{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:03:57Z","timestamp":1770915837315,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"21-23","license":[{"start":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:00:00Z","timestamp":1627344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:00:00Z","timestamp":1627344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11042-021-11174-7","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T20:02:48Z","timestamp":1627416168000},"page":"32219-32243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Copy move forgery detection using DCT, PatchMatch and cellular automata"],"prefix":"10.1007","volume":"80","author":[{"given":"Gulnawaz","family":"Gani","sequence":"first","affiliation":[]},{"given":"Fasel","family":"Qadir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,27]]},"reference":[{"issue":"11\u201312","key":"11174_CR1","doi-asserted-by":"publisher","first-page":"7355","DOI":"10.1007\/s11042-019-08495-z","volume":"79","author":"R Agarwal","year":"2020","unstructured":"Agarwal R, Verma OP (2020) An efficient copy move forgery detection using deep learning feature extraction and matching algorithm. Multimed Tools Appl 79(11\u201312):7355\u20137376. https:\/\/doi.org\/10.1007\/s11042-019-08495-z","journal-title":"Multimed Tools Appl"},{"issue":"24","key":"11174_CR2","doi-asserted-by":"publisher","first-page":"31807","DOI":"10.1007\/s11042-018-6201-4","volume":"77","author":"OM Al-Qershi","year":"2018","unstructured":"Al-Qershi OM, Khoo BE (2018) Evaluation of copy-move forgery detection: datasets and evaluation metrics. Multimed Tools Appl 77(24):31807\u201331833. https:\/\/doi.org\/10.1007\/s11042-018-6201-4","journal-title":"Multimed Tools Appl"},{"key":"11174_CR3","doi-asserted-by":"publisher","unstructured":"Al-Qershi OM, Khoo BE (2019) Enhanced block-based copy-move forgery detection using k-means clustering. Multidimen Syst Signal Process. https:\/\/doi.org\/10.1007\/s11045-018-0624-y","DOI":"10.1007\/s11045-018-0624-y"},{"issue":"3","key":"11174_CR4","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo AD, Serra G (2011) A SIFT-based forensic method for copy\u2013move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3):1099\u20131110. https:\/\/doi.org\/10.1109\/TIFS.2011.2129512","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11174_CR5","doi-asserted-by":"publisher","unstructured":"Ardizzone E, Bruno A., Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inform Forens Secur. https:\/\/doi.org\/10.1109\/TIFS.2015.2445742","DOI":"10.1109\/TIFS.2015.2445742"},{"key":"11174_CR6","doi-asserted-by":"publisher","unstructured":"Bakiah N, Warif A, Yamani M, Idris I, Wahid A, Wahab A, Salleh R, Ismail A (2018) CMF-iteMS:An automatic threshold selection for detection of copy-move forgery. Forens Sci Int. https:\/\/doi.org\/10.1016\/j.forsciint.2018.12.004","DOI":"10.1016\/j.forsciint.2018.12.004"},{"key":"11174_CR7","doi-asserted-by":"publisher","unstructured":"Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) PatchMatch: A randomized correspondence algorithm for structural image editing. ACM Trans Graph 28(3). https:\/\/doi.org\/10.1145\/1531326.1531330","DOI":"10.1145\/1531326.1531330"},{"key":"11174_CR8","doi-asserted-by":"publisher","unstructured":"Billings SA, Yang Y (2003) Identification of the neighborhood and CA rules from spatio-temporal CA patterns. In: IEEE transactions on systems, man and cybernetics Part B cybernetics. https:\/\/doi.org\/10.1109\/TSMCB.2003.810438","DOI":"10.1109\/TSMCB.2003.810438"},{"issue":"1\u20133","key":"11174_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1\u20133):33\u201343. https:\/\/doi.org\/10.1016\/j.forsciint.2011.07.015","journal-title":"Forensic Sci Int"},{"key":"11174_CR10","doi-asserted-by":"publisher","unstructured":"Chen CC, Lu WY, Chou CH (2019) Rotational copy-move forgery detection using SIFT and region growing strategies. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-7165-8","DOI":"10.1007\/s11042-019-7165-8"},{"key":"11174_CR11","doi-asserted-by":"publisher","unstructured":"Chen B, Tan W, Coatrieux G, Zheng Y, Shi YQ (2020) A serial image copy-move forgery localization scheme with source\/target distinguishment. IEEE Trans Multimed. https:\/\/doi.org\/10.1109\/TMM.2020.3026868","DOI":"10.1109\/TMM.2020.3026868"},{"issue":"6","key":"11174_CR12","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inform Forens Secur 7(6):1841\u20131854. https:\/\/doi.org\/10.1109\/TIFS.2012.2218597","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"11","key":"11174_CR13","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015a) Efficient dense-field copy-move forgery detection. IEEE Trans Inform Forens Secur 10(11):2284\u20132297. https:\/\/doi.org\/10.1109\/TIFS.2015.2455334","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"1\u20133","key":"11174_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"R Davarzani","year":"2013","unstructured":"Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231 (1\u20133):61\u201372. https:\/\/doi.org\/10.1016\/j.forsciint.2013.04.023","journal-title":"Forensic Sci Int"},{"key":"11174_CR15","doi-asserted-by":"publisher","first-page":"19167","DOI":"10.1007\/s11042-020-08751-7","volume":"79","author":"MA Elaskily","year":"2020","unstructured":"Elaskily MA, Elnemr HA, Sedik A, Dessouky MM, El Banby GM, Elshakankiry OA, Khalaf AAM, Aslan HK, Faragallah OS, Abd El-Samie FE (2020) A novel deep learning framework for copy-moveforgery detection in images. Multimed Tools Appl 79:19167\u201319192. https:\/\/doi.org\/10.1007\/s11042-020-08751-7","journal-title":"Multimed Tools Appl"},{"key":"11174_CR16","doi-asserted-by":"publisher","unstructured":"Fridrich J, Soukal D., Luk\u00e1\u0161 J (2003) Detection of copy-move forgery in digital images. Int J Comput Sci Issues. https:\/\/doi.org\/10.1109\/PACIIA.2008.240","DOI":"10.1109\/PACIIA.2008.240"},{"key":"11174_CR17","doi-asserted-by":"publisher","unstructured":"Gani G, Qadir F (2019) A novel method for digital image copy \u2013 move forgery detection and localization using evolving cellular automata and local binary patterns. Evol Syst 0123456789. https:\/\/doi.org\/10.1007\/s12530-019-09309-1","DOI":"10.1007\/s12530-019-09309-1"},{"key":"11174_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2017.03.013","volume":"0","author":"K Hayat","year":"2017","unstructured":"Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Comput Electr Eng 0:1\u201311. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.03.013","journal-title":"Comput Electr Eng"},{"key":"11174_CR19","doi-asserted-by":"publisher","unstructured":"Hong C, Yu J, Zhang J, Jin X, Lee KH (2019) Multimodal face-pose estimation with multitask manifold deep learning. IEEE Trans Indust Inform. https:\/\/doi.org\/10.1109\/TII.2018.2884211","DOI":"10.1109\/TII.2018.2884211"},{"issue":"1\u20133","key":"11174_CR20","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1\u20133):178\u2013184. https:\/\/doi.org\/10.1016\/j.forsciint.2010.08.001","journal-title":"Forensic Sci Int"},{"issue":"3","key":"11174_CR21","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1108\/IJICC-10-2017-0132","volume":"11","author":"Z Jeelani","year":"2018","unstructured":"Jeelani Z, Qadir F (2018) Cellular automata-based approach for digital image scrambling. Int J Intell Comput Cybern 11(3):353\u2013370. https:\/\/doi.org\/10.1108\/IJICC-10-2017-0132","journal-title":"Int J Intell Comput Cybern"},{"key":"11174_CR22","doi-asserted-by":"publisher","unstructured":"Jeelani Z, Qadir F (2019) Cellular automata-based approach for salt-and-pepper noise filtration. J King Saud Univ Comput Inform Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2018.12.006","DOI":"10.1016\/j.jksuci.2018.12.006"},{"key":"11174_CR23","doi-asserted-by":"publisher","unstructured":"Kaura WCN, Dhavale S (2018) Analysis of SIFT and SURF features for copy-move image forgery detection. In: Proceedings of 2017 international conference on innovations in information, embedded and communication systems ICIIECS. https:\/\/doi.org\/10.1109\/ICIIECS.2017.8276160, p 