{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T21:37:37Z","timestamp":1772314657865,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research, King Saud University","doi-asserted-by":"publisher","award":["RGP-1439-067"],"award-info":[{"award-number":["RGP-1439-067"]}],"id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s10489-022-04126-7","type":"journal-article","created":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T10:04:47Z","timestamp":1665223487000},"page":"13275-13292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Detection and localization of splicing on remote sensing images using image-to-image transformation"],"prefix":"10.1007","volume":"53","author":[{"given":"Rawan","family":"Alsughayer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5847-8539","authenticated-orcid":false,"given":"Muhammad","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Fahman","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"Hatim","family":"AboalSamh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,8]]},"reference":[{"issue":"2","key":"4126_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MGRS.2019.2902525","volume":"7","author":"M Shimoni","year":"2019","unstructured":"Shimoni M, Haelterman R, Perneel C (2019) Hypersectral imaging for military and security applications: Combining myriad processing and sensing techniques. IEEE Geosci Remote Sensing Mag 7(2):101\u2013117","journal-title":"IEEE Geosci Remote Sensing Mag"},{"issue":"3","key":"4126_CR2","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1080\/00450618.2016.1153711","volume":"49","author":"K Asghar","year":"2017","unstructured":"Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Aust J Forensic Sci 49(3):281\u2013307","journal-title":"Aust J Forensic Sci"},{"issue":"7","key":"4126_CR3","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1007\/s00138-019-01048-2","volume":"30","author":"K Asghar","year":"2019","unstructured":"Asghar K, Sun X, Rosin PL, Saddique M, Hussain M, Habib Z (2019) Edge texture feature based image forgery detection with cross dataset evaluation. Mach Vis Appl 30(7):1243\u20131262","journal-title":"Mach Vis Appl"},{"key":"4126_CR4","doi-asserted-by":"crossref","unstructured":"Thakur A, Jindal N (2019) Machine Learning Based Saliency Algorithm for Image Forgery Classification and Localization. ICSCCC 2018 - Int. Conf. Secur. Cyber Comput. Commun.:451\u2013456","DOI":"10.1109\/ICSCCC.2018.8703287"},{"issue":"s1","key":"4126_CR5","first-page":"1","volume":"22","author":"AR Abrahim","year":"2018","unstructured":"Abrahim AR, Rahim MSM, Bin Sulong G (2018) Splicing image forgery identification based on artificial neural network approach and texture features. Cluster Comput 22(s1):1\u201314","journal-title":"Cluster Comput"},{"key":"4126_CR6","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum R, Ren Y, Kuo CJ (2018) Image splicing localization using a multi-task fully convolutional network ( MFCN ). J Vis Commun Image Represent 51:201\u2013209","journal-title":"J Vis Commun Image Represent"},{"key":"4126_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2019.2928480","volume":"19","author":"C Song","year":"2019","unstructured":"Song C, Zeng P, Wang Z, Li T, Qiao L, Shen L (2019) Image forgery detection based on motion blur estimated using convolutional neural network. IEEE Sensors J 19:1\u201311611","journal-title":"IEEE Sensors J"},{"key":"4126_CR8","doi-asserted-by":"crossref","unstructured":"Bo C, Lio P (2018) Locating splicing forgery by fully convolutional networks and conditional random field. Signal Process-Image Commun (66):103\u2013112","DOI":"10.1016\/j.image.2018.04.011"},{"key":"4126_CR9","doi-asserted-by":"crossref","unstructured":"Wang L, Kamata S (2019) \"Forgery Image Detection via Mask Filter Banks based CNN\". Tenth Int. Conf. Graph. Image Process. (ICGIP 2018). Int. Soc. Opt. Photonics. 