{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:30:35Z","timestamp":1774593035452,"version":"3.50.1"},"reference-count":120,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11042-022-13808-w","type":"journal-article","created":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T04:02:42Z","timestamp":1664596962000},"page":"18117-18150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation"],"prefix":"10.1007","volume":"82","author":[{"given":"Preeti","family":"Sharma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5113-0639","authenticated-orcid":false,"given":"Manoj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Hitesh","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,1]]},"reference":[{"key":"13808_CR1","doi-asserted-by":"publisher","unstructured":"Amerini I, Uricchio T, Ballan L, Caldelli R (2017) Localization of JPEG double compression through multi-domain convolutional neural networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp 1865\u20131871. https:\/\/doi.org\/10.1109\/CVPRW.2017.233","DOI":"10.1109\/CVPRW.2017.233"},{"issue":"1","key":"13808_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/09747338.2014.921415","volume":"55","author":"MD Ansari","year":"2014","unstructured":"Ansari MD, Ghrera SP, Tyagi V (2014) Pixel-based image forgery detection: a review. IETE J Educ 55(1):40\u201346","journal-title":"IETE J Educ"},{"issue":"7","key":"13808_CR3","doi-asserted-by":"publisher","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","volume":"28","author":"JH Bappy","year":"2019","unstructured":"Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid lstm and encoder\u2013decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286\u20133300","journal-title":"IEEE Trans Image Process"},{"key":"13808_CR4","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"Barni M, Bondi L, Bonettini N, Bestagini P, Costanzo A, Maggini M, Tondi B, Tubaro S (2017) Aligned and non-aligned double JPEG detection using convolutional neural networks. J Vis Commun Image Represent 49:153\u2013163","journal-title":"J Vis Commun Image Represent"},{"key":"13808_CR5","doi-asserted-by":"publisher","unstructured":"Barni M, Costanzo A, Nowroozi E, Tondi B (2018) CNN-based detection of generic contrast adjustment with JPEG post-processing. In: 2018 25th IEEE International Conference on Image Processing (ICIP), pp 3803\u20133807. https:\/\/doi.org\/10.1109\/ICIP.2018.8451698","DOI":"10.1109\/ICIP.2018.8451698"},{"issue":"3","key":"13808_CR6","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/LSP.2016.2641006","volume":"24","author":"L Bondi","year":"2016","unstructured":"Bondi L, Baroffio L, G\u00fcera D, Bestagini P, Delp EJ, Tubaro S (2016) First steps toward camera model identification with convolutional neural networks. IEEE Signal Process Lett 24(3):259\u2013263","journal-title":"IEEE Signal Process Lett"},{"issue":"11","key":"13808_CR7","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.3390\/sym12111811","volume":"12","author":"S Bourouis","year":"2020","unstructured":"Bourouis S, Alroobaea R, Alharbi AM, Andejany M, Rubaiee S (2020) Recent advances in digital multimedia tampering detection for forensics analysis. Symmetry 12(11):1811","journal-title":"Symmetry"},{"key":"13808_CR8","doi-asserted-by":"publisher","unstructured":"Bunk J, Bappy JH, Mohammed TM, Nataraj L, Flenner A, Manjunath BS, ..., Peterson L (2017) Detection and localization of image forgeries using resampling features and deep learning. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp\u00a01881\u20131889. https:\/\/doi.org\/10.1109\/CVPRW.2017.235","DOI":"10.1109\/CVPRW.2017.235"},{"key":"13808_CR9","doi-asserted-by":"publisher","unstructured":"Camacho IC, Wang K (2021) Data-dependent scaling of CNN\u2019s first layer for improved image manipulation detection. In: Digital Forensics and Watermarking: 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25\u201327, 2020, Revised Selected Papers. Springer Nature, vol. 12617, p 208. https:\/\/doi.org\/10.1007\/978-3-030-69449-4_16","DOI":"10.1007\/978-3-030-69449-4_16"},{"issue":"4","key":"13808_CR10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.3390\/jimaging7040069","volume":"7","author":"I Castillo Camacho","year":"2021","unstructured":"Castillo Camacho I, Wang K (2021) A comprehensive review of Deep-learning-based methods for image forensics. J Imaging 7(4):69","journal-title":"J Imaging"},{"key":"13808_CR11","doi-asserted-by":"publisher","unstructured":"Chaitra B, Reddy PVB (2019) A study on digital image forgery techniques and its detection. In: 2019 International Conference on contemporary Computing and Informatics (IC3I), pp 127\u2013130. https:\/\/doi.org\/10.1109\/IC3I46837.2019.9055573","DOI":"10.1109\/IC3I46837.2019.9055573"},{"key":"13808_CR12","doi-asserted-by":"publisher","unstructured":"Cozzolino, D, Verdoliva, L (2020) Noiseprint: A CNN-based camera model fingerprint. IEEE Trans Inf Forensics Secur 