{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:30:34Z","timestamp":1759937434473,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T00:00:00Z","timestamp":1698883200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T00:00:00Z","timestamp":1698883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17279-5","type":"journal-article","created":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T05:07:00Z","timestamp":1698901620000},"page":"48141-48163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A hybrid SWT-SVD based multiresolution features for robust image copy-move forgery detection"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5483-9368","authenticated-orcid":false,"given":"Soumya","family":"Mukherjee","sequence":"first","affiliation":[]},{"given":"Arup Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,2]]},"reference":[{"key":"17279_CR1","unstructured":"Gonzalez R, Woods R (2002) Digital image processing, 3rd edn. Pearson"},{"key":"17279_CR2","doi-asserted-by":"crossref","unstructured":"Meena KB, Tyagi V (2019) Image forgery detection: survey and future directions. In: Data engineering and applications, pp 163\u2013194","DOI":"10.1007\/978-981-13-6351-1_14"},{"issue":"1","key":"17279_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.eng.2018.02.008","volume":"4","author":"X Lin","year":"2018","unstructured":"Lin X, Li WS, Cheng JF, Huang X (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29\u201339","journal-title":"Engineering"},{"issue":"3","key":"17279_CR4","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","volume":"10","author":"G Birajdar","year":"2013","unstructured":"Birajdar G, Mankar V (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226\u2013245","journal-title":"Digit Investig"},{"key":"17279_CR5","first-page":"1","volume":"2015","author":"T Mahmood","year":"2015","unstructured":"Mahmood T, Nawaz T, Ashraf R, Shah M, Khan Z, Irtaza A, Mehmood Z (2015) A survey on block based copy move image forgery detection techniques. Int Conf Emerg Technol (ICET) 2015:1\u20136","journal-title":"Int Conf Emerg Technol (ICET)"},{"issue":"2","key":"17279_CR6","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1049\/iet-ipr.2017.0441","volume":"12","author":"B Soni","year":"2018","unstructured":"Soni B, Das P, Thounaojam D (2018) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167\u2013178","journal-title":"IET Image Process"},{"key":"17279_CR7","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.procs.2016.05.213","volume":"85","author":"D Chauhan","year":"2016","unstructured":"Chauhan D, Kasat D, Jain S, Thakare V (2016) Survey on keypoint based copy-move forgery detection methods on image. Procedia Comput Sci 85:206\u2013212","journal-title":"Procedia Comput Sci"},{"key":"17279_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.procs.2016.02.011","volume":"78","author":"A Warbhe","year":"2016","unstructured":"Warbhe A, Dharaskar R, Thakare V (2016) A survey on keypoint based copy-paste forgery detection techniques. Procedia Comput Sci 78:61","journal-title":"Procedia Comput Sci"},{"key":"17279_CR9","unstructured":"Fridrich A, Soukal B, Luk A (2003) Detection of copy-move forgery in digital images. In: Proceedings of the digital forensic research workshop"},{"key":"17279_CR10","unstructured":"Popescu A and Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. In: CiteSeer"},{"key":"17279_CR11","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"1\u20133","author":"Y Huang","year":"2011","unstructured":"Huang Y, Lu W, Sun W, Long D (2011) Improved dct-based detection of copy-move forgery in images. Forensic Sci Int 1\u20133:178\u2013184","journal-title":"Forensic Sci Int"},{"key":"17279_CR12","first-page":"926","volume":"3","author":"X Kang","year":"2008","unstructured":"Kang X, Wei S (2008) Identifying tampered regions using singular value decomposition in digital image forensics. Int Conf Comput Sci softw Eng 3:926\u2013930","journal-title":"Int Conf Comput Sci softw Eng"},{"key":"17279_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"1\u20133","author":"Y Cao","year":"2012","unstructured":"Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 1\u20133:33\u201343","journal-title":"Forensic Sci Int"},{"key":"17279_CR14","first-page":"1053","volume":"19","author":"S Bayram","year":"2009","unstructured":"Bayram S, Sencar H, Memon N (2009) An efficient and robust method for detecting copy-move forgery. IEEE Int Conf Acoustics Speech Signal Process 19:1053\u20131056","journal-title":"IEEE Int Conf Acoustics Speech Signal Process"},{"key":"17279_CR15","doi-asserted-by":"crossref","unstructured":"Sunil K, Jagan D, Shaktidev M (2014) DCT-PCA based method for copy-move forgery detection. In: ICT and critical infrastructure: proceedings of the 48th annual convention of computer society of India, vol\u00a02, pp\u00a0577\u2013583","DOI":"10.1007\/978-3-319-03095-1_62"},{"key":"17279_CR16","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.compeleceng.2017.03.013","volume":"62","author":"K Hayat","year":"2017","unstructured":"Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Comput Electr Eng 62:448\u201358","journal-title":"Comput Electr Eng"},{"key":"17279_CR17","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.forsciint.2017.07.037","volume":"279","author":"T Mahmood","year":"2017","unstructured":"Mahmood T, Irtaza A, Mehmood Z, Mahmood M (2017) Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int 279:8\u201321","journal-title":"Forensic Sci Int"},{"key":"17279_CR18","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Visual Commun Image Represent 53:202\u2013214","journal-title":"J Visual Commun Image Represent"},{"key":"17279_CR19","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Security 