{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:11:42Z","timestamp":1765041102736,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T00:00:00Z","timestamp":1599868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T00:00:00Z","timestamp":1599868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-020-09623-w","type":"journal-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T15:02:39Z","timestamp":1599922959000},"page":"17025-17044","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A deep multimodal system for provenance filtering with universal forgery detection and localization"],"prefix":"10.1007","volume":"80","author":[{"given":"Saira","family":"Jabeen","sequence":"first","affiliation":[]},{"given":"Usman Ghani","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Razi","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Mithun","family":"Mukherjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-0533","authenticated-orcid":false,"given":"Jaime","family":"Lloret","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"9623_CR1","unstructured":"Murabayashi A (2018) The problem of fake photos in fake news. https:\/\/petapixel.com\/2017\/01\/19\/problem-fake-photos-fake-news\/, Accessed: 2019-01-11"},{"key":"9623_CR2","unstructured":"Fridrich AJ, Soukal BD, Luk\u00e1\u0161 AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, Citeseer"},{"issue":"6","key":"9623_CR3","doi-asserted-by":"publisher","first-page":"6165","DOI":"10.3390\/s110606165","volume":"11","author":"J Lloret","year":"2011","unstructured":"Lloret J, Bosch I, Sendra S, Serrano A (2011) A wireless sensor network for vineyard monitoring that uses image processing. Sensors 11(6):6165\u20136196","journal-title":"Sensors"},{"issue":"3","key":"9623_CR4","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"GK Birajdar","year":"2013","unstructured":"Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Elsevier Digital investigation 10(3):226\u2013245","journal-title":"Elsevier Digital investigation"},{"issue":"2","key":"9623_CR5","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid H (2009) Image forgery detection. IEEE Signal Process. Mag. 26(2):16\u201325","journal-title":"IEEE Signal Process. Mag."},{"issue":"1","key":"9623_CR6","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"100","author":"N Ahmed","year":"1974","unstructured":"Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE transactions on Computers 100(1):90\u201393","journal-title":"IEEE transactions on Computers"},{"issue":"2","key":"9623_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. International journal of computer vision 60(2):91\u2013110","journal-title":"International journal of computer vision"},{"key":"9623_CR8","doi-asserted-by":"crossref","unstructured":"Bay H, Tuytelaars T, VanGool L (2006) Surf: Speeded up robust features. In: European conference on computer vision, Springer, pp 404\u2013417","DOI":"10.1007\/11744023_32"},{"issue":"3","key":"9623_CR9","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, DelBimbo A, Serra G (2011) A sift-based forensic method for copy\u2013move attack detection and transformation recovery. IEEE Trans. Informat. Forensics and Security 6(3):1099\u20131110","journal-title":"IEEE Trans. Informat. Forensics and Security"},{"issue":"4","key":"9623_CR10","first-page":"199","volume":"8","author":"BL Shivakumar","year":"2011","unstructured":"Shivakumar BL, Baboo SS (2011) Detection of region duplication forgery in digital images using surf. International Journal of Computer Science Issues (IJCSI) 8(4):199","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"issue":"10","key":"9623_CR11","doi-asserted-by":"publisher","first-page":"5747","DOI":"10.1109\/TII.2019.2925624","volume":"15","author":"MH Bhatti","year":"2019","unstructured":"Bhatti MH, Khan J, Khan M UG, Iqbal R, Aloqaily M, Jararweh Y, Gupta B (2019) Soft computing-based eeg classification by optimal feature selection and neural networks. IEEE Transactions on Industrial Informatics 15 (10):5747\u20135754","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"9623_CR12","doi-asserted-by":"publisher","first-page":"72622","DOI":"10.1109\/ACCESS.2019.2918275","volume":"7","author":"MZ Khan","year":"2019","unstructured":"Khan MZ, Harous S, Hassan SU, Khan M UG, Iqbal R, Mumtaz S (2019) Deep unified model for face recognition based on convolution neural network and edge computing. IEEE Access 7:72622\u201372633","journal-title":"IEEE Access"},{"issue":"3","key":"9623_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M, Berg AC, Fei-Fei L (2015) ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV) 115(3):211\u2013252. https:\/\/doi.org\/10.1007\/s11263-015-0816-y","journal-title":"International Journal of Computer Vision (IJCV)"},{"key":"9623_CR14","unstructured":"Simonyan K, Zisserman A (2014Sept.) