{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:52:05Z","timestamp":1775170325697,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T00:00:00Z","timestamp":1687564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T00:00:00Z","timestamp":1687564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15724-z","type":"journal-article","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T13:00:21Z","timestamp":1687611621000},"page":"10839-10863","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Enhanced copy-move forgery detection using deep convolutional neural network (DCNN) employing the ResNet-101 transfer learning model"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8414-9755","authenticated-orcid":false,"given":"Sharma","family":"Vaishali","sequence":"first","affiliation":[]},{"given":"Singh","family":"Neetu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,24]]},"reference":[{"issue":"9","key":"15724_CR1","doi-asserted-by":"publisher","first-page":"286","DOI":"10.3390\/info10090286","volume":"10","author":"Y Abdalla","year":"2019","unstructured":"Abdalla Y, Iqbal MT, Shehata M (2019) Copy-move forgery detection and localization using a generative adversarial network and convolutional neural-network. Information 10(9):286","journal-title":"Information"},{"key":"15724_CR2","doi-asserted-by":"crossref","unstructured":"Abidin, ABZ, Majid, HBA, Samah, ABA, Hashim, HB (2019) Copy-move image forgery detection using deep learning methods: a review. In: 2019 6th International conference on research and innovation in information systems (ICRIIS), pp 1\u20136. IEEE","DOI":"10.1109\/ICRIIS48246.2019.9073569"},{"key":"15724_CR3","doi-asserted-by":"crossref","unstructured":"Ardizzone, E, Bruno, A and Mazzola, G (2010) Detecting multiple copies in tampered images. In: 2010 IEEE International conference on image processing, pp 2117\u20132120. IEEE","DOI":"10.1109\/ICIP.2010.5652490"},{"issue":"10","key":"15724_CR4","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensics and Security 10(10):2084\u20132094","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"15724_CR5","doi-asserted-by":"publisher","first-page":"7355","DOI":"10.1007\/s11042-019-08495-z","volume":"79","author":"R Agarwal","year":"2020","unstructured":"Agarwal R, Verma OP (2020) An efficient copy move forgery detection using deep learning feature extraction and matching algorithm. Multimedia Tools and Applications 79(11):7355\u20137376","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"15724_CR6","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6(3):1099\u20131110","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15724_CR7","unstructured":"Bashar, M, Noda, K, Ohnishi, N and Mori, K (2010) Exploring duplicated regions in natural images. IEEE Transactions on Image Processing"},{"key":"15724_CR8","doi-asserted-by":"crossref","unstructured":"Bo, X, Junwen, W, Guangjie, L and Yuewei, D (2010) Image copy-move forgery detection based on SURF. In: 2010 International conference on multimedia information networking and security, pp 889\u2013892. IEEE","DOI":"10.1109\/MINES.2010.189"},{"issue":"8","key":"15724_CR9","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1016\/j.sigpro.2011.01.022","volume":"91","author":"S Bravo-Solorio","year":"2011","unstructured":"Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Processing 91(8):1759\u20131770","journal-title":"Signal Processing"},{"issue":"1\u20133","key":"15724_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Science International 214(1\u20133):33\u201343","journal-title":"Forensic Science International"},{"key":"15724_CR11","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.procs.2016.05.213","volume":"85","author":"D Chauhan","year":"2016","unstructured":"Chauhan D, Kasat D, Jain S, Thakare V (2016) Survey on keypoint based copy-move forgery detection methods on image. Procedia Computer Science 85:206\u2013212","journal-title":"Procedia Computer Science"},{"issue":"6","key":"15724_CR12","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6):1841\u20131854","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15724_CR13","doi-asserted-by":"crossref","unstructured":"Das, T, Hasan, R, Azam, MR and Uddin, J (2018) A robust method for detecting copy-move image forgery using stationary wavelet transform and scale invariant feature transform. In: 2018 International conference on computer, communication, chemical, material and electronic engineering (IC4ME2), pp 1\u20134. IEEE","DOI":"10.1109\/IC4ME2.2018.8465668"},{"key":"15724_CR14","doi-asserted-by":"publisher","first-page":"15353","DOI":"10.1007\/s11042-018-6891-7","volume":"78","author":"MA Elaskily","year":"2019","unstructured":"Elaskily MA, Elnemr HA, Dessouky MM, Faragallah