11069","DOI":"10.1117\/12.2524351"},{"issue":"11","key":"4126_CR10","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar B, Stamm MC (2018) Constrained convolutional neural networks: a New approach towards general purpose image manipulation detection. IEEE Trans Inf Forensics Secur 13(11):2691\u20132706","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4126_CR11","doi-asserted-by":"crossref","unstructured":"Wu Y, Abdalmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit. 2019-June:9535\u20139544","DOI":"10.1109\/CVPR.2019.00977"},{"issue":"6","key":"4126_CR12","first-page":"487","volume":"2005","author":"K Jacobsen","year":"2005","unstructured":"Jacobsen K (2005) High resolution satellite imaging systems - overview. Photogramm Fernerkundung Geoinf 2005(6):487\u2013496","journal-title":"Photogramm Fernerkundung Geoinf"},{"issue":"4","key":"4126_CR13","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1002\/ecy.1730","volume":"98","author":"E New","year":"2017","unstructured":"New E, I. To, Ecology IN (2017) A survival guide to Landsat preprocessing. Ecology 98(4):920\u2013932","journal-title":"Ecology"},{"key":"4126_CR14","doi-asserted-by":"crossref","unstructured":"Bartusiak ER, Yarlagadda SK, G\u00fcera D, Zhu FM, Bestagini P, Tubaro S, Delp EJ (2019) Splicing Detection and Localization in Satellite Imagery Using Conditional GANs. Proc. - 2nd Int. Conf. Multimed. Inf. Process. Retrieval, MIPR:91\u201396","DOI":"10.1109\/MIPR.2019.00024"},{"issue":"214","key":"4126_CR15","first-page":"1","volume":"7","author":"SK Yarlagadda","year":"2018","unstructured":"Yarlagadda SK (2018) Satellite image forgery detection and localization using GAN and one-class classifier. Electronic Imaging 7(214):1\u20139","journal-title":"Electronic Imaging"},{"key":"4126_CR16","doi-asserted-by":"crossref","unstructured":"Horv\u00e1th J, Montserrat DM, Hao H, Delp EJ (2020) Manipulation detection in satellite images using deep belief networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, In p. 664-665","DOI":"10.1109\/CVPRW50498.2020.00340"},{"key":"4126_CR17","first-page":"21","volume":"29","author":"J Horv\u00e1th","year":"2019","unstructured":"Horv\u00e1th J, G\u00fcera D, Yarlagadda SK, Bestagini P, Zhu FM, Tubaro S, Delp EJ (2019) Anomaly-based manipulation detection in satellite images. Networks 29:21","journal-title":"Networks"},{"key":"4126_CR18","doi-asserted-by":"crossref","unstructured":"Montserrat DM, Horv\u00e1th J, Yarlagadda SK, Zhu F, Delp EJ (2020) \"Generative Autoregressive Ensembles for Satellite Imagery Manipulation Detection, \" In: 2020 IEEE international workshop on information forensics and security (WIFS). IEEE, p. 1\u20136","DOI":"10.1109\/WIFS49906.2020.9360909"},{"key":"4126_CR19","unstructured":"Mirza M, Osindero S (2014) \"Conditional Generative Adversarial Nets,\" in arXiv preprint arXiv:1411.1784. 1\u20137"},{"key":"4126_CR20","unstructured":"Ali Nur Oz M, Mercimek M, Kaymakcir O (2021) Anomaly localization in regular textures based on deep convolutional generative adversarial networks. Appl Intell"},{"key":"4126_CR21","doi-asserted-by":"crossref","unstructured":"Park S, Shin Y (2021) Generative residual block for image generation. Appl Intell","DOI":"10.1007\/s10489-021-02858-6"},{"key":"4126_CR22","doi-asserted-by":"crossref","unstructured":"Wang P, Bai X (2019) \"Thermal Infrared Pedestrian Segmentation Based on Conditional GAN,\" in IEEE transactions on image processing,, vol. 28, no. 12, pp. 6007\u20136021","DOI":"10.1109\/TIP.2019.2924171"},{"issue":"11","key":"4126_CR23","doi-asserted-by":"publisher","first-page":"3954","DOI":"10.1109\/JSTARS.2018.2833382","volume":"11","author":"R Li","year":"2018","unstructured":"Li R, Liu W, Yang L, Sun S, Hu W, Zhang F, Li W (2018) DeepUNet\u00a0: a deep fully convolutional network for pixel-Level Sea-land segmentation. IEEE J Sel Top Appl Earth Obs Remote Sens 11(11):3954\u20133962","journal-title":"IEEE J Sel Top Appl Earth Obs Remote Sens"},{"issue":"12","key":"4126_CR24","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1109\/TPAMI.2016.2644615","volume":"39","author":"V Badrinarayanan","year":"2017","unstructured":"Badrinarayanan V, Kendall A, Cipolla R (2017) Segnet: a deep convolutional encoder-decoder architecture for image segmentation. IEEE Trans Pattern Anal Mach Intell 39(12):2481\u20132495","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4126_CR25","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) \"U-net: convolutional networks for biomedical image segmentation,\" in international conference on medical image computing and computer-assisted intervention. Springer, Cham 9351:234\u2013241","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"4126_CR26","doi-asserted-by":"crossref","unstructured":"He K, Sun J (2016) Deep Residual Learning for Image Recognition. Proceed IEEE Confer Comput Vision Patt Recog:770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"4126_CR27","doi-asserted-by":"crossref","unstructured":"Isola P, Zhu JY, Zhou T, Efros AA (2017, 2017) Image-to-image translation with conditional adversarial