{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:24:40Z","timestamp":1775024680802,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T00:00:00Z","timestamp":1600214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T00:00:00Z","timestamp":1600214400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09585-z","type":"journal-article","created":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T08:04:57Z","timestamp":1600243497000},"page":"2713-2751","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["RETRACTED ARTICLE: A comprehensive survey of detecting tampered images and localization of the tampered region"],"prefix":"10.1007","volume":"80","author":[{"given":"T.","family":"Anbu","sequence":"first","affiliation":[]},{"given":"M. Milton","family":"Joe","sequence":"additional","affiliation":[]},{"given":"G.","family":"Murugeswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,16]]},"reference":[{"key":"9585_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, Belal, and T Aaron Gulliver (2020). \u201cImage splicing detection using mask-RCNN.\u201d Signal, Image and Video Processing: 1\u20138","DOI":"10.1007\/s11760-020-01636-0"},{"issue":"1","key":"9585_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11760-016-0899-0","volume":"11","author":"A Alahmadi","year":"2017","unstructured":"Alahmadi A et al (2017) Passive detection of image forgery using DCT and local binary pattern. SIViP 11(1):81\u201388","journal-title":"SIViP"},{"issue":"1","key":"9585_CR3","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"MH Alkawaz","year":"2018","unstructured":"Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput & Applic 30(1):183\u2013192","journal-title":"Neural Comput & Applic"},{"key":"9585_CR4","doi-asserted-by":"crossref","unstructured":"Ardizzone, Edoardo, Alessandro Bruno, and Giuseppe Mazzola (2010). \u201cDetecting multiple copies in tampered images.\u201d 2010 IEEE International Conference on Image Processing. IEEE","DOI":"10.1109\/ICIP.2010.5652490"},{"key":"9585_CR5","doi-asserted-by":"crossref","unstructured":"Alahmadi AA, Hussain M, Aboalsamh H, Muhammad G, Bebis G (2013). Splicing image forgery detection based on DCT and local binary pattern, pp 253\u2013256","DOI":"10.1109\/GlobalSIP.2013.6736863"},{"key":"9585_CR6","doi-asserted-by":"crossref","unstructured":"Beier, T, Neely, S (1992). Feature-based image metamorphosis. In: Proceedings of the 19th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1992, pp. 35\u201342. ACM, New York","DOI":"10.1145\/133994.134003"},{"key":"9585_CR7","unstructured":"Bilmes, J (1997). \u201cA gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models,\u201d ICSI, Tech. Rep. TR-97-021"},{"key":"9585_CR8","first-page":"404","volume":"5","author":"H Bay","year":"2006","unstructured":"Bay H, Tuytelaars T, Van GL (2006) SURF: speeded up robust features. Eur Conf Comput Vis 5:404\u2013417","journal-title":"Eur Conf Comput Vis"},{"key":"9585_CR9","doi-asserted-by":"crossref","unstructured":"Bayar, Belhassen, and Matthew C. Stamm (2016). \u201cA deep learning approach to universal image manipulation detection using a new convolutional layer.\u201d Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. ACM","DOI":"10.1145\/2909827.2930786"},{"issue":"3","key":"9585_CR10","doi-asserted-by":"publisher","first-page":"24:1","DOI":"10.1145\/1531326.1531330","volume":"28","author":"CE Barnes","year":"2009","unstructured":"Barnes CE, Shechtman AF, Goldman D (2009) PatchMatch: A randomized correspondence algorithm for structural image editing. ACM Trans. Graph 28(3):24:1\u201324:11","journal-title":"ACM Trans. Graph"},{"issue":"3","key":"9585_CR11","doi-asserted-by":"publisher","first-page":"27:1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang C-C, Lin C-J (2011) LIBSVM: a library for support vector machines. ACM Trans. Intelligent Systems and Technology 2(3):27:1\u201327:27","journal-title":"ACM Trans. Intelligent Systems and Technology"},{"issue":"1\u20133","key":"9585_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic SciInt 214(1\u20133):33\u201334","journal-title":"Forensic SciInt"},{"issue":"3","key":"9585_CR13","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"key":"9585_CR14","doi-asserted-by":"publisher","first-page":"36863","DOI":"10.1109\/ACCESS.2020.2974804","volume":"8","author":"H Chen","year":"2020","unstructured":"Chen H, Yang X, Lyu Y (2020) Copy-move forgery detection based on Keypoint clustering and similar neighborhood search algorithm. IEEE Access 8:36863\u201336875","journal-title":"IEEE Access"},{"key":"9585_CR15","doi-asserted-by":"crossref","unstructured":"Cozzolino. D, D Gragnaniello, and L Verdoliva (2014). \u201cImage forgery localization through the fusion of camera-based, feature-based and pixelbased techniques,\u201d in Proc. IEEE Int. Conf. Image Process., Oct. 2014,pp. 5302\u20135306","DOI":"10.1109\/ICIP.2014.7026073"},{"issue":"6","key":"9585_CR16","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1109\/TSMCC.2011.2118750","volume":"41","author":"H Di","year":"2011","unstructured":"Di H, Caifeng S (2011) Local binary patterns and its application to facial image analysis: a survey. IEEE Trans Syst Man Cybern 41(6):765\u2013781","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"8","key":"9585_CR17","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1109\/TIFS.2018.2806926","volume":"13","author":"Y Guo","year":"2018","unstructured":"Guo Y, Cao X, Zhang W, Wang R (2018) Fake colorized image detection. IEEE Transactions on Information Forensics and Security 13(8):1932\u20131944","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9585_CR18","doi-asserted-by":"crossref","unstructured":"Girshick, R (2015). Fast R-CNN. In: Proceedings of the IEEE International Conference on Computer Vision. Santiago, Chile, Dec 13\u201316","DOI":"10.1109\/ICCV.2015.169"},{"key":"9585_CR19","doi-asserted-by":"crossref","unstructured":"Gaborini. L, P Bestagini, S Milani, M Tagliasacchi, and S Tubaro (2014).\u201cMulti-clue image tampering localization,\u201d in Proc. IEEE Int. Workshop Inf. Forensics Secur., Dec. 2014, pp. 125\u2013130","DOI":"10.1109\/WIFS.2014.7084315"},{"issue":"12","key":"9585_CR20","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1109\/TPAMI.2010.168","volume":"33","author":"K He","year":"2011","unstructured":"He K, Sun J, Tang X (2011) Single image haze removal using dark channel prior. IEEE Trans Pattern Analysis and Machine Intelligence 33(12):2341\u20132353","journal-title":"IEEE Trans Pattern Analysis and Machine Intelligence"},{"key":"9585_CR21","doi-asserted-by":"crossref","unstructured":"Hussain, M, Wajid, SK, Elzaart, A, Berbar, M. (2011). A comparison of SVM kernel functions for breast cancer detection. In: Proceedings of the 2011 Eighth International Conference on Computer Graphics, Imaging and Visualization (CGIV 2011), Singapore, pp. 145\u2013150","DOI":"10.1109\/CGIV.2011.31"},{"key":"9585_CR22","doi-asserted-by":"crossref","unstructured":"He, K, et al. (2017). Mask R-CNN. In: Proceedings of the IEEE International Conference on Computer Vision. Honolulu, HI, USA, Jul 22\u201325","DOI":"10.1109\/ICCV.2017.322"},{"key":"9585_CR23","doi-asserted-by":"crossref","unstructured":"He, K, et al.(2016). Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Las Vegas, NV, USA, Jun 26\u2013Jul 1","DOI":"10.1109\/CVPR.2016.90"},{"key":"9585_CR24","doi-asserted-by":"crossref","unstructured":"Hashmi MF, Anand V, Keskar AG (2014). Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform, ELSEVIER, AASRI Conf. Circuit Signal Process., pp. 84\u201391","DOI":"10.1016\/j.aasri.2014.09.015"},{"issue":"6","key":"9585_CR25","doi-asserted-by":"publisher","first-page":"3495","DOI":"10.1007\/s11042-015-2449-0","volume":"75","author":"W-C Hu","year":"2016","unstructured":"Hu W-C, Chen W-H, Huang D-Y, Yang C-Y (2016) Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimed Tools Appl 75(6):3495\u20133516","journal-title":"Multimed Tools Appl"},{"key":"9585_CR26","unstructured":"Hinton, GE, N Sriv astava, A Krizhevsky, I Sutskever, and RR Salakhutdinov (2012). Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580"},{"issue":"1","key":"9585_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00779-017-1061-x","volume":"22","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Yang C-N (2018) Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers Ubiquit Comput 22(1):11\u201322","journal-title":"Pers Ubiquit Comput"},{"key":"9585_CR28","doi-asserted-by":"crossref","unstructured":"Kohale T, Chede SD and Lakhe PR (2015). \u201cForgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method.\u201d International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 1, January","DOI":"10.17148\/IJARCCE.2015.4129"},{"key":"9585_CR29","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King DE (2009) Dlib-ml: a machine learning toolkit. J Mach Learn Res 10:1755\u20131758","journal-title":"J Mach Learn Res"},{"key":"9585_CR30","doi-asserted-by":"crossref","unstructured":"Kazemi, V, Sullivan, J (2014). One millisecond face alignment with an ensemble of regression trees. In: Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2014, Computer Society, pp. 1867\u20131874. IEEE, Washington, DC","DOI":"10.1109\/CVPR.2014.241"},{"issue":"4","key":"9585_CR31","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1080\/09720510.2017.1395181","volume":"20","author":"S Kumar","year":"2017","unstructured":"Kumar S, Nagori S (2017) Key-point based copy-move forgery detection in digital images. Journal of Statistics and Management Systems 20(4):611\u2013621","journal-title":"Journal of Statistics and Management Systems"},{"key":"9585_CR32","unstructured":"Krizhevsky, A I Sutskever, and GE Hinton (2012). Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097{1105"},{"key":"9585_CR33","doi-asserted-by":"crossref","unstructured":"Kumar, Manoj, Sangeet Srivastava, and Nafees Uddin. \u201cForgery detection using multiple light sources for synthetic images.\u201d Australian Journal of Forensic Sciences (2017): 1\u20138","DOI":"10.1080\/00450618.2017.1356871"},{"key":"9585_CR34","doi-asserted-by":"publisher","first-page":"26144","DOI":"10.1109\/ACCESS.2018.2831599","volume":"6","author":"L Laouamer","year":"2018","unstructured":"Laouamer L, Tayan O (2018) Performance evaluation of a document image watermarking approach with enhanced tamper localization and recovery. IEEE Access 6:26144\u201326166","journal-title":"IEEE Access"},{"issue":"3","key":"9585_CR35","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J et al (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10(3):507\u2013518","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9585_CR36","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1364\/JOSAA.7.002223","volume":"7","author":"BB Lee","year":"1990","unstructured":"Lee BB, Pokorny J (1990) Luminance and chromatic modulation sensitivity of macaque ganglion cells and human observers. JOSA A 7:2223\u20132236","journal-title":"JOSA A"},{"issue":"5","key":"9585_CR37","doi-asserted-by":"publisher","first-page":"13071322","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Y Li","year":"2019","unstructured":"Li Y, Zhou J (2019) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans. Inf. Forensics Security 14(5):13071322","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"9585_CR38","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"2","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. International journal of computer vision60 2:91\u2013110","journal-title":"International journal of computer vision60"},{"key":"9585_CR39","doi-asserted-by":"crossref","unstructured":"Leutenegger S, Chli M (2011). BRISK: Binary Robust Invariant Scalable Keypoints, IEEE int. Conf. Comp. Vis., pp 2548\u20132555","DOI":"10.1109\/ICCV.2011.6126542"},{"issue":"5","key":"9585_CR40","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1109\/TIFS.2017.2656823","volume":"12","author":"H Li","year":"2017","unstructured":"Li H, Luo