{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T07:40:28Z","timestamp":1770018028791,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-021-10925-w","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T14:07:17Z","timestamp":1620050837000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Digital image forensic using deep flower pollination with adaptive Harris hawk optimization"],"prefix":"10.1007","author":[{"given":"M.","family":"Sabeena","sequence":"first","affiliation":[]},{"given":"Lizy","family":"Abraham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,1]]},"reference":[{"issue":"2","key":"10925_CR1","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.fcij.2018.03.001","volume":"3","author":"HA Alberry","year":"2018","unstructured":"Alberry HA, Hegazy AA, Salama GI (2018) A fast SIFT based method for copy move forgery detection. Future Comput Inf J 3(2):159\u2013165","journal-title":"Future Comput Inf J"},{"issue":"1","key":"10925_CR2","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"MH Alkawaz","year":"2018","unstructured":"Alkawaz MH, Sulong G, Saba T, Rehman A (2018 Jul 1) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput & Applic 30(1):183\u2013192","journal-title":"Neural Comput & Applic"},{"issue":"1","key":"10925_CR3","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"SG AlkawazMH","year":"2018","unstructured":"AlkawazMH SG, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput & Applic 30(1):183\u2013192","journal-title":"Neural Comput & Applic"},{"key":"10925_CR4","doi-asserted-by":"crossref","first-page":"76529","DOI":"10.1109\/ACCESS.2019.2921545","volume":"7","author":"X Bao","year":"2019","unstructured":"Bao X, Jia H, Lang C (2019) A novel hybrid Harris hawks optimization for color image multilevel Thresholding segmentation. IEEE Access 7:76529\u201376546","journal-title":"IEEE Access"},{"issue":"7","key":"10925_CR5","doi-asserted-by":"crossref","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","volume":"28","author":"JH Bappy","year":"2019","unstructured":"Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid LSTM and encoder\u2013decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286\u20133300","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"10925_CR6","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/s11042-016-4276-3","volume":"77","author":"XL Bi","year":"2018","unstructured":"Bi XL, Pun C-M, Yuan X-C (2018) Multi-scale feature extraction and adaptive matching for copy-move forgery detection. Multimed Tools Appl 77(1):363\u2013385","journal-title":"Multimed Tools Appl"},{"key":"10925_CR7","doi-asserted-by":"crossref","first-page":"56637","DOI":"10.1109\/ACCESS.2018.2871952","volume":"6","author":"B Chen","year":"2018","unstructured":"Chen B, Yu M, Su Q, Shim HJ, Shi Y-Q (2018) Fractional quaternion Zernike moments for robust color image copy-move forgery detection. IEEE Access 6:56637\u201356646","journal-title":"IEEE Access"},{"issue":"7","key":"10925_CR8","doi-asserted-by":"crossref","first-page":"8057","DOI":"10.1007\/s11042-018-6595-z","volume":"78","author":"B Chen","year":"2019","unstructured":"Chen B, Yu M, Su Q, Li L (2019) Fractional quaternion cosine transform and its application in color image copy-move forgery detection. Multimed Tools Appl 78(7):8057\u20138073","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10925_CR9","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10925_CR10","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G and Verdoliva L (2013) Copy-move forgery detection based on PatchMatch, in IEEE International Conference on Image, 5312\u20135316.","DOI":"10.1109\/ICIP.2014.7026075"},{"issue":"5","key":"10925_CR11","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1049\/iet-ipr.2016.0537","volume":"11","author":"R Dixit","year":"2017","unstructured":"Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD. IET Image Process 11(5):301\u2013309","journal-title":"IET Image Process"},{"key":"10925_CR12","doi-asserted-by":"crossref","unstructured":"Dong P, Galatsanos NP (2002) Affine transformation resistant watermarking based on image normalization. In: Image processing. Proceedings. 2002 International Conference on 489\u2013492","DOI":"10.1109\/ICIP.2002.1039014"},{"issue":"11","key":"10925_CR13","doi-asserted-by":"crossref","first-page":"15353","DOI":"10.1007\/s11042-018-6891-7","volume":"78","author":"EHA ElaskilyMA","year":"2019","unstructured":"ElaskilyMA EHA, Dessouky MM, Faragallah OS (2019) Two stages object recognition based copy-move forgery detection algorithm. Multimed Tools Appl 78(11):15353\u201315373","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"10925_CR14","doi-asserted-by":"crossref","first-page":"1932","DOI":"10.1109\/TIFS.2018.2806926","volume":"13","author":"Y Guo","year":"2018","unstructured":"Guo Y, Cao X, Zhang W, Wang R (2018) Fake colorized image detection. IEEE Trans Inf Forensics Secur 13(8):1932\u20131944","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"10925_CR15","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.1049\/iet-ipr.2018.5356","volume":"13","author":"KM Hosny","year":"2019","unstructured":"Hosny KM, Hamza HM, Lashin NA (2019) Copy-for-duplication forgery detection in colour images using QPCETMs