8:1355\u20131370","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"1\u20133","key":"17279_CR20","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1\u20133):158\u2013166","journal-title":"Forensic Sci Int"},{"issue":"19","key":"17279_CR21","first-page":"13011","volume":"79","author":"G Singh","year":"2020","unstructured":"Singh G, Singh K (2020) An improved block-based copy-move forgery detection technique. Multimedia Tools Appl 79(19):13011\u201313035","journal-title":"Multimedia Tools Appl"},{"issue":"11","key":"17279_CR22","doi-asserted-by":"publisher","first-page":"8197","DOI":"10.1007\/s11042-019-08343-0","volume":"79","author":"K Meena","year":"2020","unstructured":"Meena K, Tyagi V (2020) A hybrid copy-move image forgery detection technique based on fourier-mellin and scale invariant feature transforms. Multimedia Tools Appl 79(11):8197\u20138212","journal-title":"Multimedia Tools Appl"},{"key":"17279_CR23","volume":"52","author":"K Meena","year":"2020","unstructured":"Meena K, Tyagi V (2020) A copy-move image forgery detection technique based on tetrolet transform. J Inf Security Appl 52:102481","journal-title":"J Inf Security Appl"},{"key":"17279_CR24","first-page":"1","volume":"23","author":"R Agarwal","year":"2019","unstructured":"Agarwal R, Verma O (2019) An efficient copy move forgery detection using deep learning feature extraction and matching algorithm. Multimedia Tools Appl 23:1\u201322","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"17279_CR25","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1007\/s11045-018-0624-y","volume":"30","author":"O Al-Qershi","year":"2019","unstructured":"Al-Qershi O, Khoo B (2019) Enhanced block-based copy-move forgery detection using k-means clustering. Multidimen Syst Signal Process 30(4):1671\u20131695","journal-title":"Multidimen Syst Signal Process"},{"issue":"1","key":"17279_CR26","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1007\/s11042-022-12391-4","volume":"82","author":"S Kumar","year":"2023","unstructured":"Kumar S, Mukherjee S, Pal AK (2023) An improved reduced feature-based copy-move forgery detection technique. Multimedia Tools Appl 82(1):1431\u20131456","journal-title":"Multimedia Tools Appl"},{"key":"17279_CR27","doi-asserted-by":"crossref","unstructured":"Paul S, Pal AK (2023) A fast copy-move image forgery detection approach on a reduced search space. Multimedia Tools Appl 1\u201328","DOI":"10.1007\/s11042-022-14224-w"},{"issue":"16","key":"17279_CR28","doi-asserted-by":"publisher","first-page":"22867","DOI":"10.1007\/s11042-021-11503-w","volume":"81","author":"G Tahaoglu","year":"2022","unstructured":"Tahaoglu G, Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2022) Ciratefi based copy move forgery detection on digital images. Multimedia Tools Appl 81(16):22867\u201322902","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"17279_CR29","doi-asserted-by":"publisher","first-page":"102783","DOI":"10.1016\/j.ipm.2021.102783","volume":"59","author":"Y Gan","year":"2022","unstructured":"Gan Y, Zhong J, Vong C (2022) A novel copy-move forgery detection algorithm via feature label matching and hierarchical segmentation filtering. Inf Process Manag 59(1):102783","journal-title":"Inf Process Manag"},{"key":"17279_CR30","first-page":"115","volume":"3\u20131","author":"K Aggarwal","year":"2022","unstructured":"Aggarwal K, Mijwil MM, Al-Mistarehi AH, Hameed A, Alomari S, G\u00f6k M, Alaabdin AMZ, Abdul Rhman SH (2022) Has the future started? the current growth of artificial intelligence, machine learning, and deep learning. Iraqi J Comput Sci Math 3\u20131:115\u2013123","journal-title":"Iraqi J Comput Sci Math"},{"key":"17279_CR31","unstructured":"Rao RL (1995) Multiresolution techniques in image processing. Louisiana State University and Agricultural and Mechanical College"},{"key":"17279_CR32","unstructured":"Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD\u2013new database for copy-move forgery detection. IEEE Proceedings ELMAR, pp 49\u201354"},{"issue":"1","key":"17279_CR33","first-page":"168","volume":"17","author":"T Alaa","year":"2021","unstructured":"Alaa T (2021) Classification assessment methods. Appl Comput Informat 17(1):168\u2013192","journal-title":"Classification assessment methods. Appl Comput Informat"},{"issue":"7","key":"17279_CR34","doi-asserted-by":"publisher","first-page":"1791","DOI":"10.1007\/s10489-017-1038-5","volume":"48","author":"T Mahmood","year":"2018","unstructured":"Mahmood T, Mehmood Z, Shah M, Khan Z (2018) An efficient forensic technique for exposing region duplication forgery in digital images. Appl Intell 48(7):1791\u20131801","journal-title":"Appl Intell"},{"issue":"1","key":"17279_CR35","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"MH Alkawaz","year":"2018","unstructured":"Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Appl 30(1):183\u2013192","journal-title":"Neural Comput Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17279-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17279-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17279-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T11:31:58Z","timestamp":1715081518000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17279-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,2]]},"references-count":35,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17279"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17279-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,11,2]]},"assertion":[{"value":"4 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have NO affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding and\/or Conflicts of interests\/Competing interests"}}]}}