. Manag. 59(1), 102783 (2022). https:\/\/doi.org\/10.1016\/j.ipm.2021.102783","journal-title":"Inf. Process. Manag."},{"key":"2710_CR14","unstructured":"Maind, R.A., Khade, A., Chitre, D.K.: Image copy move forgery detection using block representing method. (2), 49\u201353 (2014)"},{"issue":"5","key":"2710_CR15","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1109\/TIFS.2017.2656823","volume":"12","author":"H Li","year":"2017","unstructured":"Li, H., Luo, W., Qiu, X., Huang, J.: Image forgery localization via integrating tampering possibility maps. IEEE Trans. Inf. Forensics Secur. 12(5), 1240\u20131252 (2017). https:\/\/doi.org\/10.1109\/TIFS.2017.2656823","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"2710_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-981-10-7644-2","volume":"2","author":"Y Wu","year":"2020","unstructured":"Wu, Y., et al.: Copy-move forgery detection exploiting. Multimed. Tools Appl. 2(2), 57\u201364 (2020). https:\/\/doi.org\/10.1007\/978-981-10-7644-2","journal-title":"Multimed. Tools Appl."},{"key":"2710_CR17","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Copy-move forgery detection based on patchmatch. In: Universit \u00b4 a Federico II di Napoli, DIETI, 80125 Naples Italy, pp. 5312\u20135316 (2014)","DOI":"10.1109\/ICIP.2014.7026075"},{"key":"2710_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102536","volume":"54","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Kang, X., Chen, Y.: Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. J. Inf. Secur. Appl. 54, 102536 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2020.102536","journal-title":"J. Inf. Secur. Appl."},{"issue":"11\u201312","key":"2710_CR19","doi-asserted-by":"publisher","first-page":"8197","DOI":"10.1007\/s11042-019-08343-0","volume":"79","author":"KB Meena","year":"2020","unstructured":"Meena, K.B., Tyagi, V.: A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms. Multimed. Tools Appl. 79(11\u201312), 8197\u20138212 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08343-0","journal-title":"Multimed. Tools Appl."},{"issue":"23","key":"2710_CR20","doi-asserted-by":"publisher","first-page":"33505","DOI":"10.1007\/s11042-019-08082-2","volume":"78","author":"KB Meena","year":"2019","unstructured":"Meena, K.B., Tyagi, V.: A copy-move image forgery detection technique based on Gaussian-Hermite moments. Multimed. Tools Appl. 78(23), 33505\u201333526 (2019). https:\/\/doi.org\/10.1007\/s11042-019-08082-2","journal-title":"Multimed. Tools Appl."},{"key":"2710_CR21","doi-asserted-by":"publisher","first-page":"103057","DOI":"10.1016\/j.jvcir.2021.103057","volume":"76","author":"Q Lyu","year":"2021","unstructured":"Lyu, Q., Luo, J., Liu, K., Yin, X., Liu, J., Lu, W.: Copy move forgery detection based on double matching. J. Vis. Commun. Image Represent 76, 103057 (2021). https:\/\/doi.org\/10.1016\/j.jvcir.2021.103057","journal-title":"J. Vis. Commun. Image Represent"},{"issue":"1","key":"2710_CR22","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s12530-021-09367-4","volume":"13","author":"R Agarwal","year":"2022","unstructured":"Agarwal, R., Verma, O.P.: Robust copy-move forgery detection using modified superpixel based FCM clustering with emperor penguin optimization and block feature matching. Evol. Syst. 13(1), 27\u201341 (2022). https:\/\/doi.org\/10.1007\/s12530-021-09367-4","journal-title":"Evol. Syst."},{"issue":"8","key":"2710_CR23","doi-asserted-by":"publisher","first-page":"2675","DOI":"10.1007\/s00371-021-02146-x","volume":"38","author":"H Chen","year":"2022","unstructured":"Chen, H., Han, Q., Li, Q., Tong, X.: Digital image manipulation detection with weak feature stream. Vis. Comput. 38(8), 2675\u20132689 (2022). https:\/\/doi.org\/10.1007\/s00371-021-02146-x","journal-title":"Vis. Comput."},{"issue":"6","key":"2710_CR24","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1007\/s00371-021-02261-9","volume":"38","author":"Z Hossein-Nejad","year":"2022","unstructured":"Hossein-Nejad, Z., Nasri, M.: Clustered redundant keypoint elimination method for image mosaicing using a new Gaussian-weighted blending algorithm. Vis. Comput. 38(6), 1991\u20132007 (2022). https:\/\/doi.org\/10.1007\/s00371-021-02261-9","journal-title":"Vis. Comput."