{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:18:56Z","timestamp":1776442736674,"version":"3.51.2"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T00:00:00Z","timestamp":1628726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T00:00:00Z","timestamp":1628726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["NO.2018YFC1604000"],"award-info":[{"award-number":["NO.2018YFC1604000"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s00521-021-06329-4","type":"journal-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T15:02:47Z","timestamp":1628780567000},"page":"5015-5031","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["DCU-Net: a dual-channel U-shaped network for image splicing forgery detection"],"prefix":"10.1007","volume":"35","author":[{"given":"Hongwei","family":"Ding","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leiyang","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qi","family":"Tao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhongwang","family":"Fu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liang","family":"Dong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaohui","family":"Cui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,8,12]]},"reference":[{"issue":"4","key":"6329_CR1","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1007\/s11042-016-3795-2","volume":"76","author":"M Zampoglou","year":"2017","unstructured":"Zampoglou M, Papadopoulos S, Kompatsiaris Y (2017) Large-scale evaluation of splicing localization algorithms for web images. Multimedia Tools Appl 76(4):4801\u20134834","journal-title":"Multimed Tools Appl"},{"issue":"04","key":"6329_CR2","first-page":"2395","volume":"2","author":"RM Joseph","year":"2015","unstructured":"Joseph RM, Chithra AS (2015) Literature survey on image manipulation detection. Int Res J Eng Technol (IRJET) 2(04):2395\u20130056","journal-title":"Int Res J Eng Technol (IRJET)"},{"issue":"11","key":"6329_CR3","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6329_CR4","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: detecting copy-move image forgery with source\/target localization. In: Proceedings of the European conference on computer vision (ECCV). pp 168\u2013184","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"6329_CR5","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2017) Deep matching and validation network: an end-to-end solution to constrained image splicing localization and detection. In: Proceedings of the 25th ACM international conference on multimedia. pp 1480\u20131502","DOI":"10.1145\/3123266.3123411"},{"key":"6329_CR6","doi-asserted-by":"crossref","unstructured":"Huh M, Liu A, Owens A, Efros AA (2018) Fighting fake news: Image splice detection via learned self-consistency. In: Proceedings of the European conference on computer vision (ECCV). pp 101\u2013117","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"6329_CR7","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.image.2018.05.015","volume":"67","author":"X Zhu","year":"2018","unstructured":"Zhu X, Qian Y, Zhao X, Sun B, Sun Y (2018) A deep learning approach to patch-based image inpainting forensics. Signal Process Image Commun 67:90\u201399","journal-title":"Signal Process Image Commun"},{"key":"6329_CR8","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 1053\u20131061","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"7","key":"6329_CR9","doi-asserted-by":"publisher","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","volume":"28","author":"JH Bappyl","year":"2019","unstructured":"Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid lstm and encoder-decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286\u20133300","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"6329_CR10","doi-asserted-by":"publisher","first-page":"4783","DOI":"10.1007\/s11042-016-3712-8","volume":"76","author":"H Zeng","year":"2017","unstructured":"Zeng H, Zhan Y, Kang X, Lin X (2017) Image splicing localization using pca-based noise level estimation. Multimed Tools Appl 76(4):4783\u20134799","journal-title":"Multimed Tools Appl"},{"issue":"14","key":"6329_CR11","doi-asserted-by":"publisher","first-page":"8695","DOI":"10.1007\/s11042-015-2786-z","volume":"75","author":"O Benrhouma","year":"2016","unstructured":"Benrhouma O, Hermassi H, El-Latif Ahmed AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695\u20138718","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"6329_CR12","doi-asserted-by":"publisher","first-page":"12457","DOI":"10.1007\/s11042-016-3660-3","volume":"76","author":"H Yao","year":"2017","unstructured":"Yao H, Wang S, Zhang X, Qin C, Wang J (2017) Detecting image splicing based on noise level inconsistency. Multimed Tools Appl 76(10):12457\u201312479","journal-title":"Multimed Tools Appl"},{"key":"6329_CR13","doi-asserted-by":"crossref","unstructured":"Liu B, Pun CM (2017) Multi-object splicing forgery detection using noise level difference. In: 2017 IEEE conference on dependable and secure computing. IEEE, pp 