{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T18:18:42Z","timestamp":1776881922295,"version":"3.51.2"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-025-00584-y","type":"journal-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:06:02Z","timestamp":1763078762000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A comprehensive system for detecting and verifying counterfeit images using deep neural networks"],"prefix":"10.1007","volume":"22","author":[{"given":"Praharsh","family":"Ajit PaiaAjit Paia","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rizwan","family":"Ur Rahman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deepak","family":"Singh Tomar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"584_CR1","unstructured":"Vaghasiya, K.: The latest ChatGPT statistics and user trends (2024\u20132025). URL: (2024)., November 28 https:\/\/wisernotify.com\/blog\/chatgpt-users\/?utm_source=chatgpt.com"},{"key":"584_CR2","unstructured":"Nerdynav: 107 Up-to-Date ChatGPT Statistics & User Numbers [Nov 2024]. URL: (2024)., November 4 https:\/\/nerdynav.com\/chatgpt-statistics\/?utm_source=chatgpt.com"},{"key":"584_CR3","unstructured":"Singh, S.: Number of ChatGPT users (January 2025). URL: (2025)., January 2 https:\/\/www.demandsage.com\/chatgpt-statistics\/?utm_source=chatgpt.com"},{"key":"584_CR4","unstructured":"Broz, M., Broz, M.: Midjourney statistics (2025). URL: (2024)., December 20 https:\/\/photutorial.com\/midjourney-statistics\/?utm_source=chatgpt.com"},{"key":"584_CR5","unstructured":"Kumar, N.: Midjourney Statistics 2025: URL: (2024)., December 31 https:\/\/www.demandsage.com\/midjourney-statistics\/?utm_source=chatgpt.com"},{"key":"584_CR6","unstructured":"Mohapatra, D.: Morphed photos of women: State records most cases. URL: (2023)., December 5 https:\/\/timesofindia.indiatimes.com\/city\/bhubaneswar\/morphed-photos-of-women-odisha-records-highest-cases-ncrb-report-reveals\/articleshow\/105741454.cms"},{"key":"584_CR7","unstructured":"Badgeri, N.N.G.: Families struggle to cope after some sextortion, loan app victims end lives. URL: (2023)., December 3 https:\/\/timesofindia.indiatimes.com\/city\/mumbai\/families-struggle-to-cope-after-some-sextortion-loan-app-victims-end-lives\/articleshow\/105689716.cms"},{"key":"584_CR8","unstructured":"TIMESOFINDIA.COM. Delhi Police arrests UP man for trying to extort money from woman by using her morphed pictures. URL: (2023)., April 27 https:\/\/timesofindia.indiatimes.com\/city\/delhi\/delhi-police-arrests-up-man-for-trying-to-extort-money-from-woman-by-using-her-morphed-pictures\/articleshow\/99813099.cms"},{"key":"584_CR9","unstructured":"Prajwal, D.S., Prajwal, D.S.: Bengaluru: Housewife blackmailed with morphed photos after downloading loan app. URL: (2024)., July 31 https:\/\/www.deccanherald.com\/india\/karnataka\/bengaluru\/bengaluru-housewife-blackmailed-with-morphed-photos-after-downloading-loan-app-3131508"},{"key":"584_CR10","unstructured":"Tnn: Gujarat: Ex-fianc\u00e9 uploads morphed pictures. URL: (2019)., September 4 https:\/\/timesofindia.indiatimes.com\/city\/ahmedabad\/ex-fianc-uploads-morphed-pictures\/articleshow\/70967592.cms"},{"key":"584_CR11","unstructured":"Ghosh, D.: Kol logs most photo-morph cases in India in \u201922: NCRB. URL: (2023)., December 5 https:\/\/timesofindia.indiatimes.com\/city\/kolkata\/kolkata-tops-photo-morph-cases-in-india-in-2022-ncrb-report\/articleshow\/105740314.cms"},{"key":"584_CR12","unstructured":"Tnn: Rajasthan: Cyberbullying, e-frauds at record high. URL: (2019b)., October 23 https:\/\/timesofindia.indiatimes.com\/city\/jaipur\/cyberbullying-e-frauds-at-record-high\/articleshow\/71712887.cms"},{"key":"584_CR13","unstructured":"Express News Service, & Express News Service: 2 post morphed pics of women online, arrested. URL: (2023)., July 17 https:\/\/www.newindianexpress.com\/states\/tamil-nadu\/2023\/Jul\/17\/2-post-morphed-pics-of-women-online-arrested-2595640.html"},{"issue":"8","key":"584_CR14","doi-asserted-by":"publisher","first-page":"134","DOI":"10.3390\/jimaging7080134","volume":"7","author":"M Tanaka","year":"2021","unstructured":"Tanaka, M., Shiota, S., Kiya, H.: A detection method of operated fake-images using robust hashing. J. Imaging. 