},{"key":"2710_CR25","unstructured":"Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD\u2014new database for copy-move forgery detection. In: 55th Int. Symp. ELMAR, no. September 2013, pp. 25\u201327 (2013)"},{"key":"2710_CR26","doi-asserted-by":"publisher","unstructured":"Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database. In: 2013 IEEE China Summit Int. Conf. Signal Inf. Process. ChinaSIP 2013\u2014Proc., pp. 422\u2013426 (2013). https:\/\/doi.org\/10.1109\/ChinaSIP.2013.6625374","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"2710_CR27","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum, R., Ren, Y., Jay Kuo, C.C.: Image splicing localization using a multi-task fully convolutional network (MFCN). J. Vis. Commun. Image Represent. 51, 201\u2013209 (2018). https:\/\/doi.org\/10.1016\/j.jvcir.2018.01.010","journal-title":"J. Vis. Commun. Image Represent."},{"key":"2710_CR28","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.fcij.2018.03.001","volume":"3","author":"HA Alberry","year":"2018","unstructured":"Alberry, H.A., Hegazy, A.A., Salama, G.I.: A fast SIFT based method for copy move forgery detection. Futur. Comput. Inform. J. 3, 159\u2013165 (2018). https:\/\/doi.org\/10.1016\/j.fcij.2018.03.001","journal-title":"Futur. Comput. Inform. J."},{"key":"2710_CR29","doi-asserted-by":"publisher","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., Winkler, S.: COVERAGE\u2014a novel database for copy-move forgery detection. In: Proceedings\u2014International Conference on Image Processing, ICIP, 2016, vol. 2016. https:\/\/doi.org\/10.1109\/ICIP.2016.7532339","DOI":"10.1109\/ICIP.2016.7532339"},{"issue":"20","key":"2710_CR30","doi-asserted-by":"publisher","first-page":"30091","DOI":"10.1007\/s11042-020-10242-8","volume":"80","author":"D Gupta","year":"2021","unstructured":"Gupta, D., Choudhury, A., Gupta, U., Singh, P., Prasad, M.: Computational approach to clinical diagnosis of diabetes disease: a comparative study. Multimed. Tools Appl. 80(20), 30091\u201330116 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10242-8","journal-title":"Multimed. Tools Appl."},{"issue":"27\u201328","key":"2710_CR31","doi-asserted-by":"publisher","first-page":"19167","DOI":"10.1007\/s11042-020-08751-7","volume":"79","author":"MA Elaskily","year":"2020","unstructured":"Elaskily, M.A., et al.: A novel deep learning framework for copy-moveforgery detection in images. Multimed. Tools Appl. 79(27\u201328), 19167\u201319192 (2020). https:\/\/doi.org\/10.1007\/s11042-020-08751-7","journal-title":"Multimed. Tools Appl."},{"key":"2710_CR32","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1016\/j.jvcir.2022.103644","volume":"89","author":"S Kumar","year":"2022","unstructured":"Kumar, S., Gupta, S.K., Gupta, U., Kaur, M.: VI-NET: a hybrid deep convolutional neural network using VGG and inception V3 model for copy-move forgery classification. J. Vis. Commun. Image Represent. 89, 1036 (2022). https:\/\/doi.org\/10.1016\/j.jvcir.2022.103644","journal-title":"J. Vis. Commun. Image Represent."},{"key":"2710_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102481","volume":"52","author":"KB Meena","year":"2020","unstructured":"Meena, K.B., Tyagi, V.: A copy-move image forgery detection technique based on tetrolet transform. J. Inf. Secur. Appl. 52, 102481 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2020.102481","journal-title":"J. Inf. Secur. Appl."},{"key":"2710_CR34","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.cogsys.2019.12.005","volume":"61","author":"RK Kaliyar","year":"2020","unstructured":"Kaliyar, R.K., Goswami, A., Narang, P., Sinha, S.: FNDNet\u2014a deep convolutional neural network for fake news detection. Cogn. Syst. Res. 61, 32\u201344 (2020). https:\/\/doi.org\/10.1016\/j.cogsys.2019.12.005","journal-title":"Cogn. Syst. Res."},{"key":"2710_CR35","doi-asserted-by":"publisher","unstructured":"Abbas, M.N., Ansari, M.S., Asghar, M.N., Kanwal, N., O\u2019Neill, T., Lee, B.: Lightweight deep learning model for detection of copy-move image forgery with post-processed attacks (2021). https:\/\/doi.org\/10.1109\/SAMI50585.2021.9378690","DOI":"10.1109\/SAMI50585.2021.9378690"},{"issue":"10","key":"2710_CR36","doi-asserted-by":"publisher","first-page":"4704","DOI":"10.1109\/TIP.2016.2593340","volume":"25","author":"VA Krylov","year":"2016","unstructured":"Krylov, V.A., Moser, G., Serpico, S.B., Zerubia, J.: False discovery rate approach to unsupervised image change detection. IEEE Trans. Image Process. 25(10), 4704\u20134718 (2016). https:\/\/doi.org\/10.1109\/TIP.2016.2593340","journal-title":"IEEE Trans. Image Process."},{"key":"2710_CR37","unstructured":"\u201cCOMOFOD dataset repository,\u201d 2021, [Online]. https:\/\/www.vcl.fer.hr\/comofod\/."