{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:23:31Z","timestamp":1759332211415,"version":"3.37.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s00521-024-10804-z","type":"journal-article","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T17:59:12Z","timestamp":1735408752000},"page":"4989-5004","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DNN-STACK: a stacking technique based on deep neural network for detecting copy-move forgery"],"prefix":"10.1007","volume":"37","author":[{"given":"G.","family":"Krishnalal","sequence":"first","affiliation":[]},{"given":"V. P.","family":"Jagathy Raj","sequence":"additional","affiliation":[]},{"given":"G.","family":"Madhu","sequence":"additional","affiliation":[]},{"given":"K. S.","family":"Arun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,28]]},"reference":[{"key":"10804_CR1","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.eswa.2017.05.044","volume":"85","author":"DC Jeronymo","year":"2017","unstructured":"Jeronymo DC, Borges YCC, Santos Coelho L (2017) Image forgery detection by semi-automatic wavelet soft-thresholding with error level analysis. Expert Syst Appl 85:348\u2013356","journal-title":"Expert Syst Appl"},{"key":"10804_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.eswa.2019.04.036","volume":"131","author":"E Odaba\u015f Y\u0131ld\u0131r\u0131m","year":"2019","unstructured":"Odaba\u015f Y\u0131ld\u0131r\u0131m E, Uluta\u015f G (2019) Augmented features to detect image splicing on SWT domain. Expert Syst Appl 131:81\u201393. https:\/\/doi.org\/10.1016\/j.eswa.2019.04.036","journal-title":"Expert Syst Appl"},{"issue":"2","key":"10804_CR3","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.eswa.2012.08.002","volume":"40","author":"J-M Guo","year":"2013","unstructured":"Guo J-M, Liu Y-F, Wu Z-J (2013) Duplication forgery detection using improved daisy descriptor. Expert Syst Appl 40(2):707\u2013714. https:\/\/doi.org\/10.1016\/j.eswa.2012.08.002","journal-title":"Expert Syst Appl"},{"issue":"2","key":"10804_CR4","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/s41019-018-0063-7","volume":"3","author":"KS Arun","year":"2018","unstructured":"Arun KS, Govindan VK (2018) A hybrid deep learning architecture for latent topic-based image retrieval. Data Sci Eng 3(2):166\u2013195","journal-title":"Data Sci Eng"},{"key":"10804_CR5","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1007\/s10462-019-09715-6","volume":"53","author":"KS Arun","year":"2019","unstructured":"Arun KS, Govindan VK, Kumar SDM (2019) Enhanced bag of visual words representations for content based image retrieval: a comparative study. Artif Intel Rev 53:1615","journal-title":"Artif Intel Rev"},{"key":"10804_CR6","first-page":"15573","volume":"79","author":"E Baykal","year":"2019","unstructured":"Baykal E, Dogan H, Ercin ME, Ersoz S, Ekinci M (2019) Transfer learning with pre-trained deep convolutional neural networks for serous cell classification. Multim Tools Appl 79:15573","journal-title":"Multim Tools Appl"},{"key":"10804_CR7","doi-asserted-by":"crossref","unstructured":"Dietterich TG (2000) Ensemble methods in machine learning. In: International workshop on multiple classifier systems, pp 1\u201315 . Springer","DOI":"10.1007\/3-540-45014-9_1"},{"issue":"2","key":"10804_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3054925","volume":"50","author":"HM Gomes","year":"2017","unstructured":"Gomes HM, Barddal JP, Enembreck F, Bifet A (2017) A survey on ensemble learning for data stream classification. ACM Comput Surv (CSUR) 50(2):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"10804_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16\u201332","journal-title":"J Vis Commun Image Represent"},{"key":"10804_CR10","doi-asserted-by":"crossref","unstructured":"Karsh RK, Das A, Swetha GL, Medhi A, Laskar RH, Arya U, Agarwal RK (2016) Copy-move forgery detection using asift. In: 2016 1st India international conference on information processing (IICIP), pp 1\u20135. IEEE","DOI":"10.1109\/IICIP.2016.7975329"},{"key":"10804_CR11","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2015.03.009","volume":"321","author":"J-C Lee","year":"2015","unstructured":"Lee J-C, Chang C-P, Chen W-K (2015) Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci 321:250\u2013262","journal-title":"Inf Sci"},{"issue":"10","key":"10804_CR12","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Security 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"11","key":"10804_CR13","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensics Security 10(11):2284\u20132297","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"3","key":"10804_CR14","first-page":"507","volume":"10","author":"J Li","year":"2014","unstructured":"Li J, Li X, Yang B, Sun X (2014) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Security 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"8","key":"10804_CR15","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"C-M Pun","year":"2015","unstructured":"Pun C-M, Yuan X-C, Bi X-L (2015) Image forgery detection using adaptive over segmentation and feature point matching. IEEE Trans Inf Forensics Security 10(8):1705\u20131716","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"10804_CR16","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.jvcir.2015.07.007","volume":"31","author":"J-C Lee","year":"2015","unstructured":"Lee J-C (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320\u2013334","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"10804_CR17","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/CC.2016.7405711","volume":"13","author":"S Wenchang","year":"2016","unstructured":"Wenchang S, Fei Z, Bo Q, Bin L (2016) Improving image copy-move forgery detection with particle swarm optimization techniques. China Commun 13(1):139\u2013149","journal-title":"China Commun"},{"issue":"11","key":"10804_CR18","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Security 11(11):2499\u20132512","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"10","key":"10804_CR19","doi-asserted-by":"publisher","first-page":"4729","DOI":"10.1109\/TIP.2016.2593583","volume":"25","author":"A