{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:03:15Z","timestamp":1771473795036,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T00:00:00Z","timestamp":1638489600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T00:00:00Z","timestamp":1638489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11704-021-0450-5","type":"journal-article","created":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T02:02:27Z","timestamp":1638496947000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images"],"prefix":"10.1007","volume":"16","author":[{"given":"Guoshuai","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xiuxia","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Aoying","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,3]]},"reference":[{"key":"450_CR1","doi-asserted-by":"publisher","first-page":"36863","DOI":"10.1109\/ACCESS.2020.2974804","volume":"8","author":"H Chen","year":"2020","unstructured":"Chen H, Yang X, Lyu Y. Copy-move forgery detection based on keypoint clustering and similar neighborhood search algorithm. IEEE Access, 2020, 8: 36863\u201336875","journal-title":"IEEE Access"},{"issue":"10","key":"450_CR2","doi-asserted-by":"publisher","first-page":"4729","DOI":"10.1109\/TIP.2016.2593583","volume":"25","author":"A Ferreira","year":"2016","unstructured":"Ferreira A, Felipussi S C, Alfaro C, Fonseca P, Vargas-Mu\u00f1oz J E, Santos J A, Rocha A. Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Transactions on Image Processing, 2016, 25(10): 4729\u20134742","journal-title":"IEEE Transactions on Image Processing"},{"issue":"11","key":"450_CR3","first-page":"2880","volume":"47","author":"J Zhao","year":"2019","unstructured":"Zhao J, Bi X. Image tampering and forensics algorithm based on local perception hash. Computer and Digital Engineering, 2019, 47(11): 2880\u20132883","journal-title":"Computer and Digital Engineering"},{"issue":"9","key":"450_CR4","first-page":"2707","volume":"39","author":"P Yan","year":"2019","unstructured":"Yan P, Su L, Shao H, Wu D. Image forgery detection based on local luminance order of multiple support regions. Computer Application, 2019, 39(9): 2707\u20132711","journal-title":"Computer Application"},{"issue":"4","key":"450_CR5","first-page":"1","volume":"15","author":"S Liu","year":"2019","unstructured":"Liu S, Huang Z. Efficient image hashing with geometric invariant vector distance for copy detection. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 2019, 15(4): 1\u201322","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)"},{"key":"450_CR6","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.ins.2017.08.044","volume":"418","author":"X Bi","year":"2017","unstructured":"Bi X, Pun C M. Fast reflective offset-guided searching method for copy-move forgery detection. Information Sciences, 2017, 418: 531\u2013545","journal-title":"Information Sciences"},{"issue":"5","key":"450_CR7","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Y Li","year":"2018","unstructured":"Li Y, Zhou J. Fast and effective image copymove forgery detection via hierarchical feature point matching. IEEE Transactions on Information Forensics and Security, 2018, 14(5): 1307\u20131322","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"450_CR8","doi-asserted-by":"publisher","first-page":"1308","DOI":"10.1016\/j.cviu.2011.05.001","volume":"115","author":"K S Kim","year":"2011","unstructured":"Kim K S, Lee M J, Lee J W, Oh T W, Lee H Y. Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging. Computer Vision and Image Understanding, 2011, 115(9): 1308\u20131323","journal-title":"Computer Vision and Image Understanding"},{"issue":"7","key":"450_CR9","doi-asserted-by":"publisher","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","volume":"28","author":"J H Bappy","year":"2019","unstructured":"Bappy J H, Simons C, Nataraj L, Manjunath B S, Roy-Chowdhury A K. Hybrid lstm and encoder-decoder architecture for detection of image forgeries. IEEE Transactions on Image Processing, 2019, 28(7): 3286\u20133300","journal-title":"IEEE Transactions on Image Processing"},{"key":"450_CR10","doi-asserted-by":"publisher","first-page":"11815","DOI":"10.1109\/ACCESS.2020.2964516","volume":"8","author":"E A A Vega","year":"2020","unstructured":"Vega E A A, Fern\u00e1ndez E G, Orozco A L S, Villalba L J G. Passive image forgery detection based on the demosaicing algorithm and JPEG compression. IEEE Access, 2020, 8: 11815\u201311823","journal-title":"IEEE Access"},{"issue":"2","key":"450_CR11","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1007\/s11277-020-07102-x","volume":"112","author":"H