and sub-image approach. IET Image Process 13(9):1437\u20131446","journal-title":"IET Image Process"},{"issue":"8","key":"10925_CR16","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TCSVT.2003.815955","volume":"13","author":"LH-K Kim HS","year":"2003","unstructured":"Kim HS LH-K (2003) Invariant image watermark using Zernike moments. IEEE Trans CircSyst Video Technol 13(8):766\u2013775","journal-title":"IEEE Trans CircSyst Video Technol"},{"issue":"2","key":"10925_CR17","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1080\/00450618.2017.1356868","volume":"51","author":"M Kumar","year":"2019","unstructured":"Kumar M, Srivastava S (2019) Image forgery detection based on physics and pixels: a study. Australian J Forensic Sci 51(2):119\u2013134","journal-title":"Australian J Forensic Sci"},{"key":"10925_CR18","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.jvcir.2015.07.007","volume":"31","author":"JC Lee","year":"2015","unstructured":"Lee JC (2015 Aug 1) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320\u2013334","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"10925_CR19","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10925_CR20","doi-asserted-by":"crossref","unstructured":"Liao X, Huang Z (2020) A framework for parameters estimation of image operator chain. InICASSP 2020-2020 IEEE international conference on acoustics, speech and signal processing (ICASSP) 2787-2791.","DOI":"10.1109\/ICASSP40776.2020.9053926"},{"issue":"5","key":"10925_CR21","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, Zhu X, Liu KR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Selected Topics Signal Process 14(5):955\u2013968","journal-title":"IEEE J Selected Topics Signal Process"},{"issue":"4","key":"10925_CR22","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/TCSVT.2004.825555","volume":"14","author":"AW-C Liew","year":"2004","unstructured":"Liew AW-C, Yan H (2004) Blockingartifacts suppression in block-coded images using overcomplete wavelet representation. IEEE Trans. Circuits Syst Video Technol 14(4):450\u2013461","journal-title":"IEEE Trans. Circuits Syst Video Technol"},{"key":"10925_CR23","doi-asserted-by":"crossref","unstructured":"Liu K, Lu W, Lin C, Huang X, Liu X, Yeung Y and Xue Y (2019) Copy move forgery detection based on keypoint and patch match. Multimedia tools and applications 1-27.","DOI":"10.1007\/s11042-019-07930-5"},{"key":"10925_CR24","doi-asserted-by":"crossref","unstructured":"LiuY ZX, Zhao X, Cao Y (2019) Adversarial learning for constrained image splicing detection and localization based on Atrous convolution. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2019.2902826"},{"key":"10925_CR25","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202\u2013214","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"10925_CR26","doi-asserted-by":"crossref","first-page":"1762","DOI":"10.1109\/TIFS.2018.2799421","volume":"13","author":"O Mayer","year":"2018","unstructured":"Mayer O, Stammm MC (2018) Accurate and efficient image forgery detection using lateral chromatic aberration. IEEE Trans Inf Forensics Secur 13(7):1762\u20131777","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10925_CR27","first-page":"35","volume":"3","author":"RT Nageswara","year":"2008","unstructured":"Nageswara RT, Srinivasa KD (2008) Image compression using discrete cosine transform. Comput Sci Telecommun 3:35\u201344","journal-title":"Comput Sci Telecommun"},{"key":"10925_CR28","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.forsciint.2017.11.031","volume":"283","author":"A Novoz\u00e1msk\u00fd","year":"2018","unstructured":"Novoz\u00e1msk\u00fd A, \u0160orel M (2018) Detection of copy-move image modification using JPEG compression model. Forensic Sci Int 283:47\u201357","journal-title":"Forensic Sci Int"},{"issue":"2","key":"10925_CR29","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s42044-019-00029-y","volume":"2","author":"KZH ParveenA","year":"2019","unstructured":"ParveenA KZH, Ahmad SN (2019) Block-based copy\u2013move image forgery detection using DCT. Iran J Comput Sci 2(2):89\u201399","journal-title":"Iran J Comput Sci"},{"key":"10925_CR30","unstructured":"Xin Y, Liao S, Pawlak M (2004) Amultibit geometrically robust image watermark based on Zernike moments. In: Pattern recognition. ICPR 2004. Proceedings of the 17th International Conference on 861\u2013864."},{"issue":"8","key":"10925_CR31","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive over segmentation and feature points matching. IEEE Trans Inf Forensics Secur 10(8):1705\u20131716","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10925_CR32","doi-asserted-by":"crossref","first-page":"5241","DOI":"10.1007\/s11042-017-4426-2","volume":"77","author":"BS Rao","year":"2018","unstructured":"Rao BS (2018) A fuzzy fusion approach for modified contrast enhancement based image forensics against attacks. Multimed Tools Appl 77(5):5241\u20135261","journal-title":"Multimed Tools Appl"},{"key":"10925_CR33","doi-asserted-by":"crossref","unstructured":"Roy A, Konda A and Chakraborty RS (2017) Copy move forgery detection with similar but genuine objects. In proceeding of International Conference on Image Processing (ICIP), IEEE, 