{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T12:32:20Z","timestamp":1769603540590,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,21]],"date-time":"2024-04-21T00:00:00Z","timestamp":1713657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,21]],"date-time":"2024-04-21T00:00:00Z","timestamp":1713657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00530-024-01336-6","type":"journal-article","created":{"date-parts":[[2024,4,21]],"date-time":"2024-04-21T16:01:30Z","timestamp":1713715290000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Deep Learning-based forgery detection and localization for compressed images using a hybrid optimization model"],"prefix":"10.1007","volume":"30","author":[{"given":"Arundhati","family":"Bhowal","sequence":"first","affiliation":[]},{"given":"Sarmistha","family":"Neogy","sequence":"additional","affiliation":[]},{"given":"Ruchira","family":"Naskar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,21]]},"reference":[{"key":"1336_CR1","doi-asserted-by":"publisher","first-page":"32037","DOI":"10.1007\/s11042-020-09275-w","volume":"79","author":"N Kaur","year":"2020","unstructured":"Kaur, N., Jindal, N., Singh, K.: A passive approach for the detection of splicing forgery in digital images. Multimed. Tools Appl. 79, 32037\u201332063 (2020)","journal-title":"Multimed. Tools Appl."},{"issue":"9","key":"1336_CR2","doi-asserted-by":"publisher","first-page":"1500","DOI":"10.3390\/electronics9091500","volume":"9","author":"MM Islam","year":"2020","unstructured":"Islam, M.M., Karmakar, G., Kamruzzaman, J., Murshed, M.: A robust forgery detection method for copy-move and splicing attacks in images. Electronics 9(9), 1500 (2020)","journal-title":"Electronics"},{"issue":"11","key":"1336_CR3","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.3390\/sym12111811","volume":"12","author":"S Bourouis","year":"2020","unstructured":"Bourouis, S., Alroobaea, R., Alharbi, A.M., Andejany, M., Rubaiee, S.: Recent advances in digital multimedia tampering detection for forensics analysis. Symmetry 12(11), 1811 (2020)","journal-title":"Symmetry"},{"key":"1336_CR4","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/s11045-019-00688-x","volume":"31","author":"X-Y Wang","year":"2020","unstructured":"Wang, X.-Y., Wang, C., Wang, L., Jiao, L.-X., Yang, H.-Y., Niu, P.-P.: A fast and high accurate image copy-move forgery detection approach. Multidimens. Syst. Signal Process. 31, 857\u2013883 (2020)","journal-title":"Multidimens. Syst. Signal Process."},{"key":"1336_CR5","doi-asserted-by":"crossref","unstructured":"Sujin, J., Sophia, S.: Copy-move geometric tampering estimation through enhanced sift detector method. Comput. Syst. Sci. Eng. 44(1) (2023)","DOI":"10.32604\/csse.2023.023747"},{"issue":"1","key":"1336_CR6","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4018\/IJSE.2019010103","volume":"10","author":"S Singhania","year":"2019","unstructured":"Singhania, S., Arju, N., Singh, R.: Image tampering detection using convolutional neural network. Int. J. Synth. Emot. (IJSE) 10(1), 54\u201363 (2019)","journal-title":"Int. J. Synth. Emot. (IJSE)"},{"key":"1336_CR7","doi-asserted-by":"crossref","unstructured":"Guillaro, F., Cozzolino, D., Sud, A., Dufour, N., Verdoliva, L.: Trufor: Leveraging all-round clues for trustworthy image forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20606\u201320615 (2023)","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"1336_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2020.110311","volume":"312","author":"R Thakur","year":"2020","unstructured":"Thakur, R., Rohilla, R.: Recent advances in digital image manipulation detection techniques: a brief review. Foren. Sci. Int. 312, 110311 (2020)","journal-title":"Foren. Sci. Int."