533\u2013534","DOI":"10.1109\/DESEC.2017.8073884"},{"key":"6329_CR14","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.image.2018.07.012","volume":"68","author":"N Zhu","year":"2018","unstructured":"Zhu N, Li Z (2018) Blind image splicing detection via noise level function. Signal Process Image Commun 68:181\u2013192","journal-title":"Signal Process Image Commun"},{"key":"6329_CR15","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhao C, Pi Y, Li S (2012) Revealing image splicing forgery using local binary patterns of dct coefficients. In: Communications, signal processing, and systems. Springer, New York, pp 181\u2013189","DOI":"10.1007\/978-1-4614-5803-6_19"},{"issue":"1","key":"6329_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11760-016-0899-0","volume":"11","author":"A Alahmadi","year":"2017","unstructured":"Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using dct and local binary pattern. Signal Image Video Process 11(1):81\u201388","journal-title":"Signal Image Video Process"},{"key":"6329_CR17","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.jvcir.2016.07.013","volume":"40","author":"Q Zhang","year":"2016","unstructured":"Zhang Q, Wei L, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449\u2013458","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"6329_CR18","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s00138-018-0911-5","volume":"29","author":"G Han Jong","year":"2018","unstructured":"Han Jong G, Park Tae H, Moon YH, Eom Il K (2018) Quantization-based markov feature extraction method for image splicing detection. Mach Vis Appl 29(3):543\u2013552","journal-title":"Mach Vis Appl"},{"key":"6329_CR19","doi-asserted-by":"crossref","unstructured":"Zhao X, Li J, Li S, Wang S (2010) Detecting digital image splicing in chroma spaces. In: International workshop on digital watermarking. Springer,   pp 12\u201322","DOI":"10.1007\/978-3-642-18405-5_2"},{"key":"6329_CR20","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.jvcir.2017.08.011","volume":"49","author":"B Chen","year":"2017","unstructured":"Chen B, Qi X, Sun X, Shi YQ (2017) Quaternion pseudo-zernike moments combining both of rgb information and depth information for color image splicing detection. J Vis Commun Image Represent 49:283\u2013290","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"6329_CR21","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1007\/s10489-013-0430-z","volume":"39","author":"Q Liu","year":"2013","unstructured":"Liu Q, Cooper Peter A, Chen L, Cho H, Chen Z, Qiao M, Yuting S, Wei M, Sung AH (2013) Detection of jpeg double compression and identification of smartphone image source and post-capture manipulation. Appl Intell 39(4):705\u2013726","journal-title":"Appl Intell"},{"key":"6329_CR22","first-page":"1","volume":"1","author":"V Mire Archana","year":"2018","unstructured":"Mire Archana V, Dhok Sanjay B, Mistry Narendra J, Porey Prakash D (2018) Automated approach for splicing detection using first digit probability distribution features. EURASIP J Image Video Process 2018(1):1\u201311","journal-title":"EURASIP J Image Video Process"},{"key":"6329_CR23","doi-asserted-by":"crossref","unstructured":"Amerini I, Becarelli R, Caldelli R, Mastio AD (2014) Splicing forgeries localization through the use of first digit features. In: 2014 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 143\u2013148","DOI":"10.1109\/WIFS.2014.7084318"},{"key":"6329_CR24","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.jvcir.2018.05.011","volume":"54","author":"C Iakovidou","year":"2018","unstructured":"Iakovidou C, Zampoglou M, Papadopoulos S, Kompatsiaris Y (2018) Content-aware detection of jpeg grid inconsistencies for intuitive image forensics. J Vis Commun Image Represent 54:155\u2013170","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"6329_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Y Zhao","year":"2012","unstructured":"Zhao Y, Wang S, Zhang X, Yao H (2012) Robust hashing for image authentication using zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55\u201363","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"6329_CR26","doi-asserted-by":"publisher","first-page":"2491","DOI":"10.1109\/TIP.2009.2028251","volume":"18","author":"M Tagliasacchi","year":"2009","unstructured":"Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491\u20132504","journal-title":"IEEE Trans Image Process"},{"key":"6329_CR27","doi-asserted-by":"crossref","unstructured":"Wang W, Dong J, Tan T (2009) Effective image splicing detection based on image chroma. In: 2009 16th IEEE international conference on image processing (ICIP). IEEE, pp 1257\u20131260","DOI":"10.1109\/ICIP.2009.5413549"},{"key":"6329_CR28","doi-asserted-by":"crossref","unstructured":"Ye S, Sun Q, Chang EC (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: 2007 IEEE international conference on multimedia and expo. IEEE,  pp 12\u201315","DOI":"10.1109\/ICME.2007.4284574"},{"issue":"7","key":"6329_CR29","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1109\/TIFS.2015.2407698","volume":"10","author":"X