15:144\u2013159. https:\/\/doi.org\/10.1109\/TIFS.2019.2916364","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"13808_CR13","doi-asserted-by":"publisher","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2017) Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In:\u00a0Proceedings of the 5th ACM Workshop on Information\u00a0Hiding and Multimedia Security, pp 159\u2013164. https:\/\/doi.org\/10.1145\/3082031.3083247","DOI":"10.1145\/3082031.3083247"},{"key":"13808_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.image.2018.04.006","volume":"66","author":"ER De Rezende","year":"2018","unstructured":"De Rezende ER, Ruppert GC, Theophilo A, Tokuda EK, Carvalho T (2018) Exposing computer generated images by using deep convolutional neural networks. Signal Process Image Commun 66:113\u2013126","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"13808_CR15","first-page":"486","volume":"7","author":"C Deep Kaur","year":"2019","unstructured":"Deep Kaur C, Kanwal N (2019) An analysis of image forgery detection techniques. Statistics, Optim Inf Comput 7(2):486\u2013500","journal-title":"Statistics, Optim Inf Comput"},{"key":"13808_CR16","unstructured":"Deng H, Qiu Y (2019) Image-level forgery identification and pixel level forgery localization via a convolutional neural network. NIPS"},{"key":"13808_CR17","doi-asserted-by":"publisher","unstructured":"Diallo B, Urruty T, Bourdon P, Fernandez-Maloigne C (2019) Improving robustness of image tampering detection for compression. In: International Conference on Multimedia Modeling. Springer, Cham, pp 387\u2013398. https:\/\/doi.org\/10.1007\/978-3-030-05710-7_32","DOI":"10.1007\/978-3-030-05710-7_32"},{"key":"13808_CR18","doi-asserted-by":"publisher","first-page":"25878","DOI":"10.1109\/ACCESS.2019.2897360","volume":"7","author":"X Ding","year":"2019","unstructured":"Ding X, Chen Y, Tang Z, Huang Y (2019) Camera identification based on domain knowledge-driven deep multi-task learning. IEEE Access 7:25878\u201325890. https:\/\/doi.org\/10.1109\/ACCESS.2019.2897360","journal-title":"IEEE Access"},{"issue":"1","key":"13808_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-020-0101-7","volume":"2020","author":"X Ding","year":"2020","unstructured":"Ding X, Raziei Z, Larson EC, Olinick EV, Krueger P, Hahsler M (2020) Swapped face detection using deep learning and subjective assessment. EURASIP J Inf Secur 2020(1):1\u201312","journal-title":"EURASIP J Inf Secur"},{"issue":"16","key":"13808_CR20","first-page":"1","volume":"49","author":"KK Doke","year":"2012","unstructured":"Doke KK, Patil SM (2012) Digital signature scheme for image. Int J Comput Appl 49(16):1\u20136","journal-title":"Int J Comput Appl"},{"issue":"23","key":"13808_CR21","doi-asserted-by":"publisher","first-page":"7901","DOI":"10.3390\/s21237901","volume":"21","author":"L Eversberg","year":"2021","unstructured":"Eversberg L, Lambrecht J (2021) Generating images with physics-based rendering for an industrial object detection task: realism versus domain randomization. Sensors 21(23):7901","journal-title":"Sensors"},{"key":"13808_CR22","unstructured":"Fan W, Wang K, Cayre F, Xiong Z (2012) 3D lighting-based image forgery detection using shape-from-shading. In:\u00a02012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO), pp 1777\u20131781"},{"key":"13808_CR23","doi-asserted-by":"publisher","unstructured":"Fan Y, Carr\u00e9 P, Fernandez-Maloigne C (2015) Image splicing detection with local illumination estimation. In: 2015 IEEE International Conference on Image Processing (ICIP), pp 2940\u20132944.\u00a0https:\/\/doi.org\/10.1109\/ICIP.2015.7351341","DOI":"10.1109\/ICIP.2015.7351341"},{"issue":"5","key":"13808_CR24","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans Inf Forensic Secur 7(5):1566\u20131577","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"13808_CR25","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.patrec.2018.01.005","volume":"126","author":"D Freire-Obreg\u00f3n","year":"2019","unstructured":"Freire-Obreg\u00f3n D, Narducci F, Barra S, Castrill\u00f3n-Santana M (2019) Deep learning for source camera identification on mobile devices. Pattern Recogn Lett 126:86\u201391","journal-title":"Pattern Recogn Lett"},{"key":"13808_CR26","volume-title":"In digital image forensics (pp. 179\u2013218)","author":"J Fridrich","year":"2013","unstructured":"Fridrich J (2013) Sensor defects in digital image forensic. In: In digital image forensics (pp. 179\u2013218). Springer, New York, NY Sensor"},{"key":"13808_CR27","first-page":"146","volume":"6","author":"GKS Gaharwar","year":"2015","unstructured":"Gaharwar GKS, Nath PVV, Gaharwar RD (2015) Comprehensive Study of Different Types Image Forgeries. Int J Sci Technol Manag 6:146\u2013151","journal-title":"Int J Sci Technol Manag"},{"issue":"7","key":"13808_CR28","doi-asserted-by":"publisher","first-page":"119","DOI":"10.3390\/jimaging7070119","volume":"7","author":"M Gardella","year":"2021","unstructured":"Gardella M, Mus\u00e9 P, Morel JM, Colom M (2021) Forgery detection in digital images by multi-scale noise estimation. J Imaging 7(7):119","journal-title":"J Imaging"},{"key":"13808_CR29","doi-asserted-by":"crossref","unstructured":"Geradts