{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:57:33Z","timestamp":1767992253683,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972321"],"award-info":[{"award-number":["61972321"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61901388"],"award-info":[{"award-number":["61901388"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s10489-023-05174-3","type":"journal-article","created":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T03:02:18Z","timestamp":1703127738000},"page":"851-870","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cross-scale condition aggregation and iterative refinement for copy-move forgery detection"],"prefix":"10.1007","volume":"54","author":[{"given":"Yanzhi","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5249-2148","authenticated-orcid":false,"given":"Jiangbin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Aiqing","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Irfan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,21]]},"reference":[{"issue":"8","key":"5174_CR1","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"C Pun","year":"2015","unstructured":"Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive over-segmentation and feature point matching. IEEE Trans Inf Forensic Secur 10(8):1705\u20131716","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"5174_CR2","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: Detecting copy-move image forgery with source\/target localization. In: European Conference on Computer Vision, pp 168\u2013184","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"5174_CR3","doi-asserted-by":"publisher","first-page":"15171","DOI":"10.1007\/s11042-022-12010-2","volume":"81","author":"N Warif","year":"2022","unstructured":"Warif N, Idris M, Wahab A et al (2022) A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review. Multimed Tools Appl 81:15171\u201315203","journal-title":"Multimed Tools Appl"},{"key":"5174_CR4","doi-asserted-by":"publisher","first-page":"34409","DOI":"10.1007\/s11042-023-14424-y","volume":"82","author":"M Elaskily","year":"2023","unstructured":"Elaskily M, Dessouky M, Faragallah O et al (2023) A survey on traditional and deep learning copy move forgery detection (CMFD) techniques. Multimed Tools Appl 82:34409\u201334435","journal-title":"Multimed Tools Appl"},{"key":"5174_CR5","first-page":"102536","volume":"54","author":"Y Wang","year":"2020","unstructured":"Wang Y, Kang X, Chen Y (2020) Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. J Inf Secur Appl 54:102536","journal-title":"J Inf Secur Appl"},{"issue":"4","key":"5174_CR6","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1109\/TMM.2017.2760098","volume":"20","author":"L Su","year":"2018","unstructured":"Su L, Li C, Lai Y, Yang J (2018) A fast forgery detection algorithm based on exponential-Fourier moments for video region duplication. IEEE Trans Multimed 20(4):825\u2013840","journal-title":"IEEE Trans Multimed"},{"key":"5174_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ins.2018.06.040","volume":"463","author":"C Pun","year":"2018","unstructured":"Pun C, Chung J (2018) A two-stage localization for copy-move forgery detection. Inf Sci 463:33\u201355","journal-title":"Inf Sci"},{"issue":"3","key":"5174_CR8","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L et al (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"10","key":"5174_CR9","doi-asserted-by":"publisher","first-page":"3630","DOI":"10.1007\/s10489-018-1168-4","volume":"48","author":"X Wang","year":"2018","unstructured":"Wang X, Jiao L, Wang X et al (2018) A new keypoint-based copy-move forgery detection for color image. Appl Intell 48(10):3630\u20133652","journal-title":"Appl Intell"},{"issue":"3","key":"5174_CR10","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"5174_CR11","doi-asserted-by":"publisher","first-page":"18263","DOI":"10.1007\/s10489-023-04466-y","volume":"53","author":"Z Cui","year":"2023","unstructured":"Cui Z, Lu N (2023) Feature-comparison network for visual tracking. Appl Intell 53:18263\u201318276","journal-title":"Appl Intell"},{"issue":"8","key":"5174_CR12","doi-asserted-by":"publisher","first-page":"10535","DOI":"10.1109\/TPAMI.2023.3261282","volume":"45","author":"X Zhang","year":"2023","unstructured":"Zhang X, Demiris Y (2023) Visible and Infrared Image Fusion Using Deep Learning. IEEE Trans Pattern Anal Mach Intell 45(8):10535\u201310554","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5174_CR13","doi-asserted-by":"crossref","unstructured":"Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE international workshop on information forensics and security (WIFS). IEEE,\u00a0Abu Dhabi, pp 1\u20136","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"5174_CR14","doi-asserted-by":"publisher","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","volume":"77","author":"Y