Ferreira","year":"2016","unstructured":"Ferreira A, Felipussi SC, Alfaro C, Fonseca P, Vargas-Munoz JE, Santos JA, Rocha A (2016) Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans Image Process 25(10):4729\u20134742","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"10804_CR20","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1016\/j.aeue.2016.05.005","volume":"70","author":"B Ustubioglu","year":"2016","unstructured":"Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. AEU-Int J Electron Commun 70(8):1076\u20131087","journal-title":"AEU-Int J Electron Commun"},{"issue":"22","key":"10804_CR21","doi-asserted-by":"publisher","first-page":"23353","DOI":"10.1007\/s11042-016-4140-5","volume":"76","author":"X-Y Wang","year":"2017","unstructured":"Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z-L (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multim Tools Appl 76(22):23353\u201323382","journal-title":"Multim Tools Appl"},{"issue":"24","key":"10804_CR22","doi-asserted-by":"publisher","first-page":"16881","DOI":"10.1007\/s11042-015-2961-2","volume":"75","author":"D Tralic","year":"2016","unstructured":"Tralic D, Grgic S, Sun X, Rosin PL (2016) Combining cellular automata and local binary patterns for copy-move forgery detection. Multim Tools Appl 75(24):16881\u201316903","journal-title":"Multim Tools Appl"},{"issue":"1","key":"10804_CR23","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1007\/s11042-016-4289-y","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang B, Sun X, Guo H, Xia Z, Chen X (2018) A copy-move forgery detection method based on CMFD-sift. Multim Tools Appl 77(1):837\u2013855","journal-title":"Multim Tools Appl"},{"issue":"10","key":"10804_CR24","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.3390\/sym11101280","volume":"11","author":"Y Abdalla","year":"2019","unstructured":"Abdalla Y, Iqbal MT, Shehata M (2019) Convolutional neural network for copy-move forgery detection. Symmetry 11(10):1280","journal-title":"Symmetry"},{"issue":"14","key":"10804_CR25","doi-asserted-by":"publisher","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","volume":"77","author":"Y Liu","year":"2018","unstructured":"Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multim Tools Appl 77(14):18269\u201318293","journal-title":"Multim Tools Appl"},{"issue":"11","key":"10804_CR26","doi-asserted-by":"publisher","first-page":"15353","DOI":"10.1007\/s11042-018-6891-7","volume":"78","author":"MA Elaskily","year":"2019","unstructured":"Elaskily MA, Elnemr HA, Dessouky MM, Faragallah OS (2019) Two stages object recognition based copy-move forgery detection algorithm. Multim Tools Appl 78(11):15353\u201315373","journal-title":"Multim Tools Appl"},{"key":"10804_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110508","volume":"269","author":"B Chaitra","year":"2023","unstructured":"Chaitra B, Reddy PB (2023) An approach for copy-move image multiple forgery detection based on an optimized pre-trained deep learning model. Knowl Based Syst 269:110508","journal-title":"Knowl Based Syst"},{"key":"10804_CR28","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","volume":"15","author":"J-L Zhong","year":"2019","unstructured":"Zhong J-L, Pun C-M (2019) An end-to-end dense-inceptionnet for image copy-move forgery detection. IEEE Trans Inf Forensics Security 15:2134\u20132146","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"10","key":"10804_CR29","doi-asserted-by":"publisher","first-page":"6714","DOI":"10.1109\/TII.2020.2982705","volume":"16","author":"Y Zhu","year":"2020","unstructured":"Zhu Y, Chen C, Yan G, Guo Y, Dong Y (2020) Ar-net: adaptive attention and residual refinement network for copy-move forgery detection. IEEE Trans Ind Inf 16(10):6714\u20136723","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"10804_CR30","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M et al (2015) Imagenet large scale visual recognition challenge. Int J Comput Vis 115(3):211\u2013252","journal-title":"Int J Comput Vis"},{"key":"10804_CR31","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp 248\u2013255 . Ieee","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"10804_CR32","unstructured":"Larsson G, Maire M, Shakhnarovich G, et al (2017) Ultra-deep neural networks without residuals. In: Int. Conf. on Learning Representations, arXiv, Toulon, France, p 1605"},{"key":"10804_CR33","doi-asserted-by":"crossref","unstructured":"Xie S, Girshick R, Doll\u00e1r P, Tu Z, He K (2017) Aggregated residual transformations for deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1492\u20131500","DOI":"10.1109\/CVPR.2017.634"},{"key":"10804_CR34","doi-asserted-by":"crossref","unstructured":"Zagoruyko S, Komodakis N (2016) Wide residual networks. arXiv preprint arXiv:1605.07146","DOI":"10.5244\/C.30.87"},{"key":"10804_CR35","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"10804_CR36","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee J-Y, Kweon IS (2018) Cbam: convolutional block attention module. In: Proceedings of the European conference on computer vision (ECCV), pp 3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"issue":"6","key":"10804_CR37","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"10804_CR38","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Security 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"6","key":"10804_CR39","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Security 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Security"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10804-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-10804-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10804-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T19:34:58Z","timestamp":1739043298000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-10804-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,28]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10804"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-10804-z","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2024,12,28]]},"assertion":[{"value":"10 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}