{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:30:29Z","timestamp":1770748229998,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11042-022-14224-w","type":"journal-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T11:34:38Z","timestamp":1672832078000},"page":"25917-25944","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A fast copy-move image forgery detection approach on a reduced search space"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2882-7395","authenticated-orcid":false,"given":"Srilekha","family":"Paul","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4229-0715","authenticated-orcid":false,"given":"Arup Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"14224_CR1","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"75","author":"NB Abd Warif","year":"2016","unstructured":"Abd Warif NB, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S, Choo KKR (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259\u2013278. https:\/\/doi.org\/10.1016\/j.jnca.2016.09.008","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"14224_CR2","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.fcij.2018.03.001","volume":"3","author":"HA Alberry","year":"2018","unstructured":"Alberry HA, Hegazy AA, Salama GI (2018) A fast sift based method for copy move forgery detection. Future Comput Inform J 3(2):159\u2013165. https:\/\/doi.org\/10.1016\/j.fcij.2018.03.001","journal-title":"Future Comput Inform J"},{"issue":"10","key":"14224_CR3","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy\u2013move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10 (10):2084\u20132094. https:\/\/doi.org\/10.1109\/TIFS.2015.2445742","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"14224_CR4","doi-asserted-by":"publisher","unstructured":"Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Transactions on Image Processing. https:\/\/doi.org\/10.1109\/TIP.2010.2046599","DOI":"10.1109\/TIP.2010.2046599"},{"issue":"3","key":"14224_CR5","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (surf). Comput Vis Image Underst 110(3):346\u2013359. https:\/\/doi.org\/10.1016\/j.cviu.2007.09.014","journal-title":"Comput Vis Image Underst"},{"key":"14224_CR6","doi-asserted-by":"publisher","unstructured":"Bo X, Junwen W, Guangjie L, Yuewei D (2010) .. In: 2010 International Conference on Multimedia Information Networking and Security, IEEE, pp 889\u2013892. https:\/\/doi.org\/10.1109\/MINES.2010.189","DOI":"10.1109\/MINES.2010.189"},{"key":"14224_CR7","unstructured":"Bovik A (2010) Handbook of Image and Video Processing. Communications, Networking and Multimedia, Elsevier Science. https:\/\/books.google.co.in\/books?id=UM_GCfJe88sC"},{"issue":"1-3","key":"14224_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1-3):33\u201343. https:\/\/doi.org\/10.1016\/j.forsciint.2011.07.015","journal-title":"Forensic Sci Int"},{"issue":"6","key":"14224_CR9","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854. https:\/\/doi.org\/10.1109\/TIFS.2012.2218597","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"14224_CR10","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy\u2013move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284\u20132297. https:\/\/doi.org\/10.1109\/TIFS.2015.2455334","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"115","key":"14224_CR11","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.eswa.2021.115282","volume":"182","author":"A Dixit","year":"2021","unstructured":"Dixit A, Bag S (2021) A fast technique to detect copy-move image forgery with reflection and non-affine transformation attacks. Expert Syst Appl 182 (115):282. https:\/\/doi.org\/10.1016\/j.eswa.2021.115282","journal-title":"Expert Syst Appl"},{"key":"14224_CR12","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ins.2018.05.037","volume":"459","author":"JB Florindo","year":"2018","unstructured":"Florindo JB, Casanova D, Bruno OM (2018) A gaussian pyramid approach to bouligand\u2013minkowski fractal descriptors. Inf Sci 459:36\u201352. https:\/\/doi.org\/10.1016\/j.ins.2018.05.037","journal-title":"Inf Sci"},{"key":"14224_CR13","unstructured":"Fridrich AJ, Soukal BD, Luk\u00e1\u0161 AJ (2003) .. In: Inproceedings of digital forensic research workshop, Citeseer"},{"key":"14224_CR14","unstructured":"Gonzalez R, Woods R (2017) Digital Image Processing, Global Edition, Pearson. https:\/\/books.google.co.in\/books?id=XmZvtAEACAAJ"},{"key":"14224_CR15","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.compeleceng.2017.03.013","volume":"62","author":"K Hayat","year":"2017","unstructured":"Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Comput Electr Eng 62:448\u2013458. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.03.013","journal-title":"Comput Electr Eng"},{"issue":"1-3","key":"14224_CR16","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved dct-based detection of copy-move forgery in images. Forensic Sci Int 206(1-3):178\u2013184. https:\/\/doi.org\/10.1016\/j.forsciint.2010.08.001","journal-title":"Forensic Sci Int"},{"key":"14224_CR17","doi-asserted-by":"publisher","first-page":"355","DOI":"10.2147\/RMHP.S233706","volume":"13","author":"J Kaur","year":"2020","unstructured":"Kaur J, Khan AI, Abushark YB, Alam MM, Khan SA, Agrawal A, Kumar R, Khan RA (2020) Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective. Risk Manag Healthc Policy 13:355. https:\/\/doi.org\/10.2147\/RMHP.S233706","journal-title":"Risk Manag Healthc Policy"},{"key":"14224_CR18","doi-asserted-by":"publisher","first-page":"48,870","DOI":"10.1109\/ACCESS.2020.2978038","volume":"8","author":"R Kumar","year":"2020","unstructured":"Kumar R, Khan AI, Abushark YB, Alam MM, Agrawal A, Khan RA (2020) A knowledge-based integrated system of hesitant fuzzy set, ahp and topsis for evaluating security-durability of web applications. IEEE Access 8:48,870\u201348,885. https:\/\/doi.org\/10.1109\/ACCESS.2020.2978038","journal-title":"IEEE Access"},{"key":"14224_CR19","doi-asserted-by":"publisher","first-page":"50,944","DOI":"10.1109\/ACCESS.2020.2970245","volume":"8","author":"R Kumar","year":"2020","unstructured":"Kumar R, Khan AI, Abushark YB, Alam MM, Agrawal A, Khan RA (2020) An integrated approach of fuzzy logic, ahp and topsis for estimating usable-security of web applications. IEEE Access 8:50,944\u201350,957. https:\/\/doi.org\/10.1109\/ACCESS.2020.2970245","journal-title":"IEEE Access"},{"issue":"1","key":"14224_CR20","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.eng.2018.02.008","volume":"4","author":"X Lin","year":"2018","unstructured":"Lin X, Li JH, Wang SL, Cheng F, Huang XS, et al. (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4 (1):29\u201339. https:\/\/doi.org\/10.1016\/j.eng.2018.02.008","journal-title":"Engineering"},{"issue":"2","key":"14224_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60 (2):91\u2013110. https:\/\/doi.org\/10.1023\/B:VISI.0000029664.99615.94","journal-title":"Int J Comput Vis"},{"key":"14224_CR22","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202\u2013214. https:\/\/doi.org\/10.1016\/j.jvcir.2018.03.015","journal-title":"J Vis Commun Image Represent"},{"key":"14224_CR23","doi-asserted-by":"publisher","unstructured":"Meena KB, Tyagi V (2019) .. In: Data, engineering and applications, Springer. https:\/\/doi.org\/10.1007\/978-981-13-6351-1_14, pp 163\u2013194","DOI":"10.1007\/978-981-13-6351-1_14"},{"issue":"103","key":"14224_CR24","doi-asserted-by":"publisher","first-page":"068","DOI":"10.1016\/j.jvcir.2021.103068","volume":"77","author":"Pp Niu","year":"2021","unstructured":"Niu Pp, Wang C, Chen W, Yang H, Wang X (2021) Fast and effective keypoint-based image copy-move forgery detection using complex-valued moment invariants. J Vis Commun Image Represent 77(103):068. https:\/\/doi.org\/10.1016\/j.jvcir.2021.103068","journal-title":"J Vis Commun Image Represent"},{"key":"14224_CR25","doi-asserted-by":"publisher","unstructured":"Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy\u2013move image forgery detection using dct. Iran J Comput Sci, 1\u201311. https:\/\/doi.org\/10.1007\/s42044-019-00029-y","DOI":"10.1007\/s42044-019-00029-y"},{"key":"14224_CR26","doi-asserted-by":"crossref","unstructured":"Paul S, Pal AK (2021) .. In: Cloud Security. https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.1201\/9780367821555-9\/active-forgery-detection-grayscale-images-using-crc-8-based-fragile-watermarking-srilekha-paul-arup-kumar-pal. CRC Press, pp 114\u2013132","DOI":"10.1201\/9780367821555-9"},{"key":"14224_CR27","doi-asserted-by":"publisher","unstructured":"Prasad S, Pal AK, Paul S (2022) A block-level image tamper detection scheme using modulus function based fragile watermarking. Wirel Pers Commun, 1\u201339. https:\/\/doi.org\/10.1007\/s11277-022-09675-1","DOI":"10.1007\/s11277-022-09675-1"},{"key":"14224_CR28","unstructured":"Rao KR, Yip P (2014) Discrete cosine transform: algorithms, advantages applications. Academic Press"},{"issue":"5","key":"14224_CR29","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3390\/sym12050754","volume":"12","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry 12 (5):754. https:\/\/doi.org\/10.3390\/sym12050754","journal-title":"Symmetry"},{"key":"14224_CR30","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.cag.2017.08.014","volume":"68","author":"V Schetinger","year":"2017","unstructured":"Schetinger V, Iuliani M, Piva A, Oliveira MM (2017) Image forgery detection confronts image composition. Comput Graph 68:152\u2013163. https:\/\/doi.org\/10.1016\/j.cag.2017.08.014","journal-title":"Comput Graph"},{"key":"14224_CR31","doi-asserted-by":"crossref","unstructured":"Sencar HT, Memon N (2014) Digital image forensics: there is more to a picture than meets the eye. Springer Publishing Company, Incorporated","DOI":"10.1007\/978-1-4614-0757-7"},{"issue":"4","key":"14224_CR32","doi-asserted-by":"publisher","first-page":"6247","DOI":"10.1007\/s11042-020-09974-4","volume":"80","author":"NA Shelke","year":"2021","unstructured":"Shelke NA, Kasana SS (2021) A comprehensive survey on passive techniques for digital video forgery detection. Multimed Tools Appl 80(4):6247\u20136310. https:\/\/doi.org\/10.1007\/s11042-020-09974-4","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"14224_CR33","doi-asserted-by":"publisher","first-page":"22,731","DOI":"10.1007\/s11042-021-10989-8","volume":"81","author":"NA Shelke","year":"2022","unstructured":"Shelke NA, Kasana SS (2022) Multiple forgery detection and localization technique for digital video using pct and nbap. Multimed Tools Appl 81(16):22,731\u201322,759. https:\/\/doi.org\/10.1007\/s11042-021-10989-8","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"14224_CR34","first-page":"9","volume":"27","author":"B Shivakumar","year":"2011","unstructured":"Shivakumar B, Baboo SS (2011) Automated forensic method for copy-move forgery detection based on harris interest points and sift descriptors. Int J Comput Appl 27(3):9\u201317","journal-title":"Int J Comput Appl"},{"issue":"2","key":"14224_CR35","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1049\/iet-ipr.2017.0441","volume":"12","author":"B Soni","year":"2018","unstructured":"Soni B, Das PK, Thounaojam DM (2018) Cmfd: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167\u2013178. https:\/\/doi.org\/10.1049\/iet-ipr.2017.0441","journal-title":"IET Image Process"},{"key":"14224_CR36","doi-asserted-by":"publisher","unstructured":"Sunil K, Jagan D, Shaktidev M (2014) .. In: ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II, Springerpp 577\u2013583. https:\/\/doi.org\/10.1007\/978-3-319-03095-1_62","DOI":"10.1007\/978-3-319-03095-1_62"},{"key":"14224_CR37","doi-asserted-by":"publisher","unstructured":"Tharwat A (2018) Classification assessment methods. Applied Computing and Informatics. https:\/\/doi.org\/10.1016\/j.aci.2018.08.003","DOI":"10.1016\/j.aci.2018.08.003"},{"issue":"5","key":"14224_CR38","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1080\/00450618.2018.1424241","volume":"51","author":"S Walia","year":"2019","unstructured":"Walia S, Kumar K (2019) Digital image forgery detection: a systematic scrutiny. Aust J Forensic Sci 51(5):488\u2013526. https:\/\/doi.org\/10.1080\/00450618.2018.1424241","journal-title":"Aust J Forensic Sci"},{"issue":"24","key":"14224_CR39","doi-asserted-by":"publisher","first-page":"5570","DOI":"10.1016\/j.ijleo.2015.09.030","volume":"126","author":"AR Yadav","year":"2015","unstructured":"Yadav AR, Anand R, Dewal M, Gupta S (2015) Gaussian image pyramid based texture features for classification of microscopic images of hardwood species. Optik 126(24):5570\u20135578. https:\/\/doi.org\/10.1016\/j.ijleo.2015.09.030","journal-title":"Optik"},{"issue":"1-3","key":"14224_CR40","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on dct and svd. Forensic Sci Int 233(1-3):158\u2013166. https:\/\/doi.org\/10.1016\/j.forsciint.2013.09.013","journal-title":"Forensic Sci Int"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14224-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14224-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14224-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T19:54:13Z","timestamp":1687550053000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14224-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,4]]},"references-count":40,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["14224"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14224-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,4]]},"assertion":[{"value":"17 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}