ZJ, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh N (2001) Methods for identification of images acquired with digital cameras. In enabling technologies for law enforcement and security. Int Soc Opt Photonics 4232:505\u2013512","DOI":"10.1117\/12.417569"},{"key":"13808_CR30","doi-asserted-by":"publisher","unstructured":"Gill NK, Garg R, Doegar EA (2017) A review paper on digital image forgery detection techniques. In: 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT),\u00a0pp 1\u20137. https:\/\/doi.org\/10.1109\/ICCCNT.2017.8203904","DOI":"10.1109\/ICCCNT.2017.8203904"},{"key":"13808_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/WCN\/2006\/73685","volume":"2006","author":"G Ginesu","year":"2006","unstructured":"Ginesu G, Giusto DD, Onali T (2006) Mutual image-based authentication framework with JPEG2000 in wireless environment. EURASIP J Wirel Commun Netw 2006:1\u201314","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"13808_CR32","unstructured":"Glorot X, Bordes A, Bengio Y (2011) Deep sparse rectifier neural networks. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, in Proceedings of Machine Learning Research 15:315\u2013323. https:\/\/proceedings.mlr.press\/v15\/glorot11a.html"},{"key":"13808_CR33","first-page":"5","volume":"3","author":"A Gupta","year":"2013","unstructured":"Gupta A, Saxena N, Vasistha SK (2013) Detecting copy-move forgery using DCT. Int J Sci Res Publ 3:5","journal-title":"Int J Sci Res Publ"},{"key":"13808_CR34","doi-asserted-by":"crossref","unstructured":"Hashmi MF, Anand V, Keskar A (2014) Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia 9:84\u201391. https:\/\/doi.org\/10.1016\/j.aasri.2014.09.015","DOI":"10.1016\/j.aasri.2014.09.015"},{"issue":"17","key":"13808_CR35","doi-asserted-by":"publisher","first-page":"4743","DOI":"10.3390\/s20174743","volume":"20","author":"P He","year":"2020","unstructured":"He P, Li H, Wang H, Zhang R (2020) Detection of computer graphics using attention-based dual-branch convolutional neural network from fused color components. Sensors 20(17):4743","journal-title":"Sensors"},{"key":"13808_CR36","doi-asserted-by":"crossref","unstructured":"Huh M, Liu A, Owens A, Efros AA (2018) Fighting fake news: image splice detection via learned self-consistency. In: Proceedings of the European Conference on Computer Vision (ECCV), pp 101\u2013117","DOI":"10.1007\/978-3-030-01252-6_7"},{"issue":"4","key":"13808_CR37","doi-asserted-by":"publisher","first-page":"1540016","DOI":"10.1142\/s0218213015400163","volume":"24","author":"M Hussain","year":"2015","unstructured":"Hussain M, Qasem S, Bebis G, Muhammad G, Aboalsamh H, Mathkour H (2015) Evaluation of image forgery detection using multi-scale weber local descriptors. Int J Artif Intell Tools 24(4):1540016","journal-title":"Int J Artif Intell Tools"},{"key":"13808_CR38","doi-asserted-by":"publisher","unstructured":"Johnson MK, Farid H (2006) Exposing digital forgeries through chromatic aberration. In:\u00a0Proceedings of the 8th workshop on Multimedia and security, pp 48\u201355. https:\/\/doi.org\/10.1145\/1161366.1161376","DOI":"10.1145\/1161366.1161376"},{"key":"13808_CR39","unstructured":"Johnson MK, Farid H (2006) Metric measurements on a plane from a single image. Computer Science Technical Report TR2006-579. https:\/\/digitalcommons.dartmouth.edu\/cs_tr\/288"},{"key":"13808_CR40","unstructured":"Joudar NE, Ettaouil M (2021) KRR-CNN: kernels redundancy reduction in convolutional neural networks. Neural Comput & Applic:1\u201312"},{"key":"13808_CR41","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.swevo.2019.05.010","volume":"49","author":"FEF Junior","year":"2019","unstructured":"Junior FEF, Yen GG (2019) Particle swarm optimization of deep neural networks architectures for image classification. Swarm Evol Comput 49:62\u201374","journal-title":"Swarm Evol Comput"},{"key":"13808_CR42","doi-asserted-by":"publisher","unstructured":"Kashyap A, Parmar RS, Agrawal M, Gupta H (2017) An evaluation of digital image forgery detection approaches.\u00a0arXiv preprint arXiv: 1703.09968. https:\/\/doi.org\/10.48550\/arXiv.1703.09968","DOI":"10.48550\/arXiv.1703.09968"},{"issue":"4","key":"13808_CR43","first-page":"18","volume":"1","author":"A Kaur","year":"2016","unstructured":"Kaur A, Rani J (2016) Digital Image Forgery and Techniques of Forgery Detection. Int J Tech Res Sci 1(4):18\u201324 [Online]. Available: www.ijtrs.com","journal-title":"Int J Tech Res Sci"},{"key":"13808_CR44","doi-asserted-by":"publisher","unstructured":"Kee E, Farid H (2010) Exposing digital forgeries from 3-D lighting environments. In: 2010 IEEE International Workshop on Information Forensics and Security, pp 1\u20136. https:\/\/doi.org\/10.1109\/WIFS.2010.5711437","DOI":"10.1109\/WIFS.2010.5711437"},{"key":"13808_CR45","doi-asserted-by":"publisher","unstructured":"Khalid H, Woo SS (2020) OC-FakeDect: classifying deepfakes using one-class variational autoencoder. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp 2794\u20132803. https:\/\/doi.org\/10.1109\/CVPRW50498.2020.00336","DOI":"10.1109\/CVPRW50498.2020.00336"},{"issue":"5","key":"13808_CR46","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MCE.2020.3003127","volume":"10","author":"RK Koppanati","year":"2020","unstructured":"Koppanati RK, Kumar K (2020) P-MEC: polynomial congruence-based multimedia encryption technique over cloud. IEEE Consum Electron Mag 10(5):41\u201346. https:\/\/doi.org\/10.1109\/MCE.2020.3003127","journal-title":"IEEE Consum Electron Mag"},{"key":"13808_CR47","doi-asserted-by":"publisher","unstructured":"Koppanati RK, Qamar S, Kumar K (2018) SMALL: secure multimedia technique using logistic and LFSR. In: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), pp 1820\u20131825. https:\/\/doi.org\/10.1109\/ICCONS.2018.8662840","DOI":"10.1109\/ICCONS.2018.8662840"},{"key":"13808_CR48","doi-asserted-by":"publisher","unstructured":"Koppanati RK, Kumar K, Qamar S (2021) E-MOC: an efficient secret sharing model for multimedia on cloud. In: Tripathi M, Upadhyaya S (eds) Conference Proceedings of ICDLAIR2019. Lecture Notes in Networks and Systems, vol 175. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-67187-7_26","DOI":"10.1007\/978-3-030-67187-7_26"},{"key":"13808_CR49","volume-title":"In computational vision and bio inspired computing (pp. 1129\u20131140)","author":"M Kumar","year":"2018","unstructured":"Kumar M, Srivastava S (2018) Image tampering detection based on inherent lighting fingerprints. In: In computational vision and bio inspired computing (pp. 1129\u20131140). Springer, Cham"},{"issue":"2","key":"13808_CR50","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1080\/00450618.2017.1356868","volume":"51","author":"M Kumar","year":"2019","unstructured":"Kumar M, Srivastava S (2019) Image forgery detection based on physics and pixels: a study. Australian J Forensic Sci 51(2):119\u2013134","journal-title":"Australian J Forensic Sci"},{"issue":"9","key":"13808_CR51","doi-asserted-by":"publisher","first-page":"12451","DOI":"10.1007\/s11042-018-6775-x","volume":"78","author":"M Kumar","year":"2019","unstructured":"Kumar M, Srivastava S (2019) Image authentication by assessing manipulations using illumination. Multimed Tools Appl 78(9):12451\u201312463","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"13808_CR52","doi-asserted-by":"publisher","first-page":"2560","DOI":"10.1166\/jctn.2018.7498","volume":"15","author":"BS Kumar","year":"2018","unstructured":"Kumar BS, Karthi S, Karthika K, Cristin R (2018) A systematic study of image forgery detection. J Comput Theor Nanosci 15(8):2560\u20132564","journal-title":"J Comput Theor Nanosci"},{"issue":"03","key":"13808_CR53","doi-asserted-by":"publisher","first-page":"1950014","DOI":"10.1142\/S0219467819500141","volume":"19","author":"M Kumar","year":"2019","unstructured":"Kumar M, Rani A, Srivastava S (2019) Image forensics based on lighting estimation. Int J Image Graph 19(03):1950014","journal-title":"Int J Image Graph"},{"issue":"3","key":"13808_CR54","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/00450618.2017.1356871","volume":"51","author":"M Kumar","year":"2019","unstructured":"Kumar M, Srivastava S, Uddin N (2019) Forgery detection using multiple light sources for synthetic images. Australian J Forensic Sci 51(3):243\u2013250","journal-title":"Australian J Forensic Sci"},{"key":"13808_CR55","doi-asserted-by":"publisher","first-page":"107256","DOI":"10.1016\/j.asoc.2021.107256","volume":"105","author":"S Lee","year":"2021","unstructured":"Lee S, Tariq S, Shin Y, Woo SS (2021) Detecting handcrafted facial image manipulations and GAN-generated facial images using shallow-FakeFaceNet. Appl Soft Comput 105:107256","journal-title":"Appl Soft Comput"},{"issue":"1","key":"13808_CR56","first-page":"46","volume":"4","author":"L Li","year":"2013","unstructured":"Li L, Li S, Zhu H, Chu SC, Roddick JF, Pan JS (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multim Signal Process 4(1):46\u201356","journal-title":"J Inf Hiding Multim Signal Process"},{"key":"13808_CR57","doi-asserted-by":"publisher","unstructured":"Liu Q, Sung AH (2009) A new approach for JPEG resize and image splicing detection. In: Proceedings of the First ACM workshop on Multimedia in forensics, pp 43\u201348. https:\/\/doi.org\/10.1145\/1631081.1631092","DOI":"10.1145\/1631081.1631092"},{"issue":"14","key":"13808_CR58","doi-asserted-by":"publisher","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","volume":"77","author":"Y Liu","year":"2018","unstructured":"Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimed Tools Appl 77(14):18269\u201318293","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"13808_CR59","doi-asserted-by":"publisher","first-page":"858","DOI":"10.3390\/electronics9050858","volume":"9","author":"M Lu","year":"2020","unstructured":"Lu M, Niu S (2020) A detection approach using LSTM-CNN for object removal caused by exemplar-based image inpainting. Electronics 9(5):858","journal-title":"Electronics"},{"key":"13808_CR60","doi-asserted-by":"publisher","unstructured":"Lu S, Hu X, Wang C, Chen L, Han S, Han Y (2022) Copy-move image forgery detection based on evolving circular domains coverage.