7(8), 134 (2021)","journal-title":"J. Imaging"},{"issue":"19","key":"584_CR15","doi-asserted-by":"publisher","first-page":"10980","DOI":"10.3390\/app131910980","volume":"13","author":"DK Sharma","year":"2023","unstructured":"Sharma, D.K., Singh, B., Agarwal, S., Garg, L., Kim, C., Jung, K.H.: A survey of detection and mitigation for fake images on social media platforms. Appl. Sci. 13(19), 10980 (2023)","journal-title":"Appl. Sci."},{"key":"584_CR16","doi-asserted-by":"crossref","unstructured":"Killi, C.B.R., Balakrishnan, N., Rao, C.S.: Deep Fake Image Classification Using VGG-19 Model. Ing\u00e9nierie des. Syst\u00e8mes d'Information, 28(2). (2023)","DOI":"10.18280\/isi.280228"},{"issue":"1","key":"584_CR17","doi-asserted-by":"publisher","first-page":"370","DOI":"10.3390\/app10010370","volume":"10","author":"CC Hsu","year":"2020","unstructured":"Hsu, C.C., Zhuang, Y.X., Lee, C.Y.: Deep fake image detection based on pairwise learning. Appl. Sci. 10(1), 370 (2020)","journal-title":"Appl. Sci."},{"key":"584_CR18","doi-asserted-by":"crossref","unstructured":"Cartella, G., Cuculo, V., Cornia, M., Cucchiara, R.: Unveiling the Truth: Exploring Human Gaze Patterns in Fake Images. IEEE. Signal. Process. Lett. (2024)","DOI":"10.1109\/LSP.2024.3375288"},{"key":"584_CR19","doi-asserted-by":"publisher","first-page":"2657","DOI":"10.1109\/TIFS.2022.3141262","volume":"17","author":"Y Huang","year":"2022","unstructured":"Huang, Y., Juefei-Xu, F., Guo, Q., Liu, Y., Pu, G.: FakeLocator: Robust localization of gan-based face manipulations. IEEE Trans. Inf. Forensics Secur. 17, 2657\u20132672 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"584_CR20","doi-asserted-by":"crossref","unstructured":"Liu, H., Tan, Z., Tan, C., Wei, Y., Wang, J., Zhao, Y.: Forgery-aware adaptive transformer for generalizable synthetic image detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp. 10770\u201310780). (2024)","DOI":"10.1109\/CVPR52733.2024.01024"},{"issue":"6","key":"584_CR21","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1002\/acp.4110","volume":"37","author":"TR Flack","year":"2023","unstructured":"Flack, T.R., Ritchie, K.L., Cartledge, C., Fuller, E.A., Kramer, R.S.: Improving face morph detection with the pairs training effect. Appl. Cogn. Psychol. 37(6), 1158\u20131166 (2023)","journal-title":"Appl. Cogn. Psychol."},{"key":"584_CR22","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: a compact facial video forgery detection network. In 2018 IEEE international workshop on information forensics and security (WIFS) (pp. 1\u20137). IEEE. (2018), December","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"584_CR23","doi-asserted-by":"crossref","unstructured":"Bondi, L., Lameri, S., G\u00fcera, D., Bestagini, P., Delp, E.J., Tubaro, S.: Tampering detection and localization through clustering of camera-based CNN features. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (pp. 1855\u20131864). IEEE. (2017), July","DOI":"10.1109\/CVPRW.2017.232"},{"issue":"1","key":"584_CR24","doi-asserted-by":"publisher","first-page":"46","DOI":"10.37934\/araset.44.1.4654","volume":"44","author":"MS Mandisha","year":"2025","unstructured":"Mandisha, M.S., Hussien, M.A., Shalaby, A.K., Fahmy, O.M.: Wavelet Transform-based Methods for Forensic Analysis of Digital Images. J. Adv. Res. Appl. Sci. Eng. Technol. 44(1), 46\u201354 (2025)","journal-title":"J. Adv. Res. Appl. Sci. Eng. Technol."