{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T03:12:56Z","timestamp":1771557176644,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15499-3","type":"journal-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T14:03:15Z","timestamp":1683900195000},"page":"2203-2235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Accurate and robust image copy-move forgery detection using adaptive keypoints and FQGPCET-GLCM feature"],"prefix":"10.1007","volume":"83","author":[{"given":"Xiang-yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xing-qi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Pan-pan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Hong-ying","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,12]]},"reference":[{"issue":"7","key":"15499_CR1","doi-asserted-by":"publisher","first-page":"5419","DOI":"10.1007\/s11042-018-6266-0","volume":"79","author":"M Abdel-Basset","year":"2020","unstructured":"Abdel-Basset M, Manogaran G, Fakhry AE et al (2020) 2-levels of clustering strategy to detect and locate copy-move forgery in digital images. Multimed Tools Appl 79(7):5419\u20135437","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"15499_CR2","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TPAMI.2012.120","volume":"34","author":"R Achanta","year":"2012","unstructured":"Achanta R, Shaji A, Smith K et al (2012) SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274\u20132282","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"6","key":"15499_CR3","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R et al (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"key":"15499_CR4","doi-asserted-by":"publisher","first-page":"2713","DOI":"10.1007\/s11042-020-09585-z","volume":"80","author":"T Anbu","year":"2021","unstructured":"Anbu T, Joe MM, Murugeswari G (2021) A comprehensive survey of detecting tampered images and localization of the tampered region. Multimed Tools Appl 80:2713\u20132751","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"15499_CR5","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensic Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"15499_CR6","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TIFS.2020.3045903","volume":"16","author":"M Barni","year":"2021","unstructured":"Barni M, Phan QT, Tondi B (2021) Copy move source-target disambiguation through multi-branch CNNs. IEEE Trans Inf Forensic Secur 16:1825\u20131840","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"1","key":"15499_CR7","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.imavis.2012.09.002","volume":"31","author":"IC Chang","year":"2013","unstructured":"Chang IC, Yu JC, Chang CC (2013) A forgery detection algorithm for exemplar-based inpainting images using multi-region relation. Image Vis Comput 31(1):57\u201371","journal-title":"Image Vis Comput"},{"issue":"6","key":"15499_CR8","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J et al (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"11","key":"15499_CR9","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensic Secur 10(11):2284\u20132297","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"18","key":"15499_CR10","doi-asserted-by":"publisher","first-page":"11513","DOI":"10.1007\/s11042-015-2872-2","volume":"75","author":"M Emam","year":"2016","unstructured":"Emam M, Han Q, Niu X (2016) PCET based copy-move forgery detection in images under geometric transforms. Multimed Tools Appl 75(18):11513\u201311527","journal-title":"Multimed Tools Appl"},{"key":"15499_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.neucom.2016.11.091","volume":"265","author":"SM Fadl","year":"2017","unstructured":"Fadl SM, Semary NA (2017) Robust copy-move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57\u201365","journal-title":"Neurocomputing"},{"key":"15499_CR12","unstructured":"Fridrich AJ, Soukal BD, Lukas AJ (2013) Detection of copy-move forgery in digital images, in: Proceedings of digital forensic research workshop, Cleveland, Ohio, USA, p. 55\u201361"},{"issue":"1","key":"15499_CR13","doi-asserted-by":"publisher","first-page":"102783","DOI":"10.1016\/j.ipm.2021.102783","volume":"59","author":"Y Gan","year":"2022","unstructured":"Gan Y, Zhong J, Vong C (2022) A novel copy-move forgery detection algorithm via feature label matching and hierarchical segmentation filtering. Inf Process Manag 59(1):102783","journal-title":"Inf Process Manag"},{"key":"15499_CR14","first-page":"102510","volume":"54","author":"G Gani","year":"2020","unstructured":"Gani G, Qadir F (2020) A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata. J Inf Secur Appl 54:102510","journal-title":"J Inf Secur Appl"},{"issue":"21","key":"15499_CR15","doi-asserted-by":"publisher","first-page":"32219","DOI":"10.1007\/s11042-021-11174-7","volume":"80","author":"G Gani","year":"2021","unstructured":"Gani G, Qadir F (2021) Copy move forgery detection using DCT, PatchMatch and cellular automata. Multimed Tools Appl 80(21):32219\u201332243","journal-title":"Multimed Tools Appl"},{"key":"15499_CR16","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s00521-020-05017-z","volume":"33","author":"M Garg","year":"2020","unstructured":"Garg M, Dhiman G (2020) A novel content-based image retrieval approach for classification using GLCM features and texture fused LBP variants. Neural Comput & Applic 33:1311\u20131328","journal-title":"Neural Comput & Applic"},{"key":"15499_CR17","doi-asserted-by":"crossref","unstructured":"Hoang TV, Tabbone S (2011) Generic polar harmonic transforms for invariant image description, in: 2011 18th IEEE international conference on image processing (ICIP), Brussels, Belgium, 829\u2013832","DOI":"10.1109\/ICIP.2011.6116685"},{"key":"15499_CR18","doi-asserted-by":"crossref","unstructured":"Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm, in: 2008 IEEE Pacific-Asia workshop on computational intelligence and industrial application, Wuhan, China, 272\u2013276","DOI":"10.1109\/PACIIA.2008.240"},{"key":"15499_CR19","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/B978-0-12-396502-8.00005-X","volume":"1","author":"H Johansson","year":"2014","unstructured":"Johansson H (2014) Sampling and quantization. Acad Press Lib Signal Process 1:169\u2013244","journal-title":"Acad Press Lib Signal Process"},{"key":"15499_CR20","first-page":"1","volume-title":"Detection of copy-move image forgery using local binary pattern with discrete wavelet transform and principle component analysis, in: 2017 international conference on computing, Communication","author":"MF Jwaid","year":"2017","unstructured":"Jwaid MF, Baraskar TN (2017) Detection of copy-move image forgery using local binary pattern with discrete wavelet transform and principle component analysis, in: 2017 international conference on computing, Communication. Control and Automation (ICCUBEA), Pune, India, pp 1\u20136"},{"key":"15499_CR21","doi-asserted-by":"crossref","unstructured":"Kalsi DK, Rai P (2017) A copy-move forgery detection system using approximation image local binary pattern, in: 2017 international conference on recent innovations in signal processing and embedded systems (RISE), Bhopal, India, 284\u2013288","DOI":"10.1109\/RISE.2017.8378168"},{"key":"15499_CR22","doi-asserted-by":"crossref","unstructured":"Kim KS, Zhang D, Kang MC, et al. (2013) Improved simple linear iterative clustering superpixels, in: 2013 IEEE international symposium on consumer electronics (ISCE), Hsinchu, Taiwan, 259\u2013260","DOI":"10.1109\/ISCE.2013.6570216"},{"key":"15499_CR23","doi-asserted-by":"crossref","unstructured":"Kong W, Li WJ (2012) Double-bit quantization for hashing, in: Proceedings of the AAAI conference on artificial intelligence (AAAI), Toronto, Ontario, Canada, 634\u2013640","DOI":"10.1609\/aaai.v26i1.8208"},{"issue":"5","key":"15499_CR24","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Y Li","year":"2018","unstructured":"Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensic Secur 14(5):1307\u20131322","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"15499_CR25","first-page":"507","volume":"10","author":"J Li","year":"2014","unstructured":"Li J, Li X, Yang B et al (2014) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"14","key":"15499_CR26","doi-asserted-by":"publisher","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","volume":"77","author":"Y Liu","year":"2018","unstructured":"Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimed Tools Appl 77(14):18269\u201318293","journal-title":"Multimed Tools Appl"},{"key":"15499_CR27","doi-asserted-by":"publisher","first-page":"103057","DOI":"10.1016\/j.jvcir.2021.103057","volume":"76","author":"Q Lyu","year":"2021","unstructured":"Lyu Q, Luo J, Liu K et al (2021) Copy move forgery detection based on double matching. J Vis Commun Image Represent 76:103057","journal-title":"J Vis Commun Image Represent"},{"key":"15499_CR28","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M et al (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202\u2013214","journal-title":"J Vis Commun Image Represent"},{"key":"15499_CR29","doi-asserted-by":"crossref","unstructured":"Nie F, Wang LC, Li X (2019) K-multiple-means: a multiple-means clustering method with specified k clusters, in: Proceedings of the 25th ACM SIGKDD international conference on Knowledge Discovery & Data Mining (KDD), Anchorage, Alaska, USA, 959\u2013967","DOI":"10.1145\/3292500.3330846"},{"key":"15499_CR30","doi-asserted-by":"publisher","first-page":"103068","DOI":"10.1016\/j.jvcir.2021.103068","volume":"77","author":"PP Niu","year":"2021","unstructured":"Niu PP, Wang C, Chen WC et al (2021) Fast and effective Keypoint-based image copy-move forgery detection using complex-valued moment invariants. J Vis Commun Image Represent 77:103068","journal-title":"J Vis Commun Image Represent"},{"issue":"19","key":"15499_CR31","doi-asserted-by":"publisher","first-page":"13011","DOI":"10.1007\/s11042-019-08354-x","volume":"79","author":"SG Priyanka","year":"2020","unstructured":"Priyanka SG, Singh K (2020) An improved block based copy-move forgery detection technique. Multimed Tools Appl 79(19):13011\u201313035","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"15499_CR32","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensic Secur 10(8):1705\u20131716","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"8","key":"15499_CR33","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ et al (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensic Secur 8(8):1355\u20131370","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"2","key":"15499_CR34","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10044-017-0678-8","volume":"21","author":"S Sadeghi","year":"2018","unstructured":"Sadeghi S, Dadkhah S, Jalab HA et al (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Applic 21(2):291\u2013306","journal-title":"Pattern Anal Applic"},{"issue":"2","key":"15499_CR35","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1049\/iet-ipr.2017.0441","volume":"12","author":"B