},{"issue":"5","key":"1336_CR9","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1080\/00450618.2018.1424241","volume":"51","author":"S Walia","year":"2019","unstructured":"Walia, S., Kumar, K.: Digital image forgery detection: a systematic scrutiny. Aust. J. Foren. Sci. 51(5), 488\u2013526 (2019)","journal-title":"Aust. J. Foren. Sci."},{"key":"1336_CR10","doi-asserted-by":"crossref","unstructured":"Wang, M., Fu, X., Liu, J., Zha, Z.-J.: Jpeg compression-aware image forgery localization. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 5871\u20135879 (2022)","DOI":"10.1145\/3503161.3547749"},{"issue":"3","key":"1336_CR11","doi-asserted-by":"publisher","first-page":"855","DOI":"10.3390\/s22030855","volume":"22","author":"P Trojovsk\u1ef3","year":"2022","unstructured":"Trojovsk\u1ef3, P., Dehghani, M.: Pelican optimization algorithm: a novel nature-inspired algorithm for engineering applications. Sensors 22(3), 855 (2022)","journal-title":"Sensors"},{"issue":"11","key":"1336_CR12","doi-asserted-by":"publisher","first-page":"13043","DOI":"10.1007\/s10489-021-03155-y","volume":"52","author":"Y Che","year":"2022","unstructured":"Che, Y., He, D.: An enhanced seagull optimization algorithm for solving engineering optimization problems. Appl. Intell. 52(11), 13043\u201313081 (2022)","journal-title":"Appl. Intell."},{"key":"1336_CR13","doi-asserted-by":"crossref","unstructured":"Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136 (2016). IEEE","DOI":"10.1109\/WIFS.2016.7823911"},{"issue":"1","key":"1336_CR14","first-page":"311","volume":"8","author":"NH Rajini","year":"2019","unstructured":"Rajini, N.H.: Image forgery identification using convolution neural network. Int. J. Recent Technol. Eng. 8(1), 311\u2013320 (2019)","journal-title":"Int. J. Recent Technol. Eng."},{"key":"1336_CR15","unstructured":"Fridrich, J., Soukal, D., Lukas, J., et\u00a0al.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, vol. 3, pp. 652\u201363 (2003). Cleveland, OH"},{"key":"1336_CR16","doi-asserted-by":"crossref","unstructured":"Pevn\u1ef3, T., Fridrich, J.: Estimation of primary quantization matrix for steganalysis of double-compressed jpeg images. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 392\u2013404 (2008). SPIE","DOI":"10.1117\/12.759155"},{"key":"1336_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., Farid, H.: Exposing digital forgeries through chromatic aberration. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 48\u201355 (2006)","DOI":"10.1145\/1161366.1161376"},{"key":"1336_CR18","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., Farid, H.: Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 1\u201310 (2005)","DOI":"10.1145\/1073170.1073171"},{"key":"1336_CR19","unstructured":"Johnson, M.K., Farid, H.: Metric measurements on a plane from a single image (2006)"},{"issue":"12","key":"1336_CR20","doi-asserted-by":"publisher","first-page":"17521","DOI":"10.1007\/s11042-022-13797-w","volume":"82","author":"M Zanardelli","year":"2023","unstructured":"Zanardelli, M., Guerrini, F., Leonardi, R., Adami, N.: Image forgery detection: a survey of recent deep-learning approaches. Multimed. Tools Appl. 82(12), 17521\u201317566 (2023)","journal-title":"Multimed. Tools Appl."},{"issue":"22","key":"1336_CR21","doi-asserted-by":"publisher","first-page":"6668","DOI":"10.3390\/s20226668","volume":"20","author":"H Yao","year":"2020","unstructured":"Yao, H., Xu, M., Qiao, T., Wu, Y., Zheng, N.: Image forgery detection and localization via a reliability fusion map. Sensors 20(22), 6668 (2020)","journal-title":"Sensors"},{"key":"1336_CR22","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.forsciint.2018.11.025","volume":"295","author":"V Manu","year":"2019","unstructured":"Manu, V., Mehtre, B.: Tamper detection of social media images using quality artifacts and texture features. Foren. Sci. Int. 295, 100\u2013112 (2019)","journal-title":"Foren. Sci. Int."