{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T11:55:49Z","timestamp":1772279749549,"version":"3.50.1"},"reference-count":116,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T00:00:00Z","timestamp":1772236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T00:00:00Z","timestamp":1772236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21389-1","type":"journal-article","created":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T03:57:44Z","timestamp":1772251064000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards reliable forgery detection techniques for remote sensing images: Parametric evaluation and open challenges"],"prefix":"10.1007","volume":"85","author":[{"given":"Deepti","family":"Patole","sequence":"first","affiliation":[]},{"given":"Sangita","family":"Chaudhari","sequence":"additional","affiliation":[]},{"given":"Tejas","family":"Tamkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,28]]},"reference":[{"key":"21389_CR1","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1080\/01431161.2024.2429784","volume":"46","author":"F Samadzadegan","year":"2024","unstructured":"Samadzadegan F, Toosi A, Dadrass Javan F (2024) A critical review on multi-sensor and multi-platform remote sensing data fusion approaches: current status and prospects. Intern J Remote Sens 46:1327\u20131402","journal-title":"Intern J Remote Sens"},{"key":"21389_CR2","unstructured":"Hong D et\u00a0al (2025) Hyperspectral imaging. arXiv:2508.08107"},{"key":"21389_CR3","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1109\/JPROC.2012.2231391","volume":"101","author":"S Lopez","year":"2013","unstructured":"Lopez S et al (2013) The promise of reconfigurable computing for hyperspectral imaging onboard systems: A review and trends. Proc IEEE 101:698\u2013722","journal-title":"Proc IEEE"},{"key":"21389_CR4","doi-asserted-by":"crossref","unstructured":"Ghasemi N, Justo JA, Celesti M, Despoisse L Nieke, J (2025) Onboard processing of hyperspectral imagery: Deep learning advancements, methodologies, challenges, and emerging trends. IEEE J Select Topics Appl Earth Observ Remote Sens","DOI":"10.1109\/JSTARS.2025.3527898"},{"key":"21389_CR5","doi-asserted-by":"publisher","first-page":"3701","DOI":"10.1109\/JSTARS.2020.2996679","volume":"13","author":"JM Nascimento","year":"2020","unstructured":"Nascimento JM, V\u00e9stias MP, Mart\u00edn G (2020) Hyperspectral compressive sensing with a system-on-chip fpga. IEEE J Select Topics Appl Earth Observ Remote Sens 13:3701\u20133710","journal-title":"IEEE J Select Topics Appl Earth Observ Remote Sens"},{"key":"21389_CR6","doi-asserted-by":"publisher","first-page":"102878","DOI":"10.1016\/j.sysarc.2023.102878","volume":"139","author":"J Guti\u00e9rrez-Zaballa","year":"2023","unstructured":"Guti\u00e9rrez-Zaballa J et al (2023) On-chip hyperspectral image segmentation with fully convolutional networks for scene understanding in autonomous driving. J Syst Architect 139:102878","journal-title":"J Syst Architect"},{"key":"21389_CR7","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.vlsi.2012.04.002","volume":"46","author":"C Gonzalez","year":"2013","unstructured":"Gonzalez C et al (2013) Use of fpga or gpu-based architectures for remotely sensed hyperspectral image processing. Integration 46:89\u2013103","journal-title":"Integration"},{"key":"21389_CR8","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/JSTARS.2012.2194696","volume":"5","author":"JM Bioucas-Dias","year":"2012","unstructured":"Bioucas-Dias JM et al (2012) Hyperspectral unmixing overview: Geometrical, statistical, and sparse regression-based approaches. IEEE J Select Topics Appl Earth Observ Remote Sens 5:354\u2013379","journal-title":"IEEE J Select Topics Appl Earth Observ Remote Sens"},{"key":"21389_CR9","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1186\/1687-6180-2013-68","volume":"2013","author":"A Rem\u00f3n","year":"2013","unstructured":"Rem\u00f3n A, S\u00e1nchez S, Bernab\u00e9 S, Quintana-Ort\u00ed ES, Plaza A (2013) Performance versus energy consumption of hyperspectral unmixing algorithms on multi-core platforms. EURASIP J Adv Signal Process 2013:68","journal-title":"EURASIP J Adv Signal Process"},{"key":"21389_CR10","doi-asserted-by":"crossref","unstructured":"Ake C, Scotkin J, Masten D (2012) Exploring the benefits of commercial robotic lander testbeds 1\u20138 (IEEE)","DOI":"10.1109\/AERO.2012.6187305"},{"key":"21389_CR11","doi-asserted-by":"publisher","first-page":"3756","DOI":"10.3390\/rs15153756","volume":"15","author":"DD Langer","year":"2023","unstructured":"Langer