Kaur","year":"2020","unstructured":"Kaur H, Jindal N. Image and video forensics: a critical survey. Wireless Personal Communications, 2020, 112(2): 1281\u20131300","journal-title":"Wireless Personal Communications"},{"issue":"17\u201318","key":"450_CR12","doi-asserted-by":"publisher","first-page":"12427","DOI":"10.1007\/s11042-019-08304-7","volume":"79","author":"F Xue","year":"2020","unstructured":"Xue F, Lu W, Ren H, Xiao H, Zhang Q, Liu X. Forensics of visual privacy protection in digital images. Multimedia Tools and Applications, 2020, 79(17\u201318): 12427\u201312445","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"450_CR13","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.eng.2018.02.008","volume":"4","author":"X Lin","year":"2018","unstructured":"Lin X, Li J H, Wang S L, Cheng F, Huang X S. Recent advances in passive digital image security forensics: a brief review. Engineering, 2018, 4(1): 29\u201339","journal-title":"Engineering"},{"issue":"6","key":"450_CR14","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.1109\/TIP.2017.2682963","volume":"26","author":"C Chen","year":"2017","unstructured":"Chen C, Ni J, Shen Z, Shi Y Q. Blind forensics of successive geometric transformations in digital images using spectral method: theory and applications. IEEE Transactions on Image Processing, 2017, 26(6): 2811\u20132824","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"450_CR15","first-page":"2094","volume":"29","author":"Z Ren","year":"2019","unstructured":"Ren Z, Sun Q, Wu B, Zhang X, Yan W. Learning latent low-rank and sparse embedding for robust image feature extraction. IEEE Transactions on Image Processing, 2019, 29(1): 2094\u20132107","journal-title":"IEEE Transactions on Image Processing"},{"issue":"13","key":"450_CR16","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1049\/iet-ipr.2018.6358","volume":"13","author":"D Zhang","year":"2019","unstructured":"Zhang D, Yi L, Tang H, Zhang Y, Xu H. Multi-scale microstructure binary pattern extraction and learning for image representation. IET Image Processing, 2019, 13(13): 2507\u20132515","journal-title":"IET Image Processing"},{"key":"450_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.cviu.2017.08.012","volume":"162","author":"J Shi","year":"2017","unstructured":"Shi J, Wang X. A local feature with multiple line descriptors and its speeded-up matching algorithm. Computer Vision and Image Understanding, 2017, 162: 57\u201370","journal-title":"Computer Vision and Image Understanding"},{"issue":"9","key":"450_CR18","doi-asserted-by":"publisher","first-page":"4452","DOI":"10.1109\/TIP.2018.2839886","volume":"27","author":"W Hu","year":"2018","unstructured":"Hu W, Fan Y, Xing J, Sun L, Cai Z, Maybank S. Deep constrained siamese hash coding network and load-balanced locality-sensitive hashing for near duplicate image detection. IEEE Transactions on Image Processing, 2018, 27(9): 4452\u20134464","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"450_CR19","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s11063-007-9057-6","volume":"27","author":"X Gu","year":"2008","unstructured":"Gu X. Feature extraction using unit-linking pulse coupled neural network and its applications. Neural Processing Letters, 2008, 27(1): 25\u201341","journal-title":"Neural Processing Letters"},{"key":"450_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cviu.2016.04.009","volume":"150","author":"N V K Medathati","year":"2016","unstructured":"Medathati N V K, Neumann H, Masson G S, Kornprobst P. Bio-inspired computer vision: towards a synergistic approach of artificial and biological vision. Computer Vision and Image Understanding, 2016, 150: 1\u201330","journal-title":"Computer Vision and Image Understanding"},{"issue":"3","key":"450_CR21","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1162\/neco.1990.2.3.293","volume":"2","author":"R Eckhorn","year":"1990","unstructured":"Eckhorn R, Reitboeck H J, Arndt M T, Dicke P. Feature linking via synchronization among distributed assemblies: simulations of results from cat visual cortex. Neural Computation, 1990, 2(3): 293\u2013307","journal-title":"Neural Computation"},{"key":"450_CR22","volume-title":"Image Processing Using Pulse-Coupled Neural Networks","author":"T Lindblad","year":"2005","unstructured":"Lindblad T, Kinser J M, Taylor J G. Image Processing Using Pulse-Coupled Neural Networks. Heidelberg: Springer, 2005"},{"issue":"3","key":"450_CR23","doi-asserted-by":"publisher","first-page":"87","DOI":"10.4316\/AECE.2018.03012","volume":"18","author":"K K