W, Qiu X, Huang J (2017) Image forgery localization via integrating tampering possibility maps. IEEE Transactions on Information Forensics and Security 12(5):1240\u20131252","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9585_CR41","volume-title":"Face morphing detection: an approach based on image degradation analysis","author":"T Neubert","year":"2017","unstructured":"Neubert T (2017) Face morphing detection: an approach based on image degradation analysis. International Workshop on Digital Watermarking, Springer, Cham"},{"key":"9585_CR42","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1002\/ecj.11973","volume":"100.9","author":"Y Obara","year":"2017","unstructured":"Obara Y, Niwa Y, Wada S (2017) Detection and Identification of Image Manipulation Based on Reversible Histogram Shift. Electronics and Communications in Japan 100.9:13\u201322","journal-title":"Electronics and Communications in Japan"},{"issue":"7","key":"9585_CR43","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution grayscale and rotation invariant texture classification with local binary patterns. IEEE Trans on Pattern Analysis and Machine Intelligence 24(7):971\u2013987","journal-title":"IEEE Trans on Pattern Analysis and Machine Intelligence"},{"key":"9585_CR44","doi-asserted-by":"publisher","first-page":"1523346","DOI":"10.1080\/23311916.2018.1523346","volume":"5.1","author":"CS Prakash","year":"2018","unstructured":"Prakash CS et al (2018) Keypoint-based passive method for image manipulation detection. Cogent Engineering 5.1:1523346","journal-title":"Cogent Engineering"},{"key":"9585_CR45","doi-asserted-by":"crossref","unstructured":"Rao, Y, Ni, J (2016). A deep learning approach to detection of splicing and copy-move forgeries in images. In: Proceedings of the IEEE International Workshop on Information Forensics and Security. Abu Dhabi, UAE, Dec 4\u20137","DOI":"10.1109\/WIFS.2016.7823911"},{"issue":"6","key":"9585_CR46","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2016","unstructured":"Ren S, He K, Girshick R, Sun J (2016) Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans Pattern Anal Mach Intell 39(6):1137\u20131149","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9585_CR47","doi-asserted-by":"crossref","unstructured":"Rublee E, Rabaud V, Konolige K,Bradski G (2011). ORB: an efficient alternative to SIFT or SURF, international conference on computer vision, Barcelona, Nov. 6-13, pp. 2564\u2013257","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"9585_CR48","doi-asserted-by":"crossref","unstructured":"Seibold, Clemens, et al. (2017). \u201cDetection of face morphing attacks by deep learning.\u201d International Workshop on Digital Watermarking. Springer, Cham","DOI":"10.1007\/978-3-319-64185-0_9"},{"key":"9585_CR49","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/j.jvcir.2016.04.023","volume":"38","author":"D Singh","year":"2016","unstructured":"Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775\u2013789","journal-title":"J Vis Commun Image Represent"},{"key":"9585_CR50","unstructured":"Sundaram Meenakshi and Nandini, C. n.d.. \u201cImage retouching and it's detection - a survey\u201d International Journal of Research in Engineering and Technology eISSN: 2319\u20131163 | pISSN: 2321\u20137308"},{"key":"9585_CR51","unstructured":"Sundaram A Meenakshi, and C Nandini (2017). \u201cASRD: Algorithm for Spliced Region Detection in Digital Image Forensics.