DD et al (2023) Robust and reconfigurable on-board processing for a hyperspectral imaging small satellite. Remote Sens 15:3756","journal-title":"Remote Sens"},{"key":"21389_CR12","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1109\/JPROC.2018.2793158","volume":"106","author":"KB Chin","year":"2018","unstructured":"Chin KB et al (2018) Energy storage technologies for small satellite applications. Proc IEEE 106:419\u2013428","journal-title":"Proc IEEE"},{"key":"21389_CR13","doi-asserted-by":"crossref","unstructured":"Mostacciuolo E et\u00a0al (2018) Modeling and power management of a leo small satellite electrical power system 2738\u20132743. (IEEE)","DOI":"10.23919\/ECC.2018.8550095"},{"key":"21389_CR14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/JPROC.2018.2806218","volume":"106","author":"MN Sweeting","year":"2018","unstructured":"Sweeting MN (2018) Modern small satellites-changing the economics of space. Proc IEEE 106:343\u2013361","journal-title":"Proc IEEE"},{"key":"21389_CR15","doi-asserted-by":"publisher","first-page":"104313","DOI":"10.1016\/j.micpro.2021.104313","volume":"85","author":"R Gayathri","year":"2021","unstructured":"Gayathri R et al (2021) Onboard target detection in hyperspectral image based on deep learning with fpga implementation. Microprocess Microsyst 85:104313","journal-title":"Microprocess Microsyst"},{"key":"21389_CR16","doi-asserted-by":"crossref","unstructured":"Loizzo R et\u00a0al (2019) Prisma mission status and perspective, 4503\u20134506. (IEEE)","DOI":"10.1109\/IGARSS.2019.8899272"},{"key":"21389_CR17","doi-asserted-by":"publisher","first-page":"112499","DOI":"10.1016\/j.rse.2021.112499","volume":"262","author":"S Cogliati","year":"2021","unstructured":"Cogliati S et al (2021) The prisma imaging spectroscopy mission: overview and first performance analysis. Remote Sens Environ 262:112499","journal-title":"Remote Sens Environ"},{"key":"21389_CR18","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.3390\/jmse11112065","volume":"11","author":"X Chen","year":"2023","unstructured":"Chen X, Wei C, Xin Z, Zhao J, Xian J (2023) Ship detection under low-visibility weather interference via an ensemble generative adversarial network. J Marine Sci Eng 11:2065","journal-title":"J Marine Sci Eng"},{"key":"21389_CR19","doi-asserted-by":"crossref","unstructured":"Wang D, Jing Y (2025) Ship collision risk analysis in port waters integrating gra algorithm and bpnn. Transport Safety Environ 7:tdaf012","DOI":"10.1093\/tse\/tdaf012"},{"key":"21389_CR20","doi-asserted-by":"crossref","unstructured":"Wang Q, Zhang Q, Wang Y, Hu Y, Guo S (2023) Event-triggered adaptive finite time trajectory tracking control for an underactuated vessel considering unknown time-varying disturbances. Transport Safety Environ 5:tdac078","DOI":"10.1093\/tse\/tdac078"},{"key":"21389_CR21","first-page":"103","volume":"3","author":"Y He","year":"2021","unstructured":"He Y et al (2021) Collision-avoidance path planning for multi-ship encounters considering ship manoeuvrability and colregs. Transport Safety Environ 3:103\u2013113","journal-title":"Transport Safety Environ"},{"key":"21389_CR22","doi-asserted-by":"publisher","first-page":"14317","DOI":"10.1109\/JSEN.2020.3007809","volume":"20","author":"X Chen","year":"2020","unstructured":"Chen X et al (2020) Sensing data supported traffic flow prediction via denoising schemes and ann: A comparison. IEEE Sens J 20:14317\u201314328","journal-title":"IEEE Sens J"},{"key":"21389_CR23","doi-asserted-by":"publisher","first-page":"3190","DOI":"10.1109\/TITS.2020.3003782","volume":"22","author":"X Chen","year":"2021","unstructured":"Chen X, Li Z, Yang Y, Qi L, Ke R (2021) High-resolution vehicle trajectory extraction and denoising from aerial videos. IEEE Trans Intell Transp Syst 22:3190\u20133202","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"21389_CR24","unstructured":"The GIMP Team (2025) Gimp - gnu image manipulation program. https:\/\/www.gimp.org\/. Accessed 29 July 2025"},{"key":"21389_CR25","doi-asserted-by":"crossref","unstructured":"Sui J, Ma D, Kuo C-CJ, Pun M-O (2024) Fldcf: A collaborative framework for forgery localization and detection in satellite imagery. IEEE Trans Geosci Remote Sens","DOI":"10.1109\/TGRS.2024.3502035"},{"key":"21389_CR26","unstructured":"Yarlagadda SK et\u00a0al (2018) Satellite image forgery detection and localization using gan and one-class classifier. arxiv:1802.04881. https:\/\/api.semanticscholar.org\/CorpusID:3640362"},{"key":"21389_CR27","doi-asserted-by":"crossref","unstructured":"Montserrat