Wang","year":"2015","unstructured":"Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Trans Inf Forensics Secur 10(7):1336\u20131349","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6329_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138","volume":"171","author":"D Vasan","year":"2020","unstructured":"Vasan D, Alazab M, Wassan S, Naeem H, Safaei B, Zheng Q (2020) Imcfn: image-based malware classification using fine-tuned convolutional neural network architecture. Comput Netw 171:107138","journal-title":"Comput Netw"},{"key":"6329_CR31","doi-asserted-by":"crossref","unstructured":"Gadekallu TR, Rajput DS, Reddy MPK, Lakshmanna K, Bhattacharya S, Singh S, Jolfaei A, Alazab M (2020) A novel pca\u2013whale optimization-based deep neural network model for classification of tomato plant diseases using gpu. J Real-Time Image Process. pp 1\u201314","DOI":"10.1007\/s11554-020-00987-8"},{"key":"6329_CR32","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.neunet.2019.07.001","volume":"119","author":"W Li","year":"2019","unstructured":"Li W, Ding W, Sadasivam Ra, Cui X, Chen P (2019) His-gan: a histogram-based gan model to improve data generation quality. Neural Netw 119:31\u201345","journal-title":"Neural Networks"},{"key":"6329_CR33","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.neucom.2020.12.001","volume":"431","author":"W Li","year":"2021","unstructured":"Li W, Linchuan X, Liang Z, Wang S, Cao J, Lam TC, Cui X (2021) Jdgan: enhancing generator on extremely limited data via joint distribution. Neurocomputing 431:148\u2013162","journal-title":"Neurocomputing"},{"key":"6329_CR34","volume":"65","author":"Bhattacharya Sweta","year":"2020","unstructured":"Bhattacharya S, Maddikunta PKR, Pham QV, Gadekallu TR, Chowdhary CL, Alazab M, Piran MJ et al (2020) Deep learning and medical image processing for coronavirus (covid-19) pandemic: a survey. Sustain Cities Soc 65:102589","journal-title":"Sustainable cities and society"},{"key":"6329_CR35","doi-asserted-by":"crossref","unstructured":"Sedik A, Hammad M, El-Samie FEA, Gupta BB, El-Latif AAA (2021) Efficient deep learning approach for augmented detection of coronavirus disease. Neural Comput Appl 1\u201318","DOI":"10.1007\/s00521-020-05410-8"},{"key":"6329_CR36","doi-asserted-by":"crossref","unstructured":"Alghamdi A, Hammad M, Ugail H, Abdel-Raheem A, Muhammad K, Khalifa HS, El-Latif AAA (2020) Detection of myocardial infarction based on novel deep transfer learning methods for urban healthcare in smart cities. Multimed Tools Applications. pp 1\u201322","DOI":"10.1007\/s11042-020-08769-x"},{"key":"6329_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2020.3033072","volume":"70","author":"M Hammad","year":"2020","unstructured":"Hammad M, Iliyasu AM Subasi A, Ho Edmond SL, El-Latif Ahmed AA (2020) A multitier deep learning model for arrhythmia detection. IEEE Trans Instrum Meas 70:1\u20139","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"6329_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105489","volume":"81","author":"Li Wei","year":"2019","unstructured":"Li W, Liu X, Liu J, Chen P, Wan S, Cui X (2019) On improving the accuracy with auto-encoder on conjunctivitis. Appl Soft Comput 81:105489","journal-title":"Applied Soft Computing"},{"key":"6329_CR39","doi-asserted-by":"crossref","unstructured":"Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 9543\u20139552","DOI":"10.1109\/CVPR.2019.00977"},{"key":"6329_CR40","doi-asserted-by":"crossref","unstructured":"Horv\u00e1th J, Montserrat DM, Hao H, Delp EJ (2020) Manipulation detection in satellite images using deep belief networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops. pp 664\u2013665","DOI":"10.1109\/CVPRW50498.2020.00340"},{"key":"6329_CR41","doi-asserted-by":"publisher","first-page":"17174","DOI":"10.1109\/ACCESS.2019.2894981","volume":"7","author":"Shan Wuyang","year":"2019","unstructured":"Shan W, Yi Y, Qiu J, Yin A (2019) Robust median filtering forensics using image deblocking and filtered residual fusion. IEEE Access 7:17174\u201317183","journal-title":"IEEE Access"},{"key":"6329_CR42","doi-asserted-by":"crossref","unstructured":"Bappy Jawadul\u00a0H, Roy-Chowdhury AK, Bunk J, Nataraj L, Manjunath BS (2017) Exploiting spatial structure for localizing manipulated image regions. In: Proceedings of the IEEE international conference on computer vision. pp 4970\u20134979","DOI":"10.1109\/ICCV.2017.532"},{"key":"6329_CR43","doi-asserted-by":"crossref","unstructured":"Yang C, Li H, Lin F, Jiang B, Zhao H (2020) Constrained r-cnn: a general image manipulation detection model. In: 2020 IEEE International conference on multimedia and expo (ICME). IEEE, pp 1\u20136","DOI":"10.1109\/ICME46284.2020.9102825"},{"key":"6329_CR44","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.ins.2019.09.038","volume":"511","author":"Xiao Bin","year":"2020","unstructured":"Xiao B, Wei Y, Bi X, Li W, Ma J (2020) Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Inf Sci 511:172\u2013191","journal-title":"Information