Thyagharajan","year":"2018","unstructured":"Thyagharajan K K, Kalaiarasi G. Pulse coupled neural network based near-duplicate detection of images (PCNN-NDD). Advances Electrical Computer Engineering, 2018, 18(3): 87\u201397","journal-title":"Advances Electrical Computer Engineering"},{"key":"450_CR24","doi-asserted-by":"publisher","first-page":"170032","DOI":"10.1109\/ACCESS.2019.2955308","volume":"7","author":"C Wang","year":"2019","unstructured":"Wang C, Zhang Z, Li Q, Zhou X. An image copy-move forgery detection method based on SURF and PCET. IEEE Access, 2019, 7: 170032\u2013170047","journal-title":"IEEE Access"},{"key":"450_CR25","doi-asserted-by":"publisher","first-page":"56637","DOI":"10.1109\/ACCESS.2018.2871952","volume":"6","author":"B Chen","year":"2018","unstructured":"Chen B, Yu M, Su Q, Shim H J, Shi Y Q. Fractional quaternion zernike moments for robust color image copy-move forgery detection. IEEE Access, 2018, 6: 56637\u201356646","journal-title":"IEEE Access"},{"issue":"10","key":"450_CR26","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1049\/iet-ipr.2019.1145","volume":"14","author":"X Tian","year":"2020","unstructured":"Tian X, Zhou G, Xu M. Image copy-move forgery detection algorithm based on ORB and novel similarity metric. IET Image Processing, 2020, 14(10): 2092\u20132100","journal-title":"IET Image Processing"},{"issue":"6","key":"450_CR27","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s11042-014-2431-2","volume":"75","author":"Y Zhu","year":"2016","unstructured":"Zhu Y, Shen X, Chen H. Copy-move forgery detection based on scaled ORB. Multimedia Tools and Applications, 2016, 75(6): 3221\u20133233","journal-title":"Multimedia Tools and Applications"},{"issue":"16","key":"450_CR28","doi-asserted-by":"publisher","first-page":"23535","DOI":"10.1007\/s11042-019-7629-x","volume":"78","author":"C S Prakash","year":"2019","unstructured":"Prakash C S, Panzade P P, Om H, Maheshkar S. Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multimedia Tools and Applications, 2019, 78(16): 23535\u201323558","journal-title":"Multimedia Tools and Applications"},{"key":"450_CR29","doi-asserted-by":"crossref","unstructured":"Paul K H, Akshatha K R, Karunakar A K, Seshadri S. SURF based copy move forgery detection using kNN mapping. In: Proceedings of Science and Information Conference. 2019, 234\u2013245","DOI":"10.1007\/978-3-030-17798-0_20"},{"issue":"13","key":"450_CR30","doi-asserted-by":"publisher","first-page":"18293","DOI":"10.1007\/s11042-019-7165-8","volume":"78","author":"C C Chen","year":"2019","unstructured":"Chen C C, Lu W Y, Chou C H. Rotational copy-move forgery detection using SIFT and region growing strategies. Multimedia Tools and Applications, 2019, 78(13): 18293\u201318308","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"450_CR31","doi-asserted-by":"publisher","first-page":"270","DOI":"10.18287\/2412-6179-2019-43-2-270-276","volume":"43","author":"C Rajalakshmi","year":"2019","unstructured":"Rajalakshmi C, Alex M G, Balasubramanian R. Copy move forgery detection using key point localized super pixel based on texture features. Computer Optics, 2019, 43(2): 270\u2013276","journal-title":"Computer Optics"},{"key":"450_CR32","doi-asserted-by":"crossref","unstructured":"Mahmood T, Nawaz T, Mehmood Z, Khan Z, Shah M, Ashraf R. Forensic analysis of copy-move forgery in digital images using the stationary wavelets. In: Proceedings of the 6th International Conference on Innovative Computing Technology. 2016, 578\u2013583","DOI":"10.1109\/INTECH.2016.7845040"},{"issue":"1","key":"450_CR33","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"M H Alkawaz","year":"2018","unstructured":"Alkawaz M H, Sulong G, Saba T, Rehman A. Detection of copy-move image forgery based on discrete cosine transform. Neural Computing and Applications, 2018, 30(1): 183\u2013192","journal-title":"Neural Computing and Applications"},{"issue":"23","key":"450_CR34","doi-asserted-by":"publisher","first-page":"33505","DOI":"10.1007\/s11042-019-08082-2","volume":"78","author":"K B Meena","year":"2019","unstructured":"Meena K B, Tyagi V. A copy-move image forgery detection technique based on Gaussian-Hermite moments. Multimedia Tools and Applications, 2019, 78(23): 33505\u201333526","journal-title":"Multimedia Tools and Applications"},{"issue":"8","key":"450_CR35","first-page":"4005","volume":"13","author":"S A Thajeel","year":"2019","unstructured":"Thajeel S A, Mahmood A S, Humood W R, Sulong G. Detection copy-move forgery in image via quaternion polar harmonic transforms. KSII Transactions on Internet