DM, Horv\u00e1th J, Yarlagadda SK, Zhu F, Delp EJ (2020) Generative autoregressive ensembles for satellite imagery manipulation detection 1\u20136. (IEEE)","DOI":"10.1109\/WIFS49906.2020.9360909"},{"key":"21389_CR28","doi-asserted-by":"publisher","first-page":"1800","DOI":"10.1080\/01431161.2022.2048319","volume":"43","author":"Y Bai","year":"2022","unstructured":"Bai Y, Zhao Y, Shao Y, Zhang X, Yuan X (2022) Deep learning in different remote sensing image categories and applications: status and prospects. Int J Remote Sens 43:1800\u20131847","journal-title":"Int J Remote Sens"},{"key":"21389_CR29","unstructured":"Wasser LA (2023) About hyperspectral remote sensing data. NEON Learning Hub. Accessed 2 Aug 2025"},{"key":"21389_CR30","unstructured":"Multispectral image bands H. https:\/\/gisgeography.com\/multispectral-vs-hyperspectral-imagery-explained\/. Accessed Aug 2024"},{"key":"21389_CR31","unstructured":"Driggers RG, Friedman MH, Devitt JW, Furxhi O, Singh A (2022) Introduction to infrared and electro-optical systems (Artech House)"},{"key":"21389_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/116.00000142","volume":"11","author":"L Abady","year":"2022","unstructured":"Abady L et al (2022) An overview on the generation and detection of synthetic and manipulated satellite images. APSIPA Trans Signal Inf Process 11:1\u201356","journal-title":"APSIPA Trans Signal Inf Process"},{"key":"21389_CR33","unstructured":"Malhotra R (n.d.) Optical sensors. In: *GEOG-480: Exploring imagery and elevation data in GIS applications*. https:\/\/www.e-education.psu.edu\/geog480\/node\/444. Accessed 2 Aug 2025"},{"key":"21389_CR34","unstructured":"National Ecological Observatory Network (n.d.) Lidar. NEON Data Collection. https:\/\/www.neonscience.org\/data-collection\/lidar. Accessed 2 Aug 2025"},{"key":"21389_CR35","first-page":"102734","volume":"108","author":"S Jozdani","year":"2022","unstructured":"Jozdani S, Chen D, Pouliot D, Johnson BA (2022) A review and meta-analysis of generative adversarial networks and their applications in remote sensing. Int J Appl Earth Obs Geoinf 108:102734","journal-title":"Int J Appl Earth Obs Geoinf"},{"key":"21389_CR36","doi-asserted-by":"publisher","first-page":"5646","DOI":"10.3390\/s21165646","volume":"21","author":"S Illarionova","year":"2021","unstructured":"Illarionova S, Shadrin D, Trekin A, Ignatiev V, Oseledets I (2021) Generation of the nir spectral band for satellite images with convolutional neural networks. Sensors 21:5646","journal-title":"Sensors"},{"key":"21389_CR37","doi-asserted-by":"publisher","unstructured":"Wang J, Zheng Z, Ma A, Lu X, Zhong Y (2021) LoveDA: A remote sensing land-cover dataset for domain adaptive semantic segmentation. https:\/\/doi.org\/10.5281\/zenodo.5706578","DOI":"10.5281\/zenodo.5706578"},{"key":"21389_CR38","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum R, Ren Y, Kuo C-CJ (2018) Image splicing localization using a multi-task fully convolutional network (mfcn). J Vis Commun Image Represent 51:201\u2013209","journal-title":"J Vis Commun Image Represent"},{"key":"21389_CR39","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.isprsjprs.2022.06.010","volume":"190","author":"M Yates","year":"2022","unstructured":"Yates M, Hart G, Houghton R, Torres MT, Pound M (2022) Evaluation of synthetic aerial imagery using unconditional generative adversarial networks. ISPRS J Photogramm Remote Sens 190:231\u2013251","journal-title":"ISPRS J Photogramm Remote Sens"},{"key":"21389_CR40","unstructured":"United Nations Office for Disaster Risk Reduction (UNDRR) (2025) Satellite early warning system for natural hazards. PreventionWeb Quick Post #93253. https:\/\/www.preventionweb.net\/quick\/93253. Published approximately 4 months ago. Accessed 2 Aug 2025"},{"key":"21389_CR41","doi-asserted-by":"crossref","unstructured":"Chen Y, Morton DC, Randerson JT (2024) Remote sensing for wildfire monitoring: Insights into burned area, emissions, and fire dynamics. One Earth 7:1022\u20131028. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2590332224002574","DOI":"10.1016\/j.oneear.2024.05.014"},{"key":"21389_CR42","unstructured":"National Remote Sensing Centre (NRSC), ISRO (2025) Land use and land cover \u2013 1-:-250-000 scale. NRSC EO-LULC Application, NRSC (ISRO) website. https:\/\/www.nrsc.gov.in\/EO_LULC_Application\/page_1. Last updated 01 August 2025. Accessed 2 Aug 2025"},{"key":"21389_CR43","doi-asserted-by":"crossref","unstructured":"Lu B, Dao PD, Liu J, He Y, Shang J (2020) Recent advances of hyperspectral imaging technology and applications in agriculture. Remote Sens 12. https:\/\/www.mdpi.com\/2072-4292\/12\/16\/2659","DOI":"10.3390\/rs12162659"},{"key":"21389_CR44","doi-asserted-by":"crossref","unstructured":"Shaheen MT, Iqbal H, Khurshid N, Sadia H, Saeed N (2025) SwinSegFormer: Advancing Aerial Image Semantic Segmentation for Flood Detection. IEEE Open J Comput Soc 6:645\u2013657. https:\/\/doi.ieeecomputersociety.org\/10.1109\/OJCS.2025.3565185","DOI":"10.1109\/OJCS.2025.3565185"},{"key":"21389_CR45","unstructured":"Chen Z et\u00a0al (2023) Vision transformer adapter for dense predictions. arXiv:2205.08534"},{"key":"21389_CR46","doi-asserted-by":"publisher","unstructured":"Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Aust J Forensic Sci 49:281\u2013307. https:\/\/doi.org\/10.1080\/00450618.2016.1153711","DOI":"10.1080\/00450618.2016.1153711"},{"key":"21389_CR47","doi-asserted-by":"crossref","unstructured":"Panthalodi A, KS S (2021) Forgery detection in images using zernike moments and gabor filter banks. Proceedings of the Yukthi","DOI":"10.2139\/ssrn.3972541"},{"key":"21389_CR48","doi-asserted-by":"crossref","unstructured":"Serfaty M, Nikoukhah T, Bammey Q, von Gioi RG, de\u00a0Franchis C (2023) Are classic forensic tools effective on satellite imagery? 5646\u20135649. (IEEE)","DOI":"10.1109\/IGARSS52108.2023.10282862"},{"key":"21389_CR49","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1080\/00450618.2018.1424241","volume":"51","author":"S Walia","year":"2019","unstructured":"Walia S, Kumar K (2019) Digital image forgery detection: a systematic scrutiny. Aust J Forensic Sci 51:488\u2013526","journal-title":"Aust J Forensic Sci"},{"key":"21389_CR50","doi-asserted-by":"publisher","first-page":"4660","DOI":"10.3390\/rs15194660","volume":"15","author":"Z Lu","year":"2023","unstructured":"Lu Z, Sun H, Ji K, Kuang G (2023) Adversarial robust aerial image recognition based on reactive-proactive defense framework with deep ensembles. Remote Sensing 15:4660","journal-title":"Remote Sensing"},{"key":"21389_CR51","doi-asserted-by":"publisher","first-page":"189","DOI":"10.29150\/jhrs.v7.4.p189-211","volume":"7","author":"E Bedini","year":"2017","unstructured":"Bedini E (2017) The use of hyperspectral remote sensing for mineral exploration: A review. J Hyperspect Remote Sens 7:189\u2013211","journal-title":"J Hyperspect Remote Sens"},{"key":"21389_CR52","doi-asserted-by":"publisher","first-page":"33882","DOI":"10.1109\/ACCESS.2022.3161836","volume":"10","author":"ED Cannas","year":"2022","unstructured":"Cannas ED, Bonettini N, Mandelli S, Bestagini P, Tubaro S (2022) Amplitude sar imagery splicing localization. IEEE Access 10:33882\u201333899","journal-title":"IEEE Access"},{"key":"21389_CR53","doi-asserted-by":"crossref","unstructured":"Xu R et\u00a0al (2022) A task-specific remote sensing image manipulation based on deep detection network and mask seam carving 92\u201396. (IEEE)","DOI":"10.1109\/ICFSP55781.2022.9924761"},{"key":"21389_CR54","doi-asserted-by":"crossref","unstructured":"Gudavalli C, Rosten E, Nataraj L, Chandrasekaran S, Manjunath B (2022) Seetheseams: Localized detection of seam carving based image forgery in satellite imagery 1\u201311","DOI":"10.1109\/CVPRW56347.2022.00010"},{"key":"21389_CR55","doi-asserted-by":"publisher","first-page":"9492358","DOI":"10.1155\/2019\/9492358","volume":"2019","author":"M Lu","year":"2019","unstructured":"Lu M, Niu S (2019) Detection of image seam carving using a novel pattern. Comput Intell Neurosci 2019:9492358","journal-title":"Comput Intell Neurosci"},{"key":"21389_CR56","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1080\/15230406.2021.1910075","volume":"48","author":"B Zhao","year":"2021","unstructured":"Zhao B, Zhang S, Xu C, Sun Y, Deng C (2021) Deep fake geography? when geospatial data encounter artificial intelligence. Cartogr Geogr Inf Sci 48:338\u2013352","journal-title":"Cartogr Geogr Inf Sci"},{"key":"21389_CR57","doi-asserted-by":"crossref","unstructured":"Hsu C-C, Jhang Y-A Ko M-T (2023) Seeing is not believing: Toward forgery detection for hyperspectral image 5858\u20135861 (IEEE)","DOI":"10.1109\/IGARSS52108.2023.10282019"},{"key":"21389_CR58","doi-asserted-by":"crossref","unstructured":"Castillo\u00a0Camacho I, Wang K (2021) A comprehensive review of deep-learning-based methods for image forensics. J Imag 7:69","DOI":"10.3390\/jimaging7040069"},{"key":"21389_CR59","unstructured":"Chalapathy R, Menon AK, Chawla S (2018) Anomaly detection using one-class neural