OS (2019) Two stages object recognition based copy-move forgery detection algorithm. Multimedia Tools and Applications 78:15353\u201315373","journal-title":"Multimedia Tools and Applications"},{"issue":"27","key":"15724_CR15","doi-asserted-by":"publisher","first-page":"19167","DOI":"10.1007\/s11042-020-08751-7","volume":"79","author":"MA Elaskily","year":"2020","unstructured":"Elaskily MA, Elnemr HA, Sedik A, Dessouky MM, El Banby GM, Elshakankiry OA, Khalaf AA et al (2020) A novel deep learning framework for copy-moveforgery detection in images. Multimedia Tools and Applications 79(27):19167\u201319192","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"15724_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/IJSSCI.2018100102","volume":"10","author":"AD Gavrilov","year":"2018","unstructured":"Gavrilov AD, Jordache A, Vasdani M, Deng J (2018) Preventing model overfitting and underfitting in convolutional neural networks. International Journal of Software Science and Computational Intelligence (IJSSCI) 10(4):19\u201328","journal-title":"International Journal of Software Science and Computational Intelligence (IJSSCI)"},{"key":"15724_CR17","doi-asserted-by":"crossref","unstructured":"He, K, Zhang, X, Ren, S and Sun, J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"02","key":"15724_CR18","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1142\/S0218488598000094","volume":"6","author":"S Hochreiter","year":"1998","unstructured":"Hochreiter S (1998) The vanishing gradient problem during learning recurrent neural nets and problem solutions. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 6(02):107\u2013116","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"15724_CR19","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3390\/info11020108","volume":"11","author":"J Howard","year":"2020","unstructured":"Howard J, Gugger S (2020) Fastai: a layered API for deep learning. Information 11(2):108","journal-title":"Information"},{"issue":"1\u20133","key":"15724_CR20","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Science International 206(1\u20133):178\u2013184","journal-title":"Forensic Science International"},{"key":"15724_CR21","unstructured":"Igiri, CP, Anyama, OU and Silas, AI (2015) Effect of learning rate on artificial neural network in machine learning. International Journal of Engineering Research Technology, vol\u00a04(2)"},{"issue":"3","key":"15724_CR22","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1109\/TIFS.2012.2188390","volume":"7","author":"P Kakar","year":"2012","unstructured":"Kakar P, Sudha N (2012) Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Transactions on Information Forensics and Security 7(3):1018\u20131028","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15724_CR23","first-page":"62","volume":"4","author":"H Kaur","year":"2015","unstructured":"Kaur H, Saxena J, Singh S (2015) Simulative comparison of copy-move forgery detection methods for digital images. International Journal of Electronics, Electrical and Computational System 4:62\u201366","journal-title":"International Journal of Electronics, Electrical and Computational System"},{"issue":"1","key":"15724_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.eng.2018.02.008","volume":"4","author":"X Lin","year":"2018","unstructured":"Lin X, Li JH, Wang SL, Cheng F, Huang XS (2018) Recent advances in passive digital image security forensics: A brief review. Engineering 4(1):29\u201339","journal-title":"Engineering"},{"key":"15724_CR25","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.ins.2013.03.028","volume":"239","author":"G Lynch","year":"2013","unstructured":"Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Information Sciences 239:253\u2013265","journal-title":"Information Sciences"},{"key":"15724_CR26","doi-asserted-by":"crossref","unstructured":"Luo, W, Huang, J and Qiu, G (2006) Robust detection of region-duplication forgery in digital image. In: 18th International conference on pattern recognition (ICPR\u201906), vol 4, pp 746\u2013749. IEEE","DOI":"10.1109\/ICPR.2006.1003"},{"key":"15724_CR27","doi-asserted-by":"crossref","unstructured":"Mishra, P, Mishra, N, Sharma, S and Patel, R (2013) Region duplication forgery detection technique based on SURF and HAC. The Scientific World Journal 2013","DOI":"10.1155\/2013\/267691"},{"key":"15724_CR28","doi-asserted-by":"crossref","unstructured":"Ouyang, J, Liu, Y and Liao, M (2017) Copy-move forgery detection based on deep learning. In: 2017 10th international congress on image and signal processing, biomedical engineering and informatics (CISP-BMEI), pp 1\u20135. IEEE","DOI":"10.1109\/CISP-BMEI.2017.8301940"},{"issue":"3","key":"15724_CR29","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.3390\/app11031281","volume":"11","author":"CG