\u00a0Multimed Tools Appl: 1\u201326. https:\/\/doi.org\/10.1007\/s11042-022-12755-w","DOI":"10.1007\/s11042-022-12755-w"},{"issue":"3\u20134","key":"13808_CR61","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.diin.2011.06.004","volume":"8","author":"SD Mahalakshmi","year":"2012","unstructured":"Mahalakshmi SD, Vijayalakshmi K, Priyadharsini S (2012) Digital image forgery detection and estimation by exploring basic image manipulations. Digit Investig 8(3\u20134):215\u2013225","journal-title":"Digit Investig"},{"key":"13808_CR62","doi-asserted-by":"crossref","unstructured":"Mantri A, Singh N, Kumar K, Dahiya S (2022) Pre-encryption and identification (PEI): an anti-crypto ransomware technique. IETE J Res:1\u20139","DOI":"10.1080\/03772063.2022.2048706"},{"key":"13808_CR63","doi-asserted-by":"publisher","unstructured":"Manupriya P, Sinha S, Kumar K (2017) V\u2295 SEE: video secret sharing encryption technique. In: 2017 Conference on Information and Communication Technology (CICT), pp 1\u20136. https:\/\/doi.org\/10.1109\/INFOCOMTECH.2017.8340639","DOI":"10.1109\/INFOCOMTECH.2017.8340639"},{"key":"13808_CR64","doi-asserted-by":"publisher","unstructured":"Marra F, Gragnaniello D, Cozzolino D, Verdoliva L (2018) Detection of Gan-generated fake images over social networks. In: 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), pp 384\u2013389. https:\/\/doi.org\/10.1109\/MIPR.2018.00084","DOI":"10.1109\/MIPR.2018.00084"},{"key":"13808_CR65","volume-title":"Image forgery detection: survey and future directions. In data, engineering and applications (pp. 163\u2013194)","author":"KB Meena","year":"2019","unstructured":"Meena KB, Tyagi V (2019) Image Forgery Detection: Survey and Future Directions. In: Image forgery detection: survey and future directions. In data, engineering and applications (pp. 163\u2013194). Springer, Singapore"},{"key":"13808_CR66","unstructured":"Mohite VD, Athawale U, Athawale S, Vidyapeeth B, Mumbai N (2019), \u201cSurvey on Recent Image Forgeries and their Detection Methods. Int J Res Eng Appl Manag, 02, (pp. 885\u2013892) (IJREAM)"},{"key":"13808_CR67","doi-asserted-by":"publisher","unstructured":"Morgand A, Tamaazousti M, Bartoli A (2018) A geometric model for specularity prediction on planar surfaces with multiple light sources. IEEE Trans Vis Comput Graph 24(5):1691\u20131704. https:\/\/doi.org\/10.1109\/TVCG.2017.2677445","DOI":"10.1109\/TVCG.2017.2677445"},{"key":"13808_CR68","doi-asserted-by":"publisher","unstructured":"Morgand A, Tamaazousti M, Bartoli A (2021) A Multiple-View Geometric Model for Specularity Prediction on Non-Uniformly Curved Surfaces. arXiv preprint arXiv:2108.09378.\u00a0https:\/\/doi.org\/10.48550\/arXiv.2108.09378","DOI":"10.48550\/arXiv.2108.09378"},{"key":"13808_CR69","doi-asserted-by":"publisher","unstructured":"Mushtaq S, Mir A (2014) Digital image forgeries and passive image authentication techniques: a survey. Int J Adv Sci Technol 73:15\u201332. https:\/\/doi.org\/10.14257\/ijast.2014.73.02","DOI":"10.14257\/ijast.2014.73.02"},{"key":"13808_CR70","doi-asserted-by":"publisher","unstructured":"Ng TT, Chang SF, Hsu J, Xie L, Tsui MP (2005) Physics-motivated features for distinguishing photographic images and computer graphics. In: Proceedings of the 13th annual ACM international conference on Multimedia, pp 239\u2013248. https:\/\/doi.org\/10.1145\/1101149.1101192","DOI":"10.1145\/1101149.1101192"},{"key":"13808_CR71","doi-asserted-by":"publisher","unstructured":"Nguyen HH, Yamagish J, Echizen I (2019) Capsule-forensics: using capsule networks to detect forged images and videos. In: ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 2307\u20132311. https:\/\/doi.org\/10.1109\/ICASSP.2019.8682602","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"13808_CR72","doi-asserted-by":"publisher","unstructured":"Nirmalkar N, Kamble S, Kakde S (2015) A review of image forgery techniques and their detection. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICIIECS.2015.7193177","DOI":"10.1109\/ICIIECS.2015.7193177"},{"issue":"1","key":"13808_CR73","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2077341.2077345","volume":"31","author":"JF O'brien","year":"2012","unstructured":"O'brien JF, Farid H (2012) Exposing photo manipulation with inconsistent reflections. ACM Trans Graph 31(1):4\u20131","journal-title":"ACM Trans Graph"},{"key":"13808_CR74","doi-asserted-by":"publisher","unstructured":"Pan X, Zhang X, Lyu S (2011) Exposing image forgery with blind noise estimation. In: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, pp 15\u201320. https:\/\/doi.org\/10.1145\/2037252.2037256","DOI":"10.1145\/2037252.2037256"},{"key":"13808_CR75","doi-asserted-by":"crossref","unstructured":"Park, J, Cho, D, Ahn, W, Lee, HK (2018) Double JPEG detection in mixed JPEG quality factors using deep convolutional neural network. In proceedings of the European conference on computer vision (ECCV) (pp. 