networks. arxiv:1802.06360. https:\/\/api.semanticscholar.org\/CorpusID:3346581"},{"key":"21389_CR60","doi-asserted-by":"crossref","unstructured":"Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features","DOI":"10.1109\/CVPR.2019.00977"},{"key":"21389_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-024-10909-w","volume":"57","author":"X Ding","year":"2024","unstructured":"Ding X, Nie Y, Yao J, Tang J, Lang Y (2024) Forensic research of satellite images forgery: a comprehensive survey. Artif Intell Rev 57:1\u201340","journal-title":"Artif Intell Rev"},{"key":"21389_CR62","doi-asserted-by":"crossref","unstructured":"Niloy FF, Bhaumik KK, Woo SS (2023) Hrfnet: High-resolution forgery network for localizing satellite image manipulation 3165\u20133169. (IEEE)","DOI":"10.1109\/ICIP49359.2023.10221974"},{"key":"21389_CR63","doi-asserted-by":"crossref","unstructured":"Niloy FF, Bhaumik KK, Woo SS (2022) Cfl-net: Image forgery localization using contrastive learning. arXiv:2210.02182","DOI":"10.1109\/WACV56688.2023.00462"},{"key":"21389_CR64","first-page":"278","volume":"6","author":"MM Fouad","year":"2020","unstructured":"Fouad MM, Mustafa EM, Elshafey MA (2020) Detection and localization enhancement for satellite images with small forgeries using modified gan-based cnn structure. Intern J Adv Intell Inf 6:278\u2013289","journal-title":"Intern J Adv Intell Inf"},{"key":"21389_CR65","doi-asserted-by":"crossref","unstructured":"Qiu S, Xu X, Cai B (2018) Frelu: Flexible rectified linear units for improving convolutional neural networks 1223\u20131228","DOI":"10.1109\/ICPR.2018.8546022"},{"key":"21389_CR66","doi-asserted-by":"publisher","first-page":"153098","DOI":"10.1109\/ACCESS.2020.3017436","volume":"8","author":"S Obla","year":"2020","unstructured":"Obla S, Gong X, Aloufi A, Hu P, Takabi D (2020) Effective activation functions for homomorphic evaluation of deep neural networks. IEEE Access 8:153098\u2013153112","journal-title":"IEEE Access"},{"key":"21389_CR67","doi-asserted-by":"publisher","first-page":"13275","DOI":"10.1007\/s10489-022-04126-7","volume":"53","author":"R Alsughayer","year":"2023","unstructured":"Alsughayer R, Hussain M, Saeed F, AboalSamh H (2023) Detection and localization of splicing on remote sensing images using image-to-image transformation. Appl Intell 53:13275\u201313292","journal-title":"Appl Intell"},{"key":"21389_CR68","unstructured":"Naravade HPSCV (2022) Remote sensing forgery detection using u-net"},{"key":"21389_CR69","doi-asserted-by":"crossref","unstructured":"Bartusiak ER et\u00a0al (2019) Splicing detection and localization in satellite imagery using conditional gans 91\u201396. (IEEE)","DOI":"10.1109\/MIPR.2019.00024"},{"key":"21389_CR70","doi-asserted-by":"crossref","unstructured":"Montserrat DM, Horv\u2019ath J, Yarlagadda SK, Zhu FM, Delp EJ (2020) Generative autoregressive ensembles for satellite imagery manipulation detection. In: 2020 IEEE International workshop on information forensics and security (WIFS), pp 1\u20136. https:\/\/api.semanticscholar.org\/CorpusID:222209124","DOI":"10.1109\/WIFS49906.2020.9360909"},{"key":"21389_CR71","doi-asserted-by":"crossref","unstructured":"Khriss A, Elmiad AK, Badaoui M, Basha SM, Taherdoost H, Zanchettin C (eds) (2024) Improved unet for semantic segmentation in remote sensing. In: Basha SM, Taherdoost H, Zanchettin C (eds) Innovations in Cybersecurity and Data Science, pp 201\u2013211 (Springer Nature Singapore, Singapore)","DOI":"10.1007\/978-981-97-5791-6_16"},{"key":"21389_CR72","doi-asserted-by":"crossref","unstructured":"Kuznetsov A (2020) On deep learning approach in remote sensing data forgery detection 1\u20134. (IEEE)","DOI":"10.1109\/ITNT49337.2020.9253315"},{"key":"21389_CR73","unstructured":"Ronneberger O, Fischer P, Brox T, Navab N, Hornegger J, Wells WM, Frangi AF (eds) (2015) U-net: Convolutional networks for biomedical image segmentation. In: Navab N, Hornegger J, Wells WM, Frangi AF (eds) Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2015, 234\u2013241 (Springer International Publishing, Cham)"},{"key":"21389_CR74","first-page":"12077","volume":"34","author":"E Xie","year":"2021","unstructured":"Xie E et al (2021) Segformer: Simple and efficient design for semantic segmentation with transformers. Adv Neural Inf Process Syst 34:12077\u201312090","journal-title":"Adv Neural Inf Process Syst"},{"key":"21389_CR75","doi-asserted-by":"crossref","unstructured":"Liu Z et\u00a0al (2021) Swin transformer: Hierarchical vision transformer using shifted windows 10012\u201310022","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"21389_CR76","doi-asserted-by":"crossref","unstructured":"Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery 1053\u20131056. (IEEE)","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"21389_CR77","doi-asserted-by":"publisher","first-page":"23877","DOI":"10.1007\/s11042-021-10810-6","volume":"80","author":"A Rani","year":"2021","unstructured":"Rani A, Jain A, Kumar M (2021) Identification of copy-move and splicing based forgeries using advanced surf and revised template matching. Multimed Tools Appl 80:23877\u201323898","journal-title":"Multimed Tools Appl"},{"key":"21389_CR78","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1531326.1531330","volume":"28","author":"C Barnes","year":"2009","unstructured":"Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) Patchmatch: A randomized correspondence algorithm for structural image editing. ACM Trans Graph 28:24","journal-title":"ACM Trans Graph"},{"key":"21389_CR79","unstructured":"Goodfellow IJ et\u00a0al (2014) Generative adversarial networks. arXiv:1406.2661"},{"key":"21389_CR80","doi-asserted-by":"crossref","unstructured":"Baraheem SS, Nguyen TV (2023) Ai vs. ai: Can ai detect ai-generated images? J Imaging 9. https:\/\/www.mdpi.com\/2313-433X\/9\/10\/199","DOI":"10.3390\/jimaging9100199"},{"key":"21389_CR81","unstructured":"Cao Y et\u00a0al (2023) A comprehensive survey of ai-generated content (aigc): A history of generative ai from gan to chatgpt. arXiv:2303.04226"},{"key":"21389_CR82","doi-asserted-by":"crossref","unstructured":"Liao W-H, Chang Y-S Wu Y-C (2023) Detection of synthesized satellite images using deep neural networks 1\u20135. (IEEE)","DOI":"10.1109\/IMCOM56909.2023.10035570"},{"key":"21389_CR83","unstructured":"Su X et\u00a0al (2024) Intriguing property and counterfactual explanation of gan for remote sensing image generation. Intern J Comput Vis 1\u201325"},{"key":"21389_CR84","doi-asserted-by":"publisher","first-page":"3719","DOI":"10.3390\/rs16193719","volume":"16","author":"R Wu","year":"2024","unstructured":"Wu R, Guo W, Liu Y, Sun C (2024) High-precision heterogeneous satellite image manipulation localization: Feature point rules and semantic similarity measurement. Remote Sensing 16:3719","journal-title":"Remote Sensing"},{"key":"21389_CR85","doi-asserted-by":"publisher","first-page":"5109","DOI":"10.3390\/rs13245109","volume":"13","author":"K Ding","year":"2021","unstructured":"Ding K et al (2021) Aau-net: Attention-based asymmetric u-net for subject-sensitive hashing of remote sensing images. Remote Sensing 13:5109","journal-title":"Remote Sensing"},{"key":"21389_CR86","doi-asserted-by":"crossref","unstructured":"Ding X, Nie Y (2025) Spectral information guidance network for tampering localization of high-resolution satellite map. Expert Syst Appl 264:125825. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417424026927","DOI":"10.1016\/j.eswa.2024.125825"},{"key":"21389_CR87","doi-asserted-by":"publisher","first-page":"781","DOI":"10.3390\/rs16050781","volume":"16","author":"L Abady","year":"2024","unstructured":"Abady L, Dimitri GM, Barni M (2024) A one-class classifier for the detection of gan manipulated multi-spectral satellite images. Remote Sensing 16:781","journal-title":"Remote Sensing"},{"key":"21389_CR88","doi-asserted-by":"publisher","first-page":"4311","DOI":"10.3390\/rs16224311","volume":"16","author":"J Zhao","year":"2024","unstructured":"Zhao J, Shi Z, Yu C, Liu Y (2024) Multi-scenario remote sensing image forgery detection based on transformer and model fusion. Remote Sensing 16:4311","journal-title":"Remote Sensing"},{"key":"21389_CR89","doi-asserted-by":"crossref","unstructured":"Ding K, Chen S, Zeng Y, Wang Y, Yan X (2023) Transformer-based subject-sensitive hashing for integrity authentication of high-resolution remote sensing (hrrs) images. Appl Sci 13. https:\/\/www.mdpi.com\/2076-3417\/13\/3\/1815","DOI":"10.3390\/app13031815"},{"key":"21389_CR90","doi-asserted-by":"publisher","unstructured":"Patole D, Patil H, Chaudhari S (2024) Remote sensing image forgery detection using split and merge input u-net 1\u20135. (IEEE). https:\/\/doi.org\/10.1109\/WHISPERS65427.2024.10876504","DOI":"10.1109\/WHISPERS65427.2024.10876504"},{"key":"21389_CR91","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/TCSVT.2022.3220630","volume":"33","author":"Y Zhang","year":"2022","unstructured":"Zhang Y et al (2022) Cnn-transformer based generative adversarial network for copy-move source\/target distinguishment. IEEE Trans Circuits Syst Video Technol 