},{"issue":"4","key":"2710_CR38","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.jpor.2018.07.005","volume":"62","author":"P Lagouvardos","year":"2018","unstructured":"Lagouvardos, P., Spyropoulou, N., Polyzois, G.: Perceptibility and acceptability thresholds of simulated facial skin color differences. J. Prosthodont. Res. 62(4), 503\u2013508 (2018). https:\/\/doi.org\/10.1016\/j.jpor.2018.07.005","journal-title":"J. Prosthodont. Res."},{"issue":"1","key":"2710_CR39","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1504\/IJSISE.2018.090606","volume":"11","author":"M Dilshad Ansari","year":"2018","unstructured":"Dilshad Ansari, M., Prakash Ghrera, S.: Copy-move image forgery detection using direct fuzzy transform and ring projection. Int. J. Signal Imaging Syst. Eng. 11(1), 44\u201351 (2018). https:\/\/doi.org\/10.1504\/IJSISE.2018.090606","journal-title":"Int. J. Signal Imaging Syst. Eng."},{"key":"2710_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.03.154","author":"S Alamuru","year":"2021","unstructured":"Alamuru, S., Jain, S.: Video event classification using KNN classifier with hybrid features. Mater. Today Proc. (2021). https:\/\/doi.org\/10.1016\/j.matpr.2021.03.154","journal-title":"Mater. Today Proc."},{"issue":"9","key":"2710_CR41","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1167\/13.9.709","volume":"13","author":"L Barghout","year":"2013","unstructured":"Barghout, L., Sheynin, J.: Real-world scene perception and perceptual organization: lessons from computer vision. J. Vis. 13(9), 709 (2013). https:\/\/doi.org\/10.1167\/13.9.709","journal-title":"J. Vis."},{"issue":"3 PART 2","key":"2710_CR42","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3 PART 2), 1099\u20131110 (2011). https:\/\/doi.org\/10.1109\/TIFS.2011.2129512","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"2710_CR43","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015). https:\/\/doi.org\/10.1109\/TIFS.2014.2381872","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"2710_CR44","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284\u20132297 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2455334","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"2710_CR45","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun, C.M., Yuan, X.C., Bi, X.L.: Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans. Inf. Forensics Secur. 10(8), 1705\u20131716 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2423261","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2710_CR46","doi-asserted-by":"crossref","unstructured":"Sun, Y., Ni, R., Zhao, Y.: Nonoverlapping blocks based copy-move forgery detection. In: Security and Communication Networks, vol. 2018 (2018)","DOI":"10.1155\/2018\/1301290"},{"key":"2710_CR47","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","volume":"15","author":"JL Zhong","year":"2020","unstructured":"Zhong, J.L., Pun, C.M.: An end-to-end dense-InceptionNet for image copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 15, 2134\u20132146 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2957693","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2710_CR48","doi-asserted-by":"publisher","unstructured":"Amerini, I., Uricchio, T., Ballan, L., Caldelli, R.: Localization of JPEG double compression through multi-domain convolutional neural networks. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2017, vol. 2017-July. https:\/\/doi.org\/10.1109\/CVPRW.2017.233","DOI":"10.1109\/CVPRW.2017.233"},{"key":"2710_CR49","doi-asserted-by":"publisher","unstructured":"Bi, X., Wei, Y., Xiao, B., Li, W.: RRU-net: the ringed residual U-net for image splicing forgery detection. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2019, vol. 2019-June. https:\/\/doi.org\/10.1109\/CVPRW.2019.00010","DOI":"10.1109\/CVPRW.2019.00010"},{"issue":"2","key":"2710_CR50","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TCSVT.2014.2347513","volume":"25","author":"X Zhao","year":"2015","unstructured":"Zhao, X., Wang, S., Li, S., Li, J.: Passive image-splicing detection by a 2-D noncausal Markov model. IEEE Trans. Circuits Syst. Video Technol. 25(2), 185\u2013199 (2015). https:\/\/doi.org\/10.1109\/TCSVT.2014.2347513","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2710_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/978-1-61499-617-0-1","volume":"14","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Goh, J., Win, L.L., Thing, V.: Image region forgery detection: a deep learning approach. Cryptol. Inf. Secur. Ser. 14, 1\u201311 (2016). https:\/\/doi.org\/10.3233\/978-1-61499-617-0-1","journal-title":"Cryptol. Inf. Secur. Ser."