networks. Proc. - 30th IEEE Conf. Comput. Vis. Pattern Recognition, CVPR:5967\u20135976","DOI":"10.1109\/CVPR.2017.632"},{"issue":"6","key":"4126_CR28","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.1109\/JSTARS.2018.2803212","volume":"11","author":"N Merkle","year":"2018","unstructured":"Merkle N, Auer S, Reinartz P (2018) Exploring the potential of conditional adversarial networks for optical and SAR image matching. IEEE J Sel Top Appl Earth Obs Remote Sens 11(6):1811\u20131820","journal-title":"IEEE J Sel Top Appl Earth Obs Remote Sens"},{"issue":"2","key":"4126_CR29","first-page":"519","volume":"32","author":"Y Yuan","year":"2017","unstructured":"Yuan Y, Lo Y (2017) Improving Dermoscopic image segmentation with enhanced convolutional-Deconvolutional networks. IEEE J Biomed Heal informatics 32(2):519\u2013526","journal-title":"IEEE J Biomed Heal informatics"},{"issue":"9","key":"4126_CR30","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TMI.2017.2695227","volume":"36","author":"Y Yuan","year":"2017","unstructured":"Yuan Y, Chao M, Lo Y (2017) Deep Fully Convolutional Networks With Jaccard Distance. IEEE Trans Med Imaging 36(9):1876\u20131886","journal-title":"IEEE Trans Med Imaging"},{"key":"4126_CR31","doi-asserted-by":"crossref","unstructured":"Tu BW, Liu X, Hu W, Pan Z, Xu X, Li (2019) Segmentation of Lesion in Dermoscopy Images Using Dense-Residual Network with Adversarial Learning. 2019 IEEE Int Conf Image Process (ICIP):1430\u20131434","DOI":"10.1109\/ICIP.2019.8803029"},{"key":"4126_CR32","doi-asserted-by":"crossref","unstructured":"Sarker MK, Rashwan HA, Akram F (2018) \"SLSDeep: skin lesion segmentation based on dilated residual and pyramid pooling networks\". In: international conference on medical image computing and computer-assisted intervention. Springer, Cham, , pp. 21\u201329","DOI":"10.1007\/978-3-030-00934-2_3"},{"key":"4126_CR33","unstructured":"Kingma DP, Ba JL (2015) Adam: A method for stochastic optimization. 3rd International Conference on Learning Representations, ICLR 2015 - Conference Track Proceedings:1\u201315"},{"key":"4126_CR34","unstructured":"\"KACST-Remote Sensing Technology.\" [Online]. Available: https:\/\/www.kacst.edu.sa\/eng\/RD\/Pages\/content.aspx?dID=66"},{"key":"4126_CR35","unstructured":"Nguyen TL Satellite Image Forgery Detection and Localization, 2018, [GitHub repository], https:\/\/github.com\/tailongnguyen\/Satellite-Image-Forgery-Detection-and-Localization\/issues\/2#issuecomment-388561273"},{"issue":"24","key":"4126_CR36","doi-asserted-by":"publisher","first-page":"31807","DOI":"10.1007\/s11042-018-6201-4","volume":"77","author":"OM Al-Qershi","year":"2018","unstructured":"Al-Qershi OM, Khoo BE (2018) Evaluation of copy-move forgery detection: datasets and evaluation metrics. Multimed Tools Appl 77(24):31807\u201331833","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"4126_CR37","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.aci.2018.08.003","volume":"17","author":"A Tharwat","year":"2020","unstructured":"Tharwat A (2020) Classification assessment methods. Appl Comput Inform 17(1):168\u2013192","journal-title":"Appl Comput Inform"},{"issue":"1","key":"4126_CR38","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1002\/bimj.201600022","volume":"59","author":"C Burkener","year":"2017","unstructured":"Burkener C, Doebler P, Holling H (2017) Optimal design of the Wilcoxon\u2013Mann\u2013Whitney-test. Biometr J 59(1):25\u201340","journal-title":"Biometr J"}],"updated-by":[{"DOI":"10.1007\/s10489-023-04476-w","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T00:00:00Z","timestamp":1677542400000}}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-04126-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-04126-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-04126-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T10:21:52Z","timestamp":1685528512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-04126-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":38,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["4126"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-04126-7","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s10489-023-04476-w","asserted-by":"object"}]},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,8]]},"assertion":[{"value":"29 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10489-023-04476-w","URL":"https:\/\/doi.org\/10.1007\/s10489-023-04476-w","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}