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"9623_CR15","doi-asserted-by":"crossref","unstructured":"Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), IEEE, pp 1\u20136","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"9623_CR16","doi-asserted-by":"crossref","unstructured":"Bayar B, Stamm MC (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, ACM, pp 5\u201310","DOI":"10.1145\/2909827.2930786"},{"issue":"11","key":"9623_CR17","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters 22(11):1849\u20131853","journal-title":"IEEE Signal Processing Letters"},{"key":"9623_CR18","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2018September) Busternet: Detecting copy-move image forgery with source\/target localization. In: Proceedings of the European Conference on Computer Vision (ECCV), pp 168\u2013184","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"9623_CR19","doi-asserted-by":"crossref","unstructured":"Pinto A, Moreira D, Bharati A, Brogan J, Bowyer K, Flynn P, Scheirer W, Rocha A (2017) Provenance filtering for multimedia phylogeny. In: 2017 IEEE International Conference on Image Processing (ICIP), IEEE, pp 1502\u20131506","DOI":"10.1109\/ICIP.2017.8296532"},{"issue":"3","key":"9623_CR20","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1080\/00450618.2016.1153711","volume":"49","author":"K Asghar","year":"2017","unstructured":"Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Taylor & Francis Australian Journal of Forensic Sciences 49(3):281\u2013307","journal-title":"Taylor & Francis Australian Journal of Forensic Sciences"},{"key":"9623_CR21","unstructured":"Steinbach M, Karypis G, Kumar V, et al. (2000) A comparison of document clustering techniques. In: KDD workshop on text mining, vol 400, Boston, pp 525\u2013526"},{"key":"9623_CR22","doi-asserted-by":"crossref","unstructured":"Bo X, Junwen W, Guangjie L, Yuewei D (2010) Image copy-move forgery detection based on surf. In: Proc. IEEE Int. Conf. on Multimedia Information Netw. and Security, pp 889\u2013892","DOI":"10.1109\/MINES.2010.189"},{"key":"9623_CR23","doi-asserted-by":"crossref","unstructured":"Qu Z, Qiu G, Huang J (2009) Detect digital image splicing with visual cues. In: Springer Int. workshop on Information hiding, pp 247\u2013261","DOI":"10.1007\/978-3-642-04431-1_18"},{"key":"9623_CR24","doi-asserted-by":"crossref","unstructured":"Lin SD, Wu T (2011) An integrated technique for splicing and copy-move forgery image detection. In: Proc. IEEE 4th International Congress on Image and Signal Processing, vol 2, pp 1086\u20131090","DOI":"10.1109\/CISP.2011.6100366"},{"issue":"11","key":"9623_CR25","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin Z, He J, Tang X, Tang C-K (2009) Fast, automatic and fine-grained tampered jpeg image detection via dct coefficient analysis. Pattern Recogn 42(11):2492\u20132501","journal-title":"Pattern Recogn"},{"issue":"1-3","key":"9623_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic science international 214 (1-3):33\u201343","journal-title":"Forensic science international"},{"key":"9623_CR27","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202\u2013214","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"9623_CR28","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","volume":"25","author":"G Muhammad","year":"2014","unstructured":"Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985\u2013995","journal-title":"Mach Vis Appl"},{"key":"9623_CR29","unstructured":"Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks?. In: Prof. Advances in neural information processing systems, pp 3320\u20133328"},{"issue":"5","key":"9623_CR30","doi-asserted-by":"publisher","first-page":"2897","DOI":"10.1007\/s11042-015-2521-9","volume":"75","author":"P Wang","year":"2016","unstructured":"Wang P, Wei Z, Xiao L (2016) Pure spatial rich model features for digital image steganalysis. Multimedia Tools and Applications 75(5):2897\u20132912","journal-title":"Multimedia Tools and Applications"},{"issue":"9","key":"9623_CR31","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X Kang","year":"2013","unstructured":"Kang X, Stamm MC, Peng A, Liu KJRay (2013) Robust median filtering forensics using an autoregressive model. IEEE Transactions on Information Forensics and Security 8(9):1456\u20131468","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"9623_CR32","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TIFS.2011.2161761","volume":"6","author":"H-D Yuan","year":"2011","unstructured":"Yuan H-D (2011) Blind forensics of median filtering in digital images. IEEE Transactions on Information Forensics and Security 6(4):1335\u20131345","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9623_CR33","doi-asserted-by":"crossref","unstructured":"Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images. In: 2010 IEEE International Conference on Multimedia and Expo, IEEE, pp 89\u201394","DOI":"10.1109\/ICME.2010.5583869"},{"key":"9623_CR34","doi-asserted-by":"crossref","unstructured":"Bunk J, Bappy JH, Mohammed TM, Nataraj L, Flenner A, Manjunath BS, Chandrasekaran S, Roy-Chowdhury AK, Peterson L (2017) Detection and localization of image forgeries using resampling features and deep learning. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), IEEE, pp 1881\u20131889","DOI":"10.1109\/CVPRW.2017.235"},{"key":"9623_CR35","doi-asserted-by":"crossref","unstructured":"Helgason S, Helgason S (1999) The radon transform. Springer, vol 2","DOI":"10.1007\/978-1-4757-1463-0"},{"key":"9623_CR36","doi-asserted-by":"crossref","unstructured":"Chum O, Philbin J, Zisserman A, et al. (2008September) Near duplicate image detection: min-hash and tf-idf weighting.. In: BMVC, vol 810, pp 812\u2013815","DOI":"10.5244\/C.22.50"},{"key":"9623_CR37","unstructured":"Li M, Wang B, Ma W-Y, Li Z (2010) Detecting duplicate images using hash code grouping, Google Patents. US Patent 7,647,331"},{"key":"9623_CR38","doi-asserted-by":"crossref","unstructured":"Dong W, Wang Z, Charikar M, Li K (2012) High-confidence near-duplicate image detection. In: Proceedings of the 2nd acm international conference on multimedia retrieval, ACM, p 1","DOI":"10.1145\/2324796.2324798"},{"key":"9623_CR39","doi-asserted-by":"publisher","first-page":"7355","DOI":"10.1007\/s11042-019-08495-z","volume":"79","author":"R Agarwal","year":"2019","unstructured":"Agarwal R, Verma OP (2019) An efficient copy move forgery detection using deep learning feature extraction and matching algorithm. Multimedia Tools and Applications 79:7355\u20137376","journal-title":"Multimedia Tools and Applications"},{"key":"9623_CR40","doi-asserted-by":"crossref","unstructured":"Jaiswal AK, Srivastava R (2019) Image splicing detection using deep residual network. Available at SSRN 3351072","DOI":"10.2139\/ssrn.3351072"},{"key":"9623_CR41","doi-asserted-by":"crossref","unstructured":"Ahmed B, Gulliver TA, et al. (2020) Image splicing detection using mask-rcnn. SIViP, pp 1\u20138","DOI":"10.1007\/s11760-020-01636-0"},{"issue":"1-3","key":"9623_CR42","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2013.05.002","volume":"231","author":"Z Dias","year":"2013","unstructured":"Dias Z, Goldenstein S, Rocha A (2013) Toward image phylogeny forests: Automatically recovering semantically similar image relationships. Forensic science international 231(1-3):178\u2013189","journal-title":"Forensic science international"},{"key":"9623_CR43","unstructured":"(2016) Nist media forensics challenge. https:\/\/www.nist.gov\/itl\/iad\/mig\/media-forensics-challenge, Accessed: 2018-07-26"},{"key":"9623_CR44","unstructured":"Medibrowser. http:\/\/medifor.rankone.io\/"},{"issue":"12","key":"9623_CR45","doi-asserted-by":"publisher","first-page":"6109","DOI":"10.1109\/TIP.2018.2865674","volume":"27","author":"D Moreira","year":"2018","unstructured":"Moreira D, Bharati A, Brogan J, Pinto A, Parowski M, Bowyer KW, Flynn PJ, Rocha A, Scheirer WJ (2018) Image provenance analysis at scale. IEEE Trans Image Process 27(12):6109\u20136123","journal-title":"IEEE Trans Image Process"},{"key":"9623_CR46","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"9623_CR47","doi-asserted-by":"crossref","unstructured":"Wojna Z, Ferrari V, Guadarrama S, Silberman N, Chen L-C, Fathi A, Uijlings J (2017July) The devil is in the decoder. arXiv preprint arXiv:1707.05847","DOI":"10.5244\/C.31.10"},{"key":"9623_CR48","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, IEEE, pp 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"9623_CR49","unstructured":"Tralic D, Zupancic I, Grgic S, Grgic M (2013) Comofodnew database for copy-move forgery detection. In: Proceedings ELMAR-2013, IEEE, pp 49\u201354"},{"key":"9623_CR50","unstructured":"(2018) Nist media forensics challenge. https:\/\/www.nist.gov\/itl\/iad\/mig\/media-forensics-challenge-2018, Accessed: 2019-06-11"},{"issue":"6","key":"9623_CR51","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on information forensics and security 7(6):1841\u20131854","journal-title":"IEEE Transactions on information forensics and security"},{"issue":"11","key":"9623_CR52","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy\u2013move forgery detection. IEEE Transactions on Information Forensics and Security 10 (11):2284\u20132297","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9623_CR53","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2017) Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. In: Proceedings of the 25th ACM international conference on Multimedia, ACM, pp 1480\u20131502","DOI":"10.1145\/3123266.3123411"},{"key":"9623_CR54","doi-asserted-by":"crossref","unstructured":"Garcia M, Canovas A, Edo M, Lloret J (2008) A QoE management system for ubiquitous IPTV devices. In: The Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM)","DOI":"10.1109\/UBICOMM.2009.31"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09623-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09623-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09623-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,11]],"date-time":"2021-09-11T23:29:55Z","timestamp":1631402995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09623-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,12]]},"references-count":54,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["9623"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09623-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,9,12]]},"assertion":[{"value":"28 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}