33:2019\u20132032","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"21389_CR92","doi-asserted-by":"publisher","first-page":"48622","DOI":"10.1109\/ACCESS.2022.3172273","volume":"10","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Mortda AM, Fouda MM, Lashin NA (2022) An efficient cnn model to detect copy-move image forgery. IEEE Access 10:48622\u201348632","journal-title":"IEEE Access"},{"key":"21389_CR93","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.jksuci.2022.12.014","volume":"35","author":"MMA Alhaidery","year":"2023","unstructured":"Alhaidery MMA, Taherinia AH, Shahadi HI (2023) A robust detection and localization technique for copy-move forgery in digital images. J King Saud Univ-Comput Inf Sci 35:449\u2013461","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"21389_CR94","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.aej.2024.10.030","volume":"110","author":"MM Eltoukhy","year":"2025","unstructured":"Eltoukhy MM, Alsubaei FS, Mortda AM, Hosny KM (2025) An efficient convolution neural network method for copy-move video forgery detection. Alex Eng J 110:429\u2013437","journal-title":"Alex Eng J"},{"key":"21389_CR95","doi-asserted-by":"publisher","first-page":"110508","DOI":"10.1016\/j.knosys.2023.110508","volume":"269","author":"B Chaitra","year":"2023","unstructured":"Chaitra B, Reddy PB (2023) An approach for copy-move image multiple forgery detection based on an optimized pre-trained deep learning model. Knowl-Based Syst 269:110508","journal-title":"Knowl-Based Syst"},{"key":"21389_CR96","doi-asserted-by":"publisher","first-page":"59783","DOI":"10.1007\/s11042-023-17964-5","volume":"83","author":"O Kuznetsov","year":"2024","unstructured":"Kuznetsov O, Frontoni E, Romeo L, Rosati R (2024) Enhancing copy-move forgery detection through a novel cnn architecture and comprehensive dataset analysis. Multimed Tools Appl 83:59783\u201359817","journal-title":"Multimed Tools Appl"},{"key":"21389_CR97","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1049\/ipr2.12051","volume":"15","author":"N Goel","year":"2021","unstructured":"Goel N, Kaur S, Bala R (2021) Dual branch convolutional neural network for copy move forgery detection. IET Image Proc 15:656\u2013665","journal-title":"IET Image Proc"},{"key":"21389_CR98","doi-asserted-by":"publisher","first-page":"104075","DOI":"10.1016\/j.jvcir.2024.104075","volume":"99","author":"A Shehin","year":"2024","unstructured":"Shehin A, Sankar D (2024) Copy move forgery detection and localisation robust to rotation using block based discrete cosine transform and eigenvalues. J Vis Commun Image Represent 99:104075","journal-title":"J Vis Commun Image Represent"},{"key":"21389_CR99","doi-asserted-by":"publisher","first-page":"14573","DOI":"10.1007\/s13369-023-07727-7","volume":"48","author":"A Agarwal","year":"2023","unstructured":"Agarwal A, Khandelwal V (2023) Multiple manipulation detection in images using frequency domain features in 3d-cnn. Arab J Sci Eng 48:14573\u201314587","journal-title":"Arab J Sci Eng"},{"key":"21389_CR100","doi-asserted-by":"crossref","unstructured":"Gudavalli C, Rosten E, Nataraj L, Chandrasekaran S, Manjunath B (2024) Cimgen: Controlled image manipulation by finetuning pretrained generative models on limited data. arXiv:2401.13006","DOI":"10.1007\/978-3-031-78305-0_7"},{"key":"21389_CR101","doi-asserted-by":"publisher","first-page":"33882","DOI":"10.1109\/ACCESS.2022.3161836","volume":"10","author":"ED Cannas","year":"2022","unstructured":"Cannas ED, Bonettini N, Mandelli S, Bestagini P, Tubaro S (2022) Amplitude sar imagery splicing localization. IEEE Access 10:33882\u201333899","journal-title":"IEEE Access"},{"key":"21389_CR102","doi-asserted-by":"publisher","first-page":"121918","DOI":"10.1016\/j.eswa.2023.121918","volume":"238","author":"K Zhao","year":"2024","unstructured":"Zhao K et al (2024) Camu-net: Copy-move forgery detection utilizing coordinate attention and multi-scale feature fusion-based up-sampling. Expert Syst Appl 238:121918","journal-title":"Expert Syst Appl"},{"key":"21389_CR103","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi\u00a0K, N, Sasikala J, Shanmuganathan C (2024) Copy-paste forgery detection using deep learning with error level analysis. Multimed Tools Appl 83:3425\u20133449","DOI":"10.1007\/s11042-023-15594-5"},{"key":"21389_CR104","doi-asserted-by":"crossref","unstructured":"Wu R, Guo W, Liu Y, Sun C (2024) High-precision heterogeneous satellite image manipulation localization: Feature point rules and semantic similarity measurement. Remote Sensing 16. https:\/\/www.mdpi.com\/2072-4292\/16\/19\/3719","DOI":"10.3390\/rs16193719"},{"key":"21389_CR105","doi-asserted-by":"publisher","first-page":"5607","DOI":"10.1007\/s13042-024-02268-3","volume":"15","author":"S