and Information Systems (TIIS), 2019, 13(8): 4005\u20134025","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"issue":"6","key":"450_CR36","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1080\/13682199.2019.1663069","volume":"67","author":"R Rajkumar","year":"2019","unstructured":"Rajkumar R, Roy S, Singh K M. A robust and forensic transform for copy move digital image forgery detection based on dense depth block matching. The Imaging Science Journal, 2019, 67(6): 343\u2013357","journal-title":"The Imaging Science Journal"},{"issue":"14","key":"450_CR37","doi-asserted-by":"publisher","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","volume":"77","author":"Y Liu","year":"2018","unstructured":"Liu Y, Guan Q, Zhao X. Copy-move forgery detection based on convolutional kernel network. Multimedia Tools and Applications, 2018, 77(14): 18269\u201318293","journal-title":"Multimedia Tools and Applications"},{"key":"450_CR38","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P. Image copy-move forgery detection via an end-to-end deep neural network. In: Proceedings of 2018 IEEE Winter Conference on Applications of Computer Vision. 2018, 1907\u20131915","DOI":"10.1109\/WACV.2018.00211"},{"key":"450_CR39","doi-asserted-by":"crossref","unstructured":"Wu Y, Abd-Almageed W, Natarajan P. Busternet: detecting copy-move image forgery with source\/target localization. In: Proceedings of the European Conference on Computer Vision. 2018, 168\u2013184","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"450_CR40","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","volume":"15","author":"J L Zhong","year":"2019","unstructured":"Zhong J L, Pun C M. An end-to-end dense-inceptionnet for image copy-move forgery detection. IEEE Transactions on Information Forensics and Security, 2019, 15: 2134\u20132146","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"450_CR41","doi-asserted-by":"crossref","unstructured":"Aymaz S, Aymaz \u015e, Uluta\u015f. G. Detection of copy move forgery using legendre moments. In: Proceedings of the 24th Signal Processing and Communication Application Conference. 2016, 1125\u20131128","DOI":"10.1109\/SIU.2016.7495942"},{"issue":"10","key":"450_CR42","doi-asserted-by":"publisher","first-page":"5122","DOI":"10.1109\/TNNLS.2018.2791644","volume":"29","author":"N Mammone","year":"2018","unstructured":"Mammone N, Ieracitano C, Adeli H, Bramanti A, Morabito F C. Permutation Jaccard distance-based hierarchical clustering to estimate EEG network density modifications in MCI subjects. IEEE Transactions on Neural Networks and Learning Systems, 2018, 29(10): 5122\u20135135","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"450_CR43","doi-asserted-by":"crossref","unstructured":"Ma Y, Wang Z, Wu C. Feature extraction from noisy image using PCNN. In: Proceedings of 2006 IEEE International Conference on Information Acquisition. 2006, 808\u2013813","DOI":"10.1109\/ICIA.2006.305834"},{"key":"450_CR44","unstructured":"Tralic D, Zupancic I, Grgic S, Grgic M. CoMoFoD-New database for copy-move forgery detection. In: Proceedings of ELMAR-2013. 2013, 49\u201354"},{"key":"450_CR45","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T. CASIA image tampering detection evaluation database. In: Proceedings of 2013 IEEE China Summit and International Conference on Signal and Information Processing. 2013, 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"issue":"1","key":"450_CR46","first-page":"37","volume":"2","author":"D M Powers","year":"2011","unstructured":"Powers D M. Evaluation: from precision, recall and Fmeasure to ROC, informedness, markedness and correlation. Journal of Machine Learning Technologies, 2011, 2(1): 37\u201363","journal-title":"Journal of Machine Learning Technologies"},{"issue":"6","key":"450_CR47","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E. An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1841\u20131854","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-021-0450-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-021-0450-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-021-0450-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T21:04:24Z","timestamp":1695157464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-021-0450-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,3]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["450"],"URL":"https:\/\/doi.org\/10.1007\/s11704-021-0450-5","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,3]]},"assertion":[{"value":"8 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"164705"}}