{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:36:48Z","timestamp":1773797808942,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s13042-024-02370-6","type":"journal-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T18:02:22Z","timestamp":1726250542000},"page":"1927-1953","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting complex copy-move forgery using KeyPoint-Siamese Capsule Network against adversarial attacks"],"prefix":"10.1007","volume":"16","author":[{"given":"S. B.","family":"Aiswerya","sequence":"first","affiliation":[]},{"given":"S. Joseph","family":"Jawhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"issue":"6","key":"2370_CR1","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"2370_CR2","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.icte.2021.08.016","volume":"8","author":"ST Babu","year":"2022","unstructured":"Babu ST, Rao CS (2022) An optimized technique for copy\u2013move forgery localization using statistical features. ICT Express 8(2):244\u2013249","journal-title":"ICT Express"},{"issue":"89","key":"2370_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106929","volume":"1","author":"J Bakas","year":"2021","unstructured":"Bakas J, Naskar R, Bakshi S (2021) Detection and localization of inter-frame forgeries in videos based on macroblock variation and motion vector analysis. Comput Electr Eng 1(89):106929","journal-title":"Comput Electr Eng"},{"issue":"4","key":"2370_CR4","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1080\/00450618.2020.1715479","volume":"53","author":"M Bilal","year":"2021","unstructured":"Bilal M, Habib HA, Mehmood Z, Yousaf RM, Saba T, Rehman A (2021) A robust technique for copy-move forgery detection from small and extremely smooth tampered regions based on the DHE-SURF features and mDBSCAN clustering. Aust J Forensic Sci 53(4):459\u2013482","journal-title":"Aust J Forensic Sci"},{"key":"2370_CR5","doi-asserted-by":"publisher","first-page":"2725","DOI":"10.1007\/s00521-018-3677-9","volume":"32","author":"P Chhabra","year":"2020","unstructured":"Chhabra P, Garg NK, Kumar M (2020) Content-based image retrieval system using ORB and SIFT features. Neural Comput Appl 32:2725\u20132733","journal-title":"Neural Comput Appl"},{"issue":"19","key":"2370_CR6","doi-asserted-by":"publisher","first-page":"14429","DOI":"10.1007\/s00500-020-04795-x","volume":"24","author":"S Dhivya","year":"2020","unstructured":"Dhivya S, Sangeetha J, Sudhakar BJ (2020) Copy-move forgery detection using SURF feature extraction and SVM supervised learning technique. Soft Comput 24(19):14429\u201314440","journal-title":"Soft Comput"},{"key":"2370_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115282","volume":"182","author":"A Dixit","year":"2021","unstructured":"Dixit A, Bag S (2021) A fast technique to detect copy-move image forgery with reflection and non-affine transformation attacks. Expert Syst Appl 182:115282","journal-title":"Expert Syst Appl"},{"key":"2370_CR8","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. IEEE, pp 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"issue":"1","key":"2370_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102783","volume":"59","author":"Y Gan","year":"2022","unstructured":"Gan Y, Zhong J, Vong C (2022) A novel copy-move forgery detection algorithm via feature label matching and hierarchical segmentation filtering. Inf Process Manag 59(1):102783","journal-title":"Inf Process Manag"},{"issue":"2","key":"2370_CR10","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s12530-019-09309-1","volume":"12","author":"G Gani","year":"2021","unstructured":"Gani G, Qadir F (2021) A novel method for digital image copy-move forgery detection and localization using evolving cellular automata and local binary patterns. Evol Syst 12(2):503\u2013517","journal-title":"Evol Syst"},{"key":"2370_CR11","doi-asserted-by":"crossref","unstructured":"Gao J, Huang Y (2024) FP-Net: frequency-perception network with adversarial training for image manipulation localization. Multimedia Tools Appl 83:62721\u201362739","DOI":"10.1007\/s11042-023-17914-1"},{"issue":"3","key":"2370_CR12","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1049\/ipr2.12051","volume":"15","author":"N Goel","year":"2021","unstructured":"Goel N, Kaur S, Bala R (2021) Dual branch convolutional neural network for copy move forgery detection. IET Image Proc 15(3):656\u2013665","journal-title":"IET Image Proc"},{"key":"2370_CR13","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"2370_CR14","doi-asserted-by":"publisher","first-page":"48622","DOI":"10.1109\/ACCESS.2022.3172273","volume":"10","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Mortda AM, Fouda MM, Lashin NA (2022) An efficient CNN model to detect copy-move image forgery. IEEE Access 10:48622\u201348632","journal-title":"IEEE Access"},{"issue":"1","key":"2370_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11063-021-10620-9","volume":"54","author":"AK Jaiswal","year":"2022","unstructured":"Jaiswal AK, Srivastava R (2022) Detection of copy-move forgery in digital image using multi-scale, multi-stage deep learning model. Neural Process Lett 54(1):75\u2013100","journal-title":"Neural Process Lett"},{"key":"2370_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107614","volume":"129","author":"V Kadha","year":"2024","unstructured":"Kadha V, Das SK (2024) An exhaustive measurement of re-sampling detection in lossy compressed images using deep learning approach. Eng Appl Artif Intell 129:107614","journal-title":"Eng Appl Artif Intell"},{"key":"2370_CR17","volume":"48","author":"A Kashyap","year":"2024","unstructured":"Kashyap A (2024) A novel method for real-time object-based copy-move tampering localization in videos using fine-tuned YOLO V8. Forensic Sci Int Digit Investig 48:301663","journal-title":"Forensic Sci Int Digit Investig"},{"issue":"2","key":"2370_CR18","first-page":"1","volume":"9","author":"T Le-Tien","year":"2019","unstructured":"Le-Tien T, Phan-Xuan H, Nguyen-Chinh T, Do-Tieu T (2019) Image forgery detection: a low computational-cost and effective data-driven model. Int J Mach