4083\u20134087.","DOI":"10.1109\/ICIP.2017.8297050"},{"issue":"8","key":"10925_CR34","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355\u20131370","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10925_CR35","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum R, Ren Y, Kuo CC (2018) Image splicing localization using a multi-task fully convolutional network (MFCN). J Vis Commun Image Represent 51:201\u2013209","journal-title":"J Vis Commun Image Represent"},{"key":"10925_CR36","doi-asserted-by":"crossref","unstructured":"Sridevi M, Aishwarya S, Nidheesha A and Bokadia D (2019) Parallel image forgery detection using FREAK descriptor. In Information and Communication Technology for Intelligent Systems, Springer, Singapore, 619\u2013630.","DOI":"10.1007\/978-981-13-1747-7_61"},{"issue":"3","key":"10925_CR37","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MC Stamm","year":"2011","unstructured":"Stamm MC, Liu KR (2011) Anti-forensics of digital image compression. IEEE Tran Inf Forensics Secur 6(3):1050\u20131065","journal-title":"IEEE Tran Inf Forensics Secur"},{"key":"10925_CR38","doi-asserted-by":"crossref","unstructured":"Sun Y, Ni R and Zhao Y (2018) Nonoverlapping Blocks Based Copy-Move Forgery Detection Security and Communication Networks 2018.","DOI":"10.1155\/2018\/1301290"},{"key":"10925_CR39","unstructured":"Tralic D, Zupancic I, Grgic S and Grgic M (2013) CoMoFoD - New database for copy-move forgery detection, in Proceedingsof the 55th International Symposium ELMAR 2013, hrv, 49 54."},{"key":"10925_CR40","first-page":"23","volume":"44","author":"D Vaishnavi","year":"2019","unstructured":"Vaishnavi D, Subashini TS (2019) Application of local invariant symmetry features to detect and localize image copy move forgeries. J Inf Secur Appl 44:23\u201331","journal-title":"J Inf Secur Appl"},{"issue":"7","key":"10925_CR41","doi-asserted-by":"crossref","first-page":"1336","DOI":"10.1109\/TIFS.2015.2407698","volume":"10","author":"X Wang","year":"2015","unstructured":"Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Trans Inf Forensics Secur 10(7):1336\u20131349","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"22","key":"10925_CR42","doi-asserted-by":"crossref","first-page":"23353","DOI":"10.1007\/s11042-016-4140-5","volume":"76","author":"X-Y Wang","year":"2017","unstructured":"Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z-L (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multimed Tools Appl 76(22):23353\u201323382","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10925_CR43","doi-asserted-by":"crossref","first-page":"3630","DOI":"10.1007\/s10489-018-1168-4","volume":"48","author":"X-Y Wang","year":"2018","unstructured":"Wang X-Y, Jiao L-X, Wang X-B, Yang H-Y, Niu P-P (2018) A new keypoint-based copy-move forgery detection for color image. Appl Intell 48(10):3630\u20133652","journal-title":"Appl Intell"},{"key":"10925_CR44","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2018) Image copy-move forgery detection via an end-to-end deep neural network. In2018 IEEE winter conference on applications of computer vision (WACV) 1907-1915.","DOI":"10.1109\/WACV.2018.00211"},{"key":"10925_CR45","unstructured":"Xie X, Li G, Wang Z, Zhang C, Li D, Li X (2005) A novel method of lossy image compression for digital image sensors with Bayer color filter arrays. In2005 IEEE international symposium on circuits and systems 4995-4998."},{"key":"10925_CR46","doi-asserted-by":"crossref","unstructured":"Yang XS (2012) Flower pollination algorithm for global optimization. In International conference on unconventional computing and natural computation, Springer, Berlin, Heidelberg, 240\u2013249.","DOI":"10.1007\/978-3-642-32894-7_27"},{"issue":"1","key":"10925_CR47","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1007\/s11042-013-1405-0","volume":"72","author":"X-C Yuan","year":"2014","unstructured":"Yuan X-C, Pun C-M (2014) Feature extraction and local Zernike moments based geometric invariant watermarking. Multimed Tools Appl 72(1):777\u2013799","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10925_CR48","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TCSVT.2007.906942","volume":"18","author":"G Zhai","year":"2008","unstructured":"Zhai G, Zhang W, Yang X, Lin W, Xu Y (2008) Efficient image deblocking based on postfiltering in shifted windows. IEEE Trans. Circuits Syst Video Technol 18(1):122\u2013126","journal-title":"IEEE Trans. Circuits Syst Video Technol"},{"key":"10925_CR49","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. InProceedings of the IEEE conference on computer vision and pattern recognition, 1053-1061.","DOI":"10.1109\/CVPR.2018.00116"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10925-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10925-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10925-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T14:20:48Z","timestamp":1620051648000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10925-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,1]]},"references-count":49,"alternative-id":["10925"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10925-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,1]]},"assertion":[{"value":"14 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}