2017","DOI":"10.1109\/ICIIECS.2017.8276160"},{"key":"11174_CR24","unstructured":"Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inform Hid Multimed Signal Process"},{"issue":"c","key":"11174_CR25","doi-asserted-by":"publisher","first-page":"4376","DOI":"10.1109\/TIP.2019.2955241","volume":"29","author":"C Li","year":"2020","unstructured":"Li C, Guo C, Ren W, Cong R, Hou J, Kwong S, Tao D (2020) An underwater image enhancement benchmark dataset and beyond. IEEE Trans Image Process 29(c):4376\u20134389. https:\/\/doi.org\/10.1109\/TIP.2019.2955241","journal-title":"IEEE Trans Image Process"},{"key":"11174_CR26","doi-asserted-by":"publisher","unstructured":"Lin C, Lu W, Huang X, Liu K, Sun W, Lin H., Tan Z (2019) Copy-move forgery detection using combined features and transitive matching. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6922-4","DOI":"10.1007\/s11042-018-6922-4"},{"key":"11174_CR27","doi-asserted-by":"publisher","unstructured":"Liu Y, Wang H, Chen Y, Wu H., Wang H (2020) A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-08044-8","DOI":"10.1007\/s11042-019-08044-8"},{"key":"11174_CR28","doi-asserted-by":"publisher","unstructured":"Mahmood T, Irtaza A, Mehmood Z, Tariq Mahmood M (2017) Copy\u2013move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int. https:\/\/doi.org\/10.1016\/j.forsciint.2017.07.037","DOI":"10.1016\/j.forsciint.2017.07.037"},{"key":"11174_CR29","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202\u2013214. https:\/\/doi.org\/10.1016\/j.jvcir.2018.03.015","journal-title":"J Vis Commun Image Represent"},{"key":"11174_CR30","doi-asserted-by":"publisher","unstructured":"Nightingale SJ, Wade KA, Watson DG (2017) Can people identify original and manipulated photos of real-world scenes? Cognit Res Princip Impli 2(1). https:\/\/doi.org\/10.1186\/s41235-017-0067-2","DOI":"10.1186\/s41235-017-0067-2"},{"issue":"1","key":"11174_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62\u201366. https:\/\/doi.org\/10.1109\/TSMC.1979.4310076","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"11174_CR32","doi-asserted-by":"publisher","unstructured":"Rosin PL (2010) Image processing using 3-state cellular automata. Computer Vision and Image Understanding. https:\/\/doi.org\/10.1016\/j.cviu.2010.02.005","DOI":"10.1016\/j.cviu.2010.02.005"},{"key":"11174_CR33","doi-asserted-by":"publisher","unstructured":"Roy A, Konda A, Chakraborty RS (2018) Copy move forgery detection with similar but genuine objects. In: Proceedings - international conference on image processing, ICIP. https:\/\/doi.org\/10.1109\/ICIP.2017.8297050","DOI":"10.1109\/ICIP.2017.8297050"},{"key":"11174_CR34","doi-asserted-by":"publisher","unstructured":"Roy A, Dixit R, Naskar R, Chakraborty RS (2020) Copy-move forgery detection with similar but genuine objects. In: Studies in computational intelligence. https:\/\/doi.org\/10.1007\/978-981-10-7644-2_5","DOI":"10.1007\/978-981-10-7644-2_5"},{"key":"11174_CR35","doi-asserted-by":"publisher","unstructured":"Roy S, Shrivastava M, Pandey CV, Nayak SK, Rawat U (2020) IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09880-9","DOI":"10.1007\/s11042-020-09880-9"},{"key":"11174_CR36","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.jisa.2019.01.007","volume":"45","author":"B Soni","year":"2019","unstructured":"Soni B, Das PK, Meitei D (2019) Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features. J Inform Secur Appl 45:44\u201351. https:\/\/doi.org\/10.1016\/j.jisa.2019.01.007","journal-title":"J Inform Secur Appl"},{"key":"11174_CR37","doi-asserted-by":"publisher","unstructured":"Sun X, Rosin PL, Martin RR (2011) Fast rule identification and neighborhood selection for cellular automata. In: IEEE Transactions on Systems, Man and Cybernetics Part B Cybernetics. https:\/\/doi.org\/10.1109\/TSMCB.2010.2091271","DOI":"10.1109\/TSMCB.2010.2091271"},{"issue":"c","key":"11174_CR38","doi-asserted-by":"publisher","first-page":"40550","DOI":"10.1109\/ACCESS.2019.2907316","volume":"7","author":"S Teerakanok","year":"2019","unstructured":"Teerakanok S, Uehara T (2019) Copy-move forgery detection: A state-of-the-art technical review and analysis. IEEE Access 7(c):40550\u201340568. https:\/\/doi.org\/10.1109\/ACCESS.2019.2907316","journal-title":"IEEE Access"},{"key":"11174_CR39","unstructured":"Tralic D, Zupancic I, Grgic SGM (2013) New Database for Copy-Move Forgery Detection-CoMoFoD. 