Pach\u00f3n","year":"2021","unstructured":"Pach\u00f3n CG, Ballesteros DM, Renza D (2021) Fake banknote recognition using deep learning. Applied Sciences 11(3):1281","journal-title":"Applied Sciences"},{"key":"15724_CR30","unstructured":"Popescu, AC and Farid, H (2004) Exposing digital forgeries by detecting duplicated image regions"},{"key":"15724_CR31","doi-asserted-by":"crossref","unstructured":"Rao, Y and Ni, J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International workshop on information forensics and security (WIFS), pp 1\u20136. IEEE","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"15724_CR32","doi-asserted-by":"crossref","unstructured":"Salmon, BP, Kleynhans, W, Schwegmann, CP and Olivier, JC (2015) Proper comparison among methods using a confusion matrix. In: 2015 IEEE International geoscience and remote sensing symposium (IGARSS), pp 3057\u20133060. IEEE","DOI":"10.1109\/IGARSS.2015.7326461"},{"key":"15724_CR33","doi-asserted-by":"crossref","unstructured":"Senior, A, Heigold, G, Ranzato, MA and Yang, K (2013) An empirical study of learning rates in deep neural networks for speech recognition. In: 2013 IEEE international conference on acoustics, speech and signal processing, pp 6724\u20136728. IEEE","DOI":"10.1109\/ICASSP.2013.6638963"},{"key":"15724_CR34","doi-asserted-by":"crossref","unstructured":"Sharma, V and Singh, N (2021) Deep convolutional neural network with ResNet-50 learning algorithm for copy-move forgery detection. In: 2021 7th International conference on signal processing and communication (ICSC), pp 146\u2013150. IEEE","DOI":"10.1109\/ICSC53193.2021.9673422"},{"key":"15724_CR35","doi-asserted-by":"crossref","unstructured":"Smith, LN (2017) Cyclical learning rates for training neural networks. In: 2017 IEEE winter conference on applications of computer vision (WACV), pp 464\u2013472. IEEE","DOI":"10.1109\/WACV.2017.58"},{"issue":"8","key":"15724_CR36","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.3390\/s21082852","volume":"21","author":"PN Srinivasu","year":"2021","unstructured":"Srinivasu PN, SivaSai JG, Ijaz MF, Bhoi AK, Kim W, Kang JJ (2021) Classification of Skin Disease Using Deep Learning Neural Networks with MobileNet V2 and LSTM. Sensors 21(8):2852","journal-title":"Sensors"},{"key":"15724_CR37","doi-asserted-by":"crossref","unstructured":"Thakur, R and Rohilla, R (2019) Copy-move forgery detection using residuals and convolutional neural network framework: a novel approach. In: 2019 2nd International conference on power energy, environment and intelligent control (PEEIC), pp 561\u2013564. IEEE","DOI":"10.1109\/PEEIC47157.2019.8976868"},{"key":"15724_CR38","unstructured":"Tralic, D Zupancic, I Grgic, S and Grgic, M (2013) CoMoFoD-New database for copy-move forgery detection. In: Proceedings ELMAR-2013, pp 49\u201354. IEEE"},{"key":"15724_CR39","doi-asserted-by":"crossref","unstructured":"Ulloa, C, Ballesteros, DM and Renza, D (2021) Video forensics: identifying colorized images using deep learning. Applied Sciences, vol\u00a011(2)","DOI":"10.3390\/app11020476"},{"issue":"8","key":"15724_CR40","doi-asserted-by":"publisher","first-page":"2988","DOI":"10.3390\/s22082988","volume":"22","author":"A Vulli","year":"2022","unstructured":"Vulli A, Srinivasu PN, Sashank MSK, Shafi J, Choi J, Ijaz MF (2022) Fine-tuned densenet-169 for breast cancer metastasis prediction using fastai and 1-cycle policy. Sensors 22(8):2988","journal-title":"Sensors"},{"key":"15724_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102536","volume":"54","author":"Y Wang","year":"2020","unstructured":"Wang Y, Kang X, Chen Y (2020) Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. Journal of Information Security and Applications 54:102536","journal-title":"Journal of Information Security and Applications"},{"issue":"1\u20133","key":"15724_CR42","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Science International 233(1\u20133):158\u2013166","journal-title":"Forensic Science International"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15724-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15724-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15724-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:08:39Z","timestamp":1729634919000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15724-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,24]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15724"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15724-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,24]]},"assertion":[{"value":"2 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No Conflict of Interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}