Liu","year":"2018","unstructured":"Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimed Tools Appl 77:18269\u201318293","journal-title":"Multimed Tools Appl"},{"key":"5174_CR15","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2018) Image copy-move forgery detection via an end-to-end deep neural network. In: IEEE Winter Conference on Applications of Computer Vision (WACV), pp 1907\u20131915","DOI":"10.1109\/WACV.2018.00211"},{"key":"5174_CR16","doi-asserted-by":"publisher","first-page":"3506","DOI":"10.1109\/TMM.2020.3026868","volume":"23","author":"B Chen","year":"2021","unstructured":"Chen B, Tan W, Coatrieux G et al (2021) A serial image copy-move forgery localization scheme with source\/target distinguishment. IEEE Trans Multimed 23:3506\u20133517","journal-title":"IEEE Trans Multimed"},{"key":"5174_CR17","doi-asserted-by":"crossref","unstructured":"Islam A, Long C, Basharat A, Hoogs A (2020) DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-Move Forgery Detection and Localization. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 4675\u20134684","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"5174_CR18","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","volume":"15","author":"J Zhong","year":"2020","unstructured":"Zhong J, Pun C (2020) An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection. IEEE Trans Inf Forensic Secur 15:2134\u20132146","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"10","key":"5174_CR19","doi-asserted-by":"publisher","first-page":"6714","DOI":"10.1109\/TII.2020.2982705","volume":"16","author":"Y Zhu","year":"2020","unstructured":"Zhu Y, Chen C, Yan G et al (2020) AR-Net: Adaptive Attention and Residual Refinement Network for Copy-Move Forgery Detection. IEEE Trans Ind Inform 16(10):6714\u20136723","journal-title":"IEEE Trans Ind Inform"},{"key":"5174_CR20","doi-asserted-by":"publisher","first-page":"4713","DOI":"10.1007\/s00521-020-05433-1","volume":"33","author":"E Armas Vega","year":"2021","unstructured":"Armas Vega E, Gonz\u00e1lez Fern\u00e1ndez E, Sandoval Orozco A et al (2021) Copy-move forgery detection technique based on discrete cosine transform blocks features. Neural Comput Appl 33:4713\u20134727","journal-title":"Neural Comput Appl"},{"issue":"1","key":"5174_CR21","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"G Muhammad","year":"2012","unstructured":"Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Invest 9(1):49\u201357","journal-title":"Digit Invest"},{"key":"5174_CR22","doi-asserted-by":"crossref","unstructured":"Ryu S, Lee M, Lee H (2010) Detection of copy-rotate-move forgery using zernike moments. In: 2010 International workshop on information hiding (IH), vol 6387. Springer, Heidelberg, pp 51\u201365","DOI":"10.1007\/978-3-642-16435-4_5"},{"issue":"11","key":"5174_CR23","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy\u2013 move forgery detection. IEEE Trans Inf Forensic Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"5174_CR24","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1109\/TCSVT.2018.2804768","volume":"29","author":"L Amiano","year":"2019","unstructured":"Amiano L, Cozzolino D, Poggi G, Verdoliva L (2019) A PatchMatch-Based Dense-Field Algorithm for Video Copy-Move Detection and Localization. IEEE Trans Circuits Syst Video Technol 29(3):669\u2013682","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"5174_CR25","doi-asserted-by":"publisher","first-page":"15405","DOI":"10.1007\/s10489-022-03207-x","volume":"52","author":"K Sunitha","year":"2022","unstructured":"Sunitha K, Krishna A, Prasad B (2022) Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model. Appl Intell 52:15405\u201315416","journal-title":"Appl Intell"},{"issue":"10","key":"5174_CR26","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensic Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"11","key":"5174_CR27","doi-asserted-by":"publisher","first-page":"8291","DOI":"10.1002\/int.22939","volume":"37","author":"Y Wei","year":"2022","unstructured":"Wei Y, Ma J, Wang Z et al (2022) Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces. Int J Intell Syst 37(11):8291\u20138308","journal-title":"Int J Intell Syst"},{"key":"5174_CR28","doi-asserted-by":"publisher","first-page":"18219","DOI":"10.1007\/s10489-022-04421-3","volume":"53","author":"R Ren","year":"2023","unstructured":"Ren R, Niu S, Jin J et al (2023) Multi-scale attention context-aware network for detection and localization of image splicing. Appl Intell 53:18219\u201318238","journal-title":"Appl Intell"},{"issue":"7","key":"5174_CR29","doi-asserted-by":"publisher","first-page":"5015","DOI":"10.1007\/s00521-021-06329-4","volume":"35","author":"H Ding","year":"2023","unstructured":"Ding H, Chen L, Tao Q et al (2023) DCU-Net: a dual-channel U-shaped network for image splicing forgery