\u201d Computer Science On-line Conference. Springer, Cham"},{"key":"9585_CR52","doi-asserted-by":"crossref","unstructured":"Su B, Kaizhen Z (2012). Detection of Copy Forgery in Digital Images Based on LPP-SIFT., Int. Conf. Ind. Control Electron. Eng., pp. 1773\u20131776","DOI":"10.1109\/ICICEE.2012.469"},{"key":"9585_CR53","first-page":"416","volume-title":"Evaluation of image forgery detection using multi-scale weber local descriptors","author":"SQ Saleh","year":"2013","unstructured":"Saleh SQ, Hussain M, Muhammad G, Bebis G (2013) Evaluation of image forgery detection using multi-scale weber local descriptors. Proceedings International Symposium on Advances in Visual Computing, In, pp 416\u2013424"},{"key":"9585_CR54","doi-asserted-by":"publisher","first-page":"76437","DOI":"10.1109\/ACCESS.2018.2883588","volume":"6","author":"Z Shi","year":"2018","unstructured":"Shi Z, Shen X, Kang H, Lv Y (2018) Image manipulation detection and localization based on the dual-domain convolutional neural networks. IEEE Access 6:76437\u201376453","journal-title":"IEEE Access"},{"key":"9585_CR55","doi-asserted-by":"crossref","unstructured":"Toldo. R and A Fusiello (2008). \u201cRobust multiple structures estimation with J-Linkage,\u201d in Proc. Eur. Conf. Comput. Vision., Berlin, pp. 537547","DOI":"10.1007\/978-3-540-88682-2_41"},{"key":"9585_CR56","unstructured":"Vedaldi, A and B. Fulkerson (2008). \u201cVLFeat: An open and portable library of computer vision algorithms,\u201d http:\/\/www.vlfeat.org\/"},{"issue":"2","key":"9585_CR57","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10489-017-0893-4","volume":"47","author":"M-L Wu","year":"2017","unstructured":"Wu M-L, Fahn C-S, Chen Y-F (2017) Image-format-independent tampered image detection based on overlapping concurrent directional patterns and neural networks. Appl Intell 47(2):347\u2013361","journal-title":"Appl Intell"},{"key":"9585_CR58","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"D Williams","year":"1986","unstructured":"Williams D, Hinton G (1986) Learning representations by back propagating errors. Nature 323:533\u2013536","journal-title":"Nature"},{"key":"9585_CR59","doi-asserted-by":"crossref","unstructured":"Yang, Y, W Ren, Y Guo, R Wang and X Cao (2017). \u201cImage deblurring via extreme channels prior,\u201d in Procs. IEEE Int. Conf. Comp. Vision and Pattern Recognition (CVPR), Accepted","DOI":"10.1109\/CVPR.2017.738"},{"key":"9585_CR60","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-540-30548-4_21","volume":"3338","author":"G Zhang","year":"2005","unstructured":"Zhang G, Huang X (2005) Boosting local binary pattern (LBP)-based face recognition. Adv Biometr Person Authent 3338:179\u2013186","journal-title":"Adv Biometr Person Authent"},{"key":"9585_CR61","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhao C, Pi Y, Li S (2012). Revealing image splicing forgery using local binary patterns of DCT coefficients. In: Proceedings International Conference on Communications, Signal Processing, and Systems, pp. 181\u2013189","DOI":"10.1007\/978-1-4614-5803-6_19"},{"key":"9585_CR62","unstructured":"Zhang, Y, LL Win, J Goh, and VL Thing (2016). \u201cImage region forgery detection: A deep learning approach,\u201d in Proc. Singapore Cyber-Secur. Conf. (SG-CRC), pp. 111"},{"key":"9585_CR63","doi-asserted-by":"crossref","unstructured":"Zhang, Ying, and Vrizlynn LL Thing (2018). \u201cA semi-feature learning approach for tampered region localization across multi-format images.\u201d Multimedia Tools and Applications 1\u201326","DOI":"10.1007\/s11042-018-5756-4"}],"updated-by":[{"DOI":"10.1007\/s11042-024-20002-7","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T00:00:00Z","timestamp":1722988800000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09585-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09585-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09585-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T08:27:36Z","timestamp":1723192056000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09585-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,16]]},"references-count":63,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9585"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09585-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,16]]},"assertion":[{"value":"26 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2024","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-024-20002-7","URL":"https:\/\/doi.org\/10.1007\/s11042-024-20002-7","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}