Sciences"},{"key":"6329_CR45","doi-asserted-by":"crossref","unstructured":"Cun X, Pun CM (2018)  Image splicing localization via semi-global network and fully connected conditional random fields. In: Proceedings of the European conference on computer vision (ECCV)","DOI":"10.1007\/978-3-030-11012-3_22"},{"key":"6329_CR46","doi-asserted-by":"crossref","unstructured":"Bi X, Wei Y, Xiao B, Li W (2019) Rru-net: the ringed residual u-net for image splicing forgery detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"6329_CR47","doi-asserted-by":"crossref","unstructured":"Zhang R, Ni J (2020) A dense u-net with cross-layer intersection for detection and localization of image forgery. In: ICASSP 2020-2020 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2982\u20132986","DOI":"10.1109\/ICASSP40776.2020.9054068"},{"key":"6329_CR48","doi-asserted-by":"crossref","unstructured":"El\u00a0Biach FZ, Iala I, Laanaya H, Minaoui K (2021) Encoder-decoder based convolutional neural networks for image forgery detection. Multimed Tools Appl 1\u201318","DOI":"10.1109\/ICDS53782.2021.9626750"},{"key":"6329_CR49","doi-asserted-by":"crossref","unstructured":"Rao Y, Ni J, Xie H (2021) Multi-semantic crf-based attention model for image forgery detection and localization. Signal Process 108051","DOI":"10.1016\/j.sigpro.2021.108051"},{"key":"6329_CR50","unstructured":"Bi X, Liu Y, Xiao B, Li W, Pun CM, Wang G, Gao X (2020) D-unet: a dual-encoder u-net for image splicing forgery detection and localization. arXiv preprint arXiv:2012.01821"},{"key":"6329_CR51","doi-asserted-by":"crossref","unstructured":"Wu Y, AbdAlmageed W, Natarajan P (2019) ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"6329_CR52","unstructured":"Kr\u00e4henb\u00fchl P, Koltun V (2011) Efficient inference in fully connected crfs with gaussian edge potentials. In: Advances in neural information processing systems. pp 109\u2013117"},{"key":"6329_CR53","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Verdoliva L (2017) Single-image splicing localization through autoencoder-based anomaly detection. In: 2016 IEEE International workshop on information forensics and security (WIFS)","DOI":"10.1109\/WIFS.2016.7823921"},{"key":"6329_CR54","doi-asserted-by":"crossref","unstructured":"Verdoliva L, Cozzolino D, Poggi G (2015) A feature-based approach for image tampering detection and localization. In: IEEE workshop on information forensics and security","DOI":"10.1109\/WIFS.2014.7084319"},{"key":"6329_CR55","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation. In: International conference on medical image computing and computer-assisted interventio. Springer, New York, pp 234\u2013241","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"6329_CR56","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"6329_CR57","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"4","key":"6329_CR58","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"Chen Liang-Chieh","year":"2017","unstructured":"Chen LC, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2017) Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans. Pattern Anal Mach Intell 40(4), 834\u2013848","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"6329_CR59","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. IEEE, pp 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"6329_CR60","doi-asserted-by":"crossref","unstructured":"Hsu YF, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE international conference on multimedia and expo. IEEE, pp 549\u2013552","DOI":"10.1109\/ICME.2006.262447"},{"issue":"3","key":"6329_CR61","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"Bianchi Tiziano","year":"2012","unstructured":"Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inf Forensics Secur 7(3):1003\u20131017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6329_CR62","doi-asserted-by":"crossref","unstructured":"Dirik AE, Memon N (2009) Image tamper detection based on demosaicing artifacts. In: 2009 16th IEEE international conference on image processing (ICIP). IEEE, pp 1497\u20131500","DOI":"10.1109\/ICIP.2009.5414611"},{"key":"6329_CR63","doi-asserted-by":"crossref","unstructured":"Long J, Shelhamer E, Darrell T (2015) Fully convolutional networks for semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 3431\u20133440","DOI":"10.1109\/CVPR.2015.7298965"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06329-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-06329-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06329-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T09:42:31Z","timestamp":1744191751000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-06329-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,12]]},"references-count":63,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["6329"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-06329-4","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,12]]},"assertion":[{"value":"20 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}