55th International Symposium ELMAR, 49\u201354. http:\/\/www.vcl.fer.hr\/comofod\/"},{"issue":"24","key":"11174_CR40","doi-asserted-by":"publisher","first-page":"16881","DOI":"10.1007\/s11042-015-2961-2","volume":"75","author":"D Tralic","year":"2016","unstructured":"Tralic D, Grgic S, Sun X, Rosin PL (2016) Combining cellular automata and local binary patterns for copy-move forgery detection. Multimed Tools Appl 75(24):16881\u201316903. https:\/\/doi.org\/10.1007\/s11042-015-2961-2","journal-title":"Multimed Tools Appl"},{"key":"11174_CR41","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1155\/2018\/6853696","volume":"2018","author":"H Wang","year":"2018","unstructured":"Wang H, Wang H (2018) Perceptual hashing-based image copy-move forgery detection. Secur Commun Netw 2018:11. Article ID 6853696 . https:\/\/doi.org\/10.1155\/2018\/6853696","journal-title":"Secur Commun Netw"},{"key":"11174_CR42","doi-asserted-by":"publisher","unstructured":"Wang C, Zhang Z, Li Q, Zhou X (2019) An image copy-move forgery detection method based on SURF and PCET. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2019.2955308","DOI":"10.1109\/ACCESS.2019.2955308"},{"key":"11174_CR43","unstructured":"Wolfram S (2002) A new kind of science. In Wolfram Media. Wolfram Media. www.wolframscience.com"},{"key":"11174_CR44","doi-asserted-by":"publisher","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: Detecting copy-move image forgery with source\/target localization. In: Ferrari V, Hebert M, Sminchisescu C, Weiss Y (eds) Computer vision \u2013 ECCV 2018. ECCV 2018. Lecture notes in computer science. 11210 LNCS, 170\u2013186. https:\/\/doi.org\/10.1007\/978-3-030-01231-1_11, vol 11210. Springer, Cham","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"11174_CR45","doi-asserted-by":"publisher","unstructured":"Yang B, Sun X, Guo H, Xia Z., Chen X (2018) A copy-move forgery detection method based on CMFD-SIFT. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-016-4289-y","DOI":"10.1007\/s11042-016-4289-y"},{"key":"11174_CR46","doi-asserted-by":"publisher","unstructured":"Yu J, Tan M, Zhang H, Tao D, Rui Y (2019) Hierarchical Deep Click Feature Prediction for Fine-grained Image Recognition. IEEE Trans Pattern Anal Mach Intell. https:\/\/doi.org\/10.1109\/tpami.2019.2932058","DOI":"10.1109\/tpami.2019.2932058"},{"issue":"1\u20133","key":"11174_CR47","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1\u20133):158\u2013166. https:\/\/doi.org\/10.1016\/j.forsciint.2013.09.013","journal-title":"Forensic Sci Int"},{"issue":"c","key":"11174_CR48","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/tifs.2019.2957693","volume":"15","author":"J-L Zhong","year":"2019","unstructured":"Zhong J-L, Pun C-M (2019) An end-to-end dense-inceptionnet for image copy-move forgery detection. IEEE Trans Inform Forens Secur 15(c):2134\u20132146. https:\/\/doi.org\/10.1109\/tifs.2019.2957693","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"11174_CR49","doi-asserted-by":"publisher","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition. https:\/\/doi.org\/10.1109\/CVPR.2018.00116","DOI":"10.1109\/CVPR.2018.00116"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11174-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11174-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11174-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T04:53:26Z","timestamp":1633841606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11174-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,27]]},"references-count":49,"journal-issue":{"issue":"21-23","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["11174"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11174-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,27]]},"assertion":[{"value":"18 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}