},{"issue":"6","key":"1336_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJDCF.287606","volume":"13","author":"D Pawar","year":"2021","unstructured":"Pawar, D., Gajpal, M.: Image forensic tool (ift): Image retrieval, tampering detection, and classification. Int. J. Digit. Crime Forensics (IJDCF) 13(6), 1\u201315 (2021)","journal-title":"Int. J. Digit. Crime Forensics (IJDCF)"},{"key":"1336_CR24","unstructured":"Yancey, R.E.: Deep localization of mixed image tampering techniques (2019). arXiv preprint arXiv:1904.08484"},{"key":"1336_CR25","doi-asserted-by":"crossref","unstructured":"Diallo, B., Urruty, T., Bourdon, P., Fernandez-Maloigne, C.: Improving robustness of image tampering detection for compression. In: MultiMedia Modeling: 25th International Conference, MMM 2019, Thessaloniki, Greece, January 8\u201311, 2019, Proceedings, Part I 25, pp. 387\u2013398 (2019). Springer","DOI":"10.1007\/978-3-030-05710-7_32"},{"key":"1336_CR26","doi-asserted-by":"crossref","unstructured":"Bevinamarad, P., Unki, P.H.: Robust image tampering detection technique using k-nearest neighbors (knn) classifier. In: Innovations in Computational Intelligence and Computer Vision: Proceedings of ICICV 2021, pp. 211\u2013220. Springer (2022)","DOI":"10.1007\/978-981-19-0475-2_19"},{"issue":"6","key":"1336_CR27","doi-asserted-by":"publisher","first-page":"2851","DOI":"10.3390\/app12062851","volume":"12","author":"EUH Qazi","year":"2022","unstructured":"Qazi, E.U.H., Zia, T., Almorjan, A.: Deep learning-based digital image forgery detection system. Appl. Sci. 12(6), 2851 (2022)","journal-title":"Appl. Sci."},{"key":"1336_CR28","doi-asserted-by":"crossref","unstructured":"Xue, Y., Zhu, C., Tan, X.: Isd-ssd: image splicing detection by using modified single shot multibox detector. In: International Conference on Artificial Intelligence and Intelligent Information Processing (AIIIP 2022), vol. 12456, pp. 569\u2013575 (2022). SPIE","DOI":"10.1117\/12.2659381"},{"issue":"11\u201312","key":"1336_CR29","doi-asserted-by":"publisher","first-page":"8249","DOI":"10.1007\/s11042-019-08597-8","volume":"79","author":"N Alipour","year":"2020","unstructured":"Alipour, N., Behrad, A.: Semantic segmentation of jpeg blocks using a deep cnn for non-aligned jpeg forgery detection and localization. Multimed. Tools Appl. 79(11\u201312), 8249\u20138265 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"1336_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2022.116785","volume":"107","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Retraint, F., Qiao, T.: Image splicing forgery detection using simplified generalized noise model. Signal Process. Image Communicat. 107, 116785 (2022)","journal-title":"Signal Process. Image Communicat."},{"issue":"3","key":"1336_CR31","doi-asserted-by":"publisher","first-page":"403","DOI":"10.3390\/electronics11030403","volume":"11","author":"SS Ali","year":"2022","unstructured":"Ali, S.S., Ganapathi, I.I., Vu, N.-S., Ali, S.D., Saxena, N., Werghi, N.: Image forgery detection using deep learning by recompressing images. Electronics 11(3), 403 (2022)","journal-title":"Electronics"},{"issue":"20","key":"1336_CR32","doi-asserted-by":"publisher","first-page":"3852","DOI":"10.3390\/math10203852","volume":"10","author":"P Zeng","year":"2022","unstructured":"Zeng, P., Tong, L., Liang, Y., Zhou, N., Wu, J.: Multitask image splicing tampering detection based on attention mechanism. Mathematics 10(20), 3852 (2022)","journal-title":"Mathematics"},{"issue":"7","key":"1336_CR33","doi-asserted-by":"publisher","first-page":"5015","DOI":"10.1007\/s00521-021-06329-4","volume":"35","author":"H Ding","year":"2023","unstructured":"Ding, H., Chen, L., Tao, Q., Fu, Z., Dong, L., Cui, X.: Dcu-net: a dual-channel u-shaped network for image splicing forgery detection. Neural Computi. Applicat. 