Mukherjee","year":"2024","unstructured":"Mukherjee S, Pal AK, Maji S (2024) A copy-move forgery detection technique using dbscan-based keypoint similarity matching. Int J Mach Learn Cybern 15:5607\u20135634","journal-title":"Int J Mach Learn Cybern"},{"key":"21389_CR106","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1007\/s13042-023-02031-0","volume":"15","author":"A Zheng","year":"2024","unstructured":"Zheng A et al (2024) Dsse-net: dual stream skip edge-enhanced network with forgery loss for image forgery localization. Int J Mach Learn Cybern 15:2323\u20132335","journal-title":"Int J Mach Learn Cybern"},{"key":"21389_CR107","doi-asserted-by":"publisher","first-page":"42","DOI":"10.3390\/jimaging10020042","volume":"10","author":"A-A Barglazan","year":"2024","unstructured":"Barglazan A-A, Brad R, Constantinescu C (2024) Image inpainting forgery detection: a review. J Imaging 10:42","journal-title":"J Imaging"},{"key":"21389_CR108","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/jimaging10010004","volume":"10","author":"H Mareen","year":"2023","unstructured":"Mareen H, De Neve L, Lambert PV, Wallendael G (2023) Harmonizing image forgery detection localization: Fusion of complementary approaches. J Imaging 10:4","journal-title":"J Imaging"},{"key":"21389_CR109","doi-asserted-by":"publisher","first-page":"172","DOI":"10.3390\/jimaging9090172","volume":"9","author":"R Jena","year":"2023","unstructured":"Jena R, Singh P, Mohanty M (2023) Pp-jpeg: A privacy-preserving jpeg image-tampering localization. J Imaging 9:172","journal-title":"J Imaging"},{"key":"21389_CR110","doi-asserted-by":"publisher","first-page":"8378073","DOI":"10.1155\/2023\/8378073","volume":"2023","author":"Y-F Gan","year":"2023","unstructured":"Gan Y-F, Yang J-X, Zhong J-L (2023) Video surveillance object forgery detection using pdcl network with residual-based steganalysis feature. Int J Intell Syst 2023:8378073","journal-title":"Int J Intell Syst"},{"key":"21389_CR111","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1038\/s41597-023-02096-0","volume":"10","author":"D Montero","year":"2023","unstructured":"Montero D et al (2023) A standardized catalogue of spectral indices to advance the use of remote sensing in earth system research. Scientific Data 10:197","journal-title":"Scientific Data"},{"key":"21389_CR112","doi-asserted-by":"crossref","unstructured":"Tramontana G et al (2016) Predicting carbon dioxide and energy fluxes across global fluxnet sites with regression algorithms. Biogeosciences 13:4291\u20134313. https:\/\/bg.copernicus.org\/articles\/13\/4291\/2016\/","DOI":"10.5194\/bg-13-4291-2016"},{"key":"21389_CR113","doi-asserted-by":"crossref","unstructured":"Jung M et\u00a0al (2020) Scaling carbon fluxes from eddy covariance sites to globe: synthesis and evaluation of the fluxcom approach. Biogeosciences 17:1343\u20131365. https:\/\/bg.copernicus.org\/articles\/17\/1343\/2020\/","DOI":"10.5194\/bg-17-1343-2020"},{"key":"21389_CR114","unstructured":"Abadi M et\u00a0al (2016) Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv:1603.04467"},{"key":"21389_CR115","unstructured":"Paszke A et\u00a0al (2019) Pytorch: An imperative style, high-performance deep learning library. arXiv:1912.01703"},{"key":"21389_CR116","first-page":"161","volume":"17","author":"M Prodan","year":"2023","unstructured":"Prodan M, Vl\u0103sceanu GV, Boiangiu C-A (2023) Comprehensive evaluation of metrics for image resemblance. J Inf Syst Oper Manag 17:161\u2013185","journal-title":"J Inf Syst Oper Manag"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21389-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21389-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21389-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T09:21:39Z","timestamp":1772270499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21389-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,28]]},"references-count":116,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["21389"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21389-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,28]]},"assertion":[{"value":"10 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"The authors declare no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Material Availability"}},{"value":"The code can be made available on reasonable request to the authors.","order":7,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code Availability"}}],"article-number":"246"}}