Soni","year":"2018","unstructured":"Soni B, Das PK, Thounaojam DM (2018) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167\u2013178","journal-title":"IET Image Process"},{"issue":"11","key":"15499_CR36","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1049\/iet-ipr.2018.5576","volume":"12","author":"B Soni","year":"2018","unstructured":"Soni B, Das PK, Thounaojam DM (2018) Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm. IET Image Process 12(11):2092\u20132099","journal-title":"IET Image Process"},{"issue":"15","key":"15499_CR37","doi-asserted-by":"publisher","first-page":"23419","DOI":"10.1007\/s11042-020-10241-9","volume":"80","author":"G Tahaoglu","year":"2021","unstructured":"Tahaoglu G, Ulutas G, Ustubioglu B et al (2021) Improved copy move forgery detection method via L*a*b* color space and enhanced localization technique. Multimed Tools Appl 80(15):23419\u201323456","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"15499_CR38","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"15499_CR39","doi-asserted-by":"crossref","unstructured":"Wang Y, Tian L, Li C (2017) LBP-SVD based copy move forgery detection algorithm, in: 2017 IEEE international symposium on multimedia (ISM), Taichung, Taiwan, 553\u2013556","DOI":"10.1109\/ISM.2017.108"},{"issue":"10","key":"15499_CR40","doi-asserted-by":"publisher","first-page":"3630","DOI":"10.1007\/s10489-018-1168-4","volume":"48","author":"XY Wang","year":"2018","unstructured":"Wang XY, Jiao LX, Wang XB et al (2018) A new keypoint-based copy-move forgery detection for color image. Appl Intell 48(10):3630\u20133652","journal-title":"Appl Intell"},{"issue":"2","key":"15499_CR41","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s10044-016-0588-1","volume":"21","author":"X Wang","year":"2018","unstructured":"Wang X, Liu Y, Xu H et al (2018) Robust copy-move forgery detection using quaternion exponent moments. Pattern Anal Applic 21(2):451\u2013467","journal-title":"Pattern Anal Applic"},{"key":"15499_CR42","first-page":"102536","volume":"54","author":"Y Wang","year":"2020","unstructured":"Wang Y, Kang X, Chen Y (2020) Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. J Inf Secur Appl 54:102536","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"15499_CR43","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/s11045-019-00688-x","volume":"31","author":"XY Wang","year":"2020","unstructured":"Wang XY, Wang C, Wang L et al (2020) A fast and high accurate image copy-move forgery detection approach. Multidim Syst Sign Process 31(3):857\u2013883","journal-title":"Multidim Syst Sign Process"},{"issue":"3","key":"15499_CR44","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1007\/s10044-021-00968-y","volume":"24","author":"XY Wang","year":"2021","unstructured":"Wang XY, Wang C, Wang L et al (2021) Robust and effective multiple copy-move forgeries detection and localization. Pattern Anal Applic 24(3):1025\u20131046","journal-title":"Pattern Anal Applic"},{"key":"15499_CR45","doi-asserted-by":"crossref","unstructured":"Wu Y, Almageed WA, Natarajan P (2018) Image copy-move forgery detection via an end-to-end deep neural network, in: 2018 IEEE winter conference on applications of computer vision (WACV), Lake Tahoe, NV, USA, 1907\u20131915","DOI":"10.1109\/WACV.2018.00211"},{"key":"15499_CR46","doi-asserted-by":"publisher","first-page":"115747","DOI":"10.1016\/j.image.2019.115747","volume":"82","author":"HY Yang","year":"2020","unstructured":"Yang HY, Qi SR, Niu PP, Wang XY (2020) Color image zero-watermarking based on fast quaternion generic polar complex exponential transform. Signal Process Image Commun 82:115747","journal-title":"Signal Process Image Commun"},{"key":"15499_CR47","doi-asserted-by":"publisher","first-page":"103032","DOI":"10.1016\/j.dsp.2021.103032","volume":"113","author":"J Yang","year":"2021","unstructured":"Yang J, Liang Z, Gan Y et al (2021) A novel copy-move forgery detection algorithm via two-stage filtering. Digit Signal Process 113:103032","journal-title":"Digit Signal Process"},{"key":"15499_CR48","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","volume":"15","author":"JL Zhong","year":"2019","unstructured":"Zhong JL, Pun CM (2019) An end-to-end dense-inceptionnet for image copy-move forgery detection. IEEE Trans Inf Forensic Secur 15:2134\u20132146","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"15499_CR49","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.ins.2019.09.085","volume":"512","author":"JL Zhong","year":"2020","unstructured":"Zhong JL, Pun CM (2020) Two-pass hashing feature representation and searching method for copy-move forgery detection. Inf Sci 512:675\u2013692","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15499-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15499-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15499-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T08:37:40Z","timestamp":1704184660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15499-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,12]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15499"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15499-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,12]]},"assertion":[{"value":"24 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki Declaration and its later amendments or comparable ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standard"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}