35(7), 5015\u20135031 (2023)","journal-title":"Neural Computi. Applicat."},{"issue":"3","key":"1336_CR34","doi-asserted-by":"publisher","first-page":"1272","DOI":"10.3390\/app13031272","volume":"13","author":"KM Hosny","year":"2023","unstructured":"Hosny, K.M., Mortda, A.M., Lashin, N.A., Fouda, M.M.: A new method to detect splicing image forgery using convolutional neural network. Appl. Sci. 13(3), 1272 (2023)","journal-title":"Appl. Sci."},{"key":"1336_CR35","doi-asserted-by":"crossref","unstructured":"Hu, J., Xue, R., Teng, G., Niu, S., Jin, D.: Image splicing manipulation location by multi-scale dual-channel supervision. Multimed. Tools Appl. 1\u201324 (2023)","DOI":"10.1007\/s11042-023-16705-y"},{"key":"1336_CR36","unstructured":"Muniappan, T., Abd Warif, N.B., Ismail, A., Abir, N.A.M.: An evaluation of convolutional neural network (cnn) model for copy-move and splicing forgery detection. Int. J. Intell. Syst. Appl. Eng. 11(2), 730\u2013740 (2023)"},{"issue":"27","key":"1336_CR37","doi-asserted-by":"publisher","first-page":"38757","DOI":"10.1007\/s11042-022-13151-0","volume":"81","author":"Y Wu","year":"2022","unstructured":"Wu, Y., Wo, Y., Han, G.: Joint manipulation trace attention network and adaptive fusion mechanism for image splicing forgery localization. Multimed. Tools Appl. 81(27), 38757\u201338780 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"1336_CR38","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1007\/s11760-021-01895-5","volume":"15","author":"S Nath","year":"2021","unstructured":"Nath, S., Naskar, R.: Automated image splicing detection using deep cnn-learned features and ann-based classifier. Signal Image Video Process. 15, 1601\u20131608 (2021)","journal-title":"Signal Image Video Process."},{"key":"1336_CR39","doi-asserted-by":"crossref","unstructured":"Ding, H., Chen, L., Tao, Q., Fu, Z., Dong, L., Cui, X.: Dcu-net: a dual-channel u-shaped network for image splicing forgery detection. Neural Comput. Appl. 35(7), 5015\u20135031","DOI":"10.1007\/s00521-021-06329-4"},{"key":"1336_CR40","doi-asserted-by":"publisher","first-page":"2161","DOI":"10.1007\/s11042-020-09707-7","volume":"80","author":"P Niyishaka","year":"2021","unstructured":"Niyishaka, P., Bhagvati, C.: Image splicing detection technique based on illumination-reflectance model and lbp. Multimed. Tools Appl. 80, 2161\u20132175 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"19\u201320","key":"1336_CR41","doi-asserted-by":"publisher","first-page":"12829","DOI":"10.1007\/s11042-020-08621-2","volume":"79","author":"N Kanwal","year":"2020","unstructured":"Kanwal, N., Girdhar, A., Kaur, L., Bhullar, J.S.: Digital image splicing detection technique using optimal threshold based local ternary pattern. Multimed. Tools Appl. 79(19\u201320), 12829\u201312846 (2020)","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"1336_CR42","first-page":"28","volume":"11","author":"EIA El-Latif","year":"2019","unstructured":"El-Latif, E.I.A., Taha, A., Zayed, H.H.: A passive approach for detecting image splicing using deep learning and haar wavelet transform. Int. J. Comput. Netw. Inform. Secur. 11(5), 28\u201335 (2019)","journal-title":"Int. J. Comput. Netw. Inform. Secur."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01336-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01336-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01336-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:11:44Z","timestamp":1720199504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01336-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,21]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1336"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01336-6","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,21]]},"assertion":[{"value":"15 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"128"}}