},{"key":"584_CR25","doi-asserted-by":"crossref","unstructured":"Chai, L., Bau, D., Lim, S.N., Isola, P.: What makes fake images detectable? understanding properties that generalize. In Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXVI 16 (pp. 103\u2013120). Springer International Publishing. (2020)","DOI":"10.1007\/978-3-030-58574-7_7"},{"key":"584_CR26","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1016\/j.aej.2024.10.076","volume":"111","author":"ES Atlam","year":"2025","unstructured":"Atlam, E.S., Almaliki, M., Elmarhomy, G., Almars, A.M., Elsiddieg, A.M., ElAgamy, R.: SLM-DFS: A systematic literature map of deepfake spread on social media. Alexandria Eng. J. 111, 446\u2013455 (2025)","journal-title":"Alexandria Eng. J."},{"issue":"1","key":"584_CR27","doi-asserted-by":"publisher","first-page":"19683","DOI":"10.48084\/etasr.9593","volume":"15","author":"R Gorle","year":"2025","unstructured":"Gorle, R., Guttavelli, A.: Enhanced Image Tampering Detection using Error Level Analysis and CNN. Eng. Technol. Appl. Sci. Res. 15(1), 19683\u201319689 (2025)","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"584_CR28","doi-asserted-by":"crossref","unstructured":"Chalini, G.R., Kanimozhi, K.V.: Evaluation Techniques to Detect Face Morphing Vulnerabilities for Differential Images. In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC) (pp. 1532\u20131537). IEEE. (2024), September","DOI":"10.1109\/ICOSEC61587.2024.10722587"},{"key":"584_CR29","doi-asserted-by":"crossref","unstructured":"Seibold, C., Samek, W., Hilsmann, A., Eisert, P.: Detection of face morphing attacks by deep learning. In Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23\u201325, 2017, Proceedings 16 (pp. 107\u2013120). Springer International Publishing. (2017)","DOI":"10.1007\/978-3-319-64185-0_9"},{"key":"584_CR30","doi-asserted-by":"crossref","unstructured":"Kadiri, P., Anusha, P., Prabhu, M., Asuncion, R., Pavan, V.S., Suman, J.V.: Morphed Picture Recognition using Machine Learning Algorithms. In 2024 Second International Conference on Advances in Information Technology (ICAIT) (Vol. 1, pp. 1\u20136). IEEE. (2024), July","DOI":"10.1109\/ICAIT61638.2024.10690845"},{"key":"584_CR31","doi-asserted-by":"crossref","unstructured":"ur Rahman, R., Tomar, D.S., Das, S.: Dynamic image based captcha. In 2012 International Conference on Communication Systems and Network Technologies (pp. 90\u201394). IEEE. (2012), May","DOI":"10.1109\/CSNT.2012.29"},{"key":"584_CR32","unstructured":"Xhlulu: 140k Real and Fake Faces [Dataset]. Kaggle. (2020). https:\/\/www.kaggle.com\/datasets\/xhlulu\/140k-real-and-fake-faces"},{"key":"584_CR33","unstructured":"Dolhansky, B., Palmer, J., Howes, R., Wang, M., Ferrer, C.C.: Deepfake Detection Dataset (DFDD) [Dataset]. Michigan State University CV Lab. (2019). https:\/\/cvlab.cse.msu.edu\/dffd-dataset.html"},{"issue":"4","key":"584_CR34","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s42979-025-03908-3","volume":"6","author":"RU Rahman","year":"2025","unstructured":"Rahman, R.U., Kumar, P., Mohan, A., Aziz, R.M., Tomar, D.S.: A Novel Technique for Image Captioning Based on Hierarchical Clustering and Deep Learning. SN Comput. Sci. 6(4), 360 (2025)","journal-title":"SN Comput. Sci."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00584-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-025-00584-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00584-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:06:06Z","timestamp":1763078766000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-025-00584-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,13]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["584"],"URL":"https:\/\/doi.org\/10.1007\/s11416-025-00584-y","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,13]]},"assertion":[{"value":"11 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}