},{"key":"2710_CR52","doi-asserted-by":"publisher","unstructured":"Bondi, L., Lameri, S., Guera, D., Bestagini, P., Delp, E.J., Tubaro, S.: Tampering detection and localization through clustering of camera-based CNN features. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2017, vol. 2017-July. https:\/\/doi.org\/10.1109\/CVPRW.2017.232","DOI":"10.1109\/CVPRW.2017.232"},{"key":"2710_CR53","doi-asserted-by":"publisher","unstructured":"Kumar, S., Gupta, S.K.: A robust copy move forgery classification using end to end convolution neural network. In: ICRITO 2020\u2014IEEE 8th Int. Conf. Reliab. Infocom Technol. Optim. (Trends Futur. Dir.), pp. 253\u2013258 (2020). https:\/\/doi.org\/10.1109\/ICRITO48877.2020.9197955","DOI":"10.1109\/ICRITO48877.2020.9197955"},{"key":"2710_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2019.12.001","author":"A Alharbi","year":"2020","unstructured":"Alharbi, A., Alhakami, W., Bourouis, S., Najar, F., Bouguila, N.: Inpainting forgery detection using hybrid generative\/discriminative approach based on bounded generalized Gaussian mixture model. Appl. Comput. Inform. (2020). https:\/\/doi.org\/10.1016\/j.aci.2019.12.001","journal-title":"Appl. Comput. Inform."},{"issue":"3","key":"2710_CR55","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11760-017-1191-7","volume":"12","author":"VT Manu","year":"2018","unstructured":"Manu, V.T., Mehtre, B.M.: Copy-move tampering detection using affine transformation property preservation on clustered keypoints. Signal Image Video Process. 12(3), 549\u2013556 (2018). https:\/\/doi.org\/10.1007\/s11760-017-1191-7","journal-title":"Signal Image Video Process."},{"key":"2710_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106728","volume":"97","author":"H Kasban","year":"2020","unstructured":"Kasban, H., Nassar, S.: An efficient approach for forgery detection in digital images using Hilbert\u2013Huang transform. Appl. Soft Comput. J. 97, 106728 (2020). https:\/\/doi.org\/10.1016\/j.asoc.2020.106728","journal-title":"Appl. Soft Comput. J."},{"key":"2710_CR57","doi-asserted-by":"crossref","unstructured":"Kaur, R., Kaur, A.: Copy-move forgery detection using ORB and SIFT detector. Int. J. Eng. Dev. Res. 4(4) (2016)","DOI":"10.17577\/IJERTV4IS100191"},{"key":"2710_CR58","doi-asserted-by":"publisher","unstructured":"Yeap, Y.Y., Sheikh, U., Rahman, A.A.H.A.: Image forensic for digital image copy move forgery detection. In: Proc.\u20142018 IEEE 14th Int. Colloq. Signal Process. Its Appl. CSPA 2018, pp. 239\u2013244 (2018). https:\/\/doi.org\/10.1109\/CSPA.2018.8368719","DOI":"10.1109\/CSPA.2018.8368719"},{"key":"2710_CR59","doi-asserted-by":"publisher","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 1053\u20131061 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00116","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"2","key":"2710_CR60","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00530-021-00801-w","volume":"28","author":"H Chen","year":"2022","unstructured":"Chen, H., Chang, C., Shi, Z., Lyu, Y.: Hybrid features and semantic reinforcement network for image forgery detection. Multimed. Syst. 28(2), 363\u2013374 (2022). https:\/\/doi.org\/10.1007\/s00530-021-00801-w","journal-title":"Multimed. Syst."},{"issue":"5","key":"2710_CR61","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara, P., Bianchi, T., De Rosa, A., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7(5), 1566\u20131577 (2012). https:\/\/doi.org\/10.1109\/TIFS.2012.2202227","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02710-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-022-02710-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02710-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T03:45:11Z","timestamp":1728272711000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-022-02710-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,2]]},"references-count":61,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["2710"],"URL":"https:\/\/doi.org\/10.1007\/s00371-022-02710-z","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,2]]},"assertion":[{"value":"16 October 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or nonfinancial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}