detection. Neural Comput Appl 35(7):5015\u20135031","journal-title":"Neural Comput Appl"},{"key":"5174_CR30","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TIFS.2022.3152362","volume":"17","author":"L Zhuo","year":"2022","unstructured":"Zhuo L, Tan S, Li B, Huang J (2022) Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. IEEE Trans Inf Forensic Secur 17:819\u2013834","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"5174_CR31","doi-asserted-by":"publisher","first-page":"108709","DOI":"10.1016\/j.sigpro.2022.108709","volume":"201","author":"Q Yin","year":"2022","unstructured":"Yin Q, Wang J, Lu W, Luo X (2022) Contrastive learning based multi-task network for image manipulation detection. Signal Process 201:108709","journal-title":"Signal Process"},{"key":"5174_CR32","doi-asserted-by":"publisher","first-page":"109026","DOI":"10.1016\/j.patcog.2022.109026","volume":"133","author":"X Lin","year":"2023","unstructured":"Lin X, Wang S, Deng J et al (2023) Image manipulation detection by multiple tampering traces and edge artifact enhancement. Pattern Recogn 133:109026","journal-title":"Pattern Recogn"},{"key":"5174_CR33","doi-asserted-by":"crossref","unstructured":"Hu X, Zhang Z, Jiang Z et al (2020) SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization. In: European Conference on Computer Vision (ECCV), pp 312\u2013328","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"5174_CR34","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TIFS.2020.3045903","volume":"16","author":"M Barni","year":"2021","unstructured":"Barni M, Phan Q, Tondi B (2021) Copy Move Source-Target Disambiguation Through Multi-Branch CNNs. IEEE Trans Inf Forensic Secur 16:1825\u20131840","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"5174_CR35","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.neucom.2022.09.017","volume":"511","author":"M Aria","year":"2022","unstructured":"Aria M, Hashemzadeh M, Farajzadeh N (2022) QDL-CMFD: A Quality-independent and deep Learning-based Copy-Move image forgery detection method. Neurocomputing 511:213\u2013236","journal-title":"Neurocomputing"},{"key":"5174_CR36","doi-asserted-by":"crossref","unstructured":"Chen L, Zhu Y, Papandreou G et al (2018) Encoder-decoder with atrous separable convolution for semantic image segmentation. In: European conference on computer vision (ECCV), pp 801\u2013818","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"5174_CR37","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), pp 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"5174_CR38","doi-asserted-by":"crossref","unstructured":"Wen B, Zhu Y, Subramanian R, Ng T, Shen X, Winkler S (2016) COVERAGE\u2014A novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP), pp 161\u2013165","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"5174_CR39","unstructured":"Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD-New database for copy-move forgery detection. In: ELMAR, 2013 55th international symposium. IEEE, pp 49\u201354"},{"issue":"11","key":"5174_CR40","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"M Zandi","year":"2016","unstructured":"Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detection. IEEE Trans Inf Forensic Secur 11(11):2499\u20132512","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"5174_CR41","doi-asserted-by":"crossref","unstructured":"Mahdian B, Saic S (2008) Detection of resampling supplemented with noise inconsistencies analysis for image forensics. In: 2008 International Conference on Computational Sciences and Its Applications (ICCSA), pp 546\u2013556","DOI":"10.1109\/ICCSA.2008.34"},{"issue":"5","key":"5174_CR42","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara P, Bianchi T, Rosa A, Piva A (2012) Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts. IEEE Trans Inf Forensic Secur 7(5):1566\u20131577","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"5174_CR43","unstructured":"Krawetz N (2007) A picture\u2019s worth: digital image analysis and forensics. Hacker factor solutions, pp 1\u201331. Available: http:\/\/www.hackerfactor.com\/papers\/bh-usa-07-krawetz-wp.pdf"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-05174-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-023-05174-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-05174-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T10:23:30Z","timestamp":1705141410000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-023-05174-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,21]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5174"],"URL":"https:\/\/doi.org\/10.1007\/s10489-023-05174-3","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,21]]},"assertion":[{"value":"12 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interests regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}