636-652)","DOI":"10.1007\/978-3-030-01228-1_39"},{"issue":"7","key":"13808_CR76","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1039\/f19848001757","volume":"80","author":"Z Pawlak","year":"1984","unstructured":"Pawlak Z, Tusk M, Kuna S, Strohbusch F, Fox MF (1984) pH dependence of hydrogen bonding in complexes between trimethyl-N-oxide and pentachlorophenol and trifluoroacetic acid in acetonitrile. J Chem Soc Faraday Trans 1: Phys Chem Condensed Phases 80(7):1757\u20131768","journal-title":"J Chem Soc Faraday Trans 1: Phys Chem Condensed Phases"},{"issue":"2","key":"13808_CR77","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1109\/TIFS.2016.2623589","volume":"12","author":"B Peng","year":"2016","unstructured":"Peng B, Wang W, Dong J, Tan T (2016) Optimized 3D lighting environment estimation for image forgery detection. IEEE Trans Inf Forensic Secur 12(2):479\u2013494","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"13808_CR78","unstructured":"Pine, J, Nicolas, H (2001) Estimation 2d illuminant direction and shadow segmentation in natural video sequences. In proceedings of VLBV (p. 197)"},{"key":"13808_CR79","unstructured":"Pinel JM, Nicolas H, Bris CL (2001) Estimation of 2D illuminant direction and shadow segmentation in natural video sequences. Proceedings of VLBV, pp 197\u2013202"},{"key":"13808_CR80","unstructured":"Popescu, AC, Farid, H (2004) Exposing digital forgeries by detecting duplicated image regions. Tech. The report, TR2004-515, dep. Comput. Sci. Dartmouth Coll. Hanover, new Hampsh., no. 2000,( pp. 1\u201311) [online]. Available: http:\/\/os2.zemris.fer.hr\/ostalo\/2010_marceta\/Diplomski_files\/102.pdf. Accessed 20 Aug\u00a02021"},{"issue":"10","key":"13808_CR81","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948\u20133959","journal-title":"IEEE Trans Signal Process"},{"key":"13808_CR82","doi-asserted-by":"publisher","unstructured":"Qureshi MA, Deriche M (2014) A review on copy move image forgery detection techniques. In: 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14), pp 1\u20135. https:\/\/doi.org\/10.1109\/SSD.2014.6808907","DOI":"10.1109\/SSD.2014.6808907"},{"issue":"5","key":"13808_CR83","first-page":"418","volume":"9","author":"A Raja","year":"2021","unstructured":"Raja A (2021) Active and Passive Detection of Image Forgery: A Review Analysis. IJERT- Proc 9(5):418\u2013424","journal-title":"IJERT- Proc"},{"key":"13808_CR84","volume-title":"Image modelling: a feature detection approach for Steganalysis. In international conference on advances in computing and data sciences (pp. 140-148)","author":"A Rani","year":"2016","unstructured":"Rani A, Kumar M, Goel P (2016) Image modelling: a feature detection approach for Steganalysis. In international conference on advances in computing and data sciences (pp. 140-148). Springer, Singapore"},{"issue":"16","key":"13808_CR85","doi-asserted-by":"publisher","first-page":"23877","DOI":"10.1007\/s11042-021-10810-6","volume":"80","author":"A Rani","year":"2021","unstructured":"Rani A, Jain A, Kumar M (2021) Identification of copy-move and splicing based forgeries using advanced SURF and revised template matching. Multimed Tools Appl 80(16):23877\u201323898","journal-title":"Multimed Tools Appl"},{"key":"13808_CR86","doi-asserted-by":"publisher","unstructured":"Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp 1\u20136. https:\/\/doi.org\/10.1109\/WIFS.2016.7823911","DOI":"10.1109\/WIFS.2016.7823911"},{"issue":"2","key":"13808_CR87","first-page":"1485","volume":"8","author":"V Reddy","year":"2021","unstructured":"Reddy V, Vaghdevi K, Kolli D (2021) Digital image forgery detection using SUPER pixel segmentation and HYBRID feature point mapping. European J Molecular Clin Med 8(2):1485\u20131500","journal-title":"European J Molecular Clin Med"},{"issue":"1","key":"13808_CR88","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ijcard.2004.04.006","volume":"102","author":"LE Rohde","year":"2005","unstructured":"Rohde LE, Clausell N, Ribeiro JP, Goldraich L, Netto R, Dec GW, \u2026 Polanczyk CA (2005) Health outcomes in decompensated congestive heart failure: a comparison of tertiary hospitals in Brazil and United States. Int J Cardiol 102(1):71\u201377","journal-title":"Int J Cardiol"},{"key":"13808_CR89","doi-asserted-by":"publisher","unstructured":"Roy A, Chakraborty RS, Sameer VU, Naskar R (2017) Camera source identification using discrete cosine transform residue features and ensemble classifier. In: CVPR workshops, pp\u00a01848\u20131854. https:\/\/doi.org\/10.1109\/CVPRW.2017.231","DOI":"10.1109\/CVPRW.2017.231"},{"issue":"3","key":"13808_CR90","doi-asserted-by":"publisher","first-page":"361","DOI":"10.25046\/aj050347","volume":"5","author":"AH Saber","year":"2020","unstructured":"Saber AH, Khan MA, Mejbel BG (2020) A survey on image forgery detection using different forensic approaches. Adv Sci Technol Eng Syst J 5(3):361\u2013370","journal-title":"Adv Sci Technol Eng Syst J"},{"key":"13808_CR91","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum R, Ren Y, Kuo CCJ (2018) Image splicing localization using a multi-task fully convolutional network (MFCN). J Vis Commun Image Represent 51:201\u2013209","journal-title":"J Vis Commun Image Represent"},{"key":"13808_CR92","doi-asserted-by":"publisher","unstructured":"San Choi K, Lam EY, Wong KK (2006) Source camera identification using footprints from lens aberration. In:\u00a0Proc. SPIE 6069, Digital Photography II, 60690J (10 February 2006). https:\/\/doi.org\/10.1117\/12.649775","DOI":"10.1117\/12.649775"},{"key":"13808_CR93","volume-title":"In proceedings of 2nd international conference on computer vision & image processing (pp. 51-62)","author":"S Sharma","year":"2018","unstructured":"Sharma S, Kumar K (2018) Guess: genetic uses in video encryption with secret sharing. In: In proceedings of 2nd international conference on computer vision & image processing (pp. 51-62). Springer, Singapore"},{"key":"13808_CR94","doi-asserted-by":"publisher","unstructured":"Sharma S, Kumar K, Singh N (2017) D-FES: Deep facial expression recognition system. In: 2017 Conference on Information and Communication Technology (CICT), pp 1\u20136. https:\/\/doi.org\/10.1109\/INFOCOMTECH.2017.8340635","DOI":"10.1109\/INFOCOMTECH.2017.8340635"},{"key":"13808_CR95","unstructured":"Singh MsN, Joshi S (2016) Digital image forensics: progress and challenges. In: Proceedings of 31st National convention of Electronics and Telecommunication Engineers, Researchgate (October 2015)"},{"issue":"2","key":"13808_CR96","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/s11263-013-0688-y","volume":"110","author":"L Siwei","year":"2014","unstructured":"Siwei L, Xunyu P, Xing Z (2014) Exposing region splicing forgeries with blind local noise estimation [J]. Int J Comput Vis 110(2):202\u2013221","journal-title":"Int J Comput Vis"},{"key":"13808_CR97","doi-asserted-by":"publisher","unstructured":"Sri CG, Bano S, Deepika T, Kola N, Pranathi YL (2021) \u201cDeep Neural Networks Based Error Level Analysis for Lossless Image Compression Based Forgery Detection,\u201d 2021 Int Conf Intell Technol CONIT 2021, pp. 1\u20138, 2021, https:\/\/doi.org\/10.1109\/CONIT51480.2021.9498357.","DOI":"10.1109\/CONIT51480.2021.9498357"},{"key":"13808_CR98","doi-asserted-by":"publisher","unstructured":"Stojkovic A, Shopovska I, Luong H, Aelterman J, Jovanov L, Philips W (2019) The effect of the color filter array layout choice on state-of-the-art demosaicing. Sensors 19:3215. https:\/\/doi.org\/10.3390\/s19143215","DOI":"10.3390\/s19143215"},{"key":"13808_CR99","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.image.2018.02.001","volume":"63","author":"JY Sun","year":"2018","unstructured":"Sun JY, Kim SW, Lee SW, Ko SJ (2018) A novel contrast enhancement forensics based on convolutional neural networks. Signal Process Image Commun 63:149\u2013160","journal-title":"Signal Process Image Commun"},{"key":"13808_CR100","doi-asserted-by":"publisher","unstructured":"Swapna P, Krouglicof N, Gosine R (2010) A novel technique for estimating intrinsic camera parameters in geometric camera calibration. In: CCECE 2010,\u00a0pp 1\u20137. https:\/\/doi.org\/10.1109\/CCECE.2010.5575238","DOI":"10.1109\/CCECE.2010.5575238"},{"key":"13808_CR101","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.jvcir.2018.01.011","volume":"51","author":"H Tang","year":"2018","unstructured":"Tang H, Ni R, Zhao Y, Li X (2018) Median filtering detection of small-size image based on CNN. J Vis Commun Image Represent 51:162\u2013168","journal-title":"J Vis Commun Image Represent"},{"issue":"19","key":"13808_CR102","doi-asserted-by":"publisher","first-page":"26033","DOI":"10.1007\/s11042-018-5836-5","volume":"77","author":"A Thakur","year":"2018","unstructured":"Thakur A, Jindal N (2018) Image forensics using color illumination, block and key point based approach. Multimed Tools Appl 77(19):26033\u201326053","journal-title":"Multimed Tools Appl"},{"key":"13808_CR103","doi-asserted-by":"publisher","unstructured":"Tuama A, Comby F, Chaumont M (2016) Camera model identification with the use of deep convolutional neural networks. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp 1\u20136. https:\/\/doi.org\/10.1109\/WIFS.2016.7823908","DOI":"10.1109\/WIFS.2016.7823908"},{"key":"13808_CR104","unstructured":"U. S. Patent, \u201cUnited States Patent (19),\u201d (1976)"},{"key":"13808_CR105","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.image.2018.04.014","volume":"67","author":"V Verma","year":"2018","unstructured":"Verma V, Agarwal N, Khanna N (2018) DCT-domain deep convolutional neural networks for multiple JPEG compression classification. Signal Process Image Commun 67:22\u201333","journal-title":"Signal Process Image Commun"},{"issue":"1","key":"13808_CR106","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1080\/02564602.2020.1782274","volume":"38","author":"X Wang","year":"2021","unstructured":"Wang X, Niu S, Wang H (2021) Image inpainting detection based on multi-task deep learning network. IETE Tech Rev 38(1):149\u2013157","journal-title":"IETE Tech Rev"},{"key":"13808_CR107","doi-asserted-by":"publisher","unstructured":"Wu L, Wang Y (2011) Detecting image forgeries using geometric cues. In: Computer Vision for Multimedia Applications: Methods and Solutions. IGI Global, pp 197-217. https:\/\/doi.org\/10.4018\/978-1-60960-024-2.ch012","DOI":"10.4018\/978-1-60960-024-2.ch012"},{"issue":"2","key":"13808_CR108","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00138-010-0296-6","volume":"23","author":"L Wu","year":"2012","unstructured":"Wu L, Cao X, Zhang W, Wang Y (2012) Detecting image forgeries using metrology. Mach Vis Appl 23(2):363\u2013373","journal-title":"Mach Vis Appl"},{"key":"13808_CR109","doi-asserted-by":"publisher","unstructured":"Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: detecting copy-move image forgery with source\/target localization. In: 15th European Conference, Munich, Germany, September 8\u201314, Proceedings,\u00a0Part VI. https:\/\/doi.org\/10.1007\/978-3-030-01231-1_11","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"13808_CR110","doi-asserted-by":"crossref","unstructured":"Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 9543\u20139552","DOI":"10.1109\/CVPR.2019.00977"},{"key":"13808_CR111","doi-asserted-by":"publisher","unstructured":"Xu J, Feng D, Wu J, Cui Z (2009) An image inpainting technique based on 8-neighborhood fast sweeping method. In: 2009 WRI International Conference on Communications and Mobile Computing, pp 626\u2013630. https:\/\/doi.org\/10.1109\/CMC.2009.369","DOI":"10.1109\/CMC.2009.369"},{"key":"13808_CR112","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.neucom.2016.05.012","volume":"207","author":"B Xu","year":"2016","unstructured":"Xu B, Wang X, Zhou X, Xi J, Wang S (2016) Source camera identification from image texture features. Neurocomputing 207:131\u2013140","journal-title":"Neurocomputing"},{"issue":"10","key":"13808_CR113","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.3390\/e23101318","volume":"23","author":"P Yang","year":"2021","unstructured":"Yang P (2021) Dual-domain fusion convolutional neural network for contrast enhancement forensics. Entropy 23(10):1318","journal-title":"Entropy"},{"key":"13808_CR114","doi-asserted-by":"publisher","unstructured":"Yao H, Qiao T, Tang Z, Zhao Y, Mao H (2011) Detecting copy-move forgery using non-negative matrix factorization. In: 2011 Third International Conference on Multimedia Information Networking and Security, pp 591\u2013594. https:\/\/doi.org\/10.1109\/MINES.2011.104","DOI":"10.1109\/MINES.2011.104"},{"issue":"7","key":"13808_CR115","first-page":"214","volume":"2018","author":"SK Yarlagadda","year":"2018","unstructured":"Yarlagadda SK, G\u00fcera D, Bestagini P, Maggie Zhu F, Tubaro S, Delp EJ (2018) Satellite image forgery detection and localization using Gan and one-class classifier. Electron Imaging 2018(7):214\u2013211","journal-title":"Electron Imaging"},{"key":"13808_CR116","doi-asserted-by":"publisher","first-page":"70025","DOI":"10.1109\/ACCESS.2018.2879844","volume":"6","author":"X Zhang","year":"2018","unstructured":"Zhang X, Wang X (2018) Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access 6:70025\u201370034","journal-title":"IEEE Access"},{"key":"13808_CR117","first-page":"1","volume":"2016","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Goh J, Win LL, Thing VL (2016) Image region forgery detection: a Deep learning approach. SG-CRC 2016:1\u201311","journal-title":"SG-CRC"},{"issue":"3","key":"13808_CR118","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/s11390-020-0216-9","volume":"35","author":"RS Zhang","year":"2020","unstructured":"Zhang RS, Quan WZ, Fan LB, Hu LM, Yan DM (2020) Distinguishing computer-generated images from natural images using channel and pixel correlation. J Comput Sci Technol 35(3):592\u2013602","journal-title":"J Comput Sci Technol"},{"key":"13808_CR119","doi-asserted-by":"publisher","unstructured":"Zhou, P, Han, X, Morariu, VI, Davis, LS (2018) Learning rich features for image manipulation detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1053\u20131061. https:\/\/doi.org\/10.48550\/arXiv.1805.04953","DOI":"10.48550\/arXiv.1805.04953"},{"key":"13808_CR120","doi-asserted-by":"publisher","unstructured":"Zhuo L, Tan S, Zeng J, Lit B (2018) Fake colorized image detection with channel-wise convolution based deep-learning framework. In: 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp 733\u2013736. https:\/\/doi.org\/10.23919\/APSIPA.2018.8659761","DOI":"10.23919\/APSIPA.2018.8659761"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13808-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13808-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13808-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:50:37Z","timestamp":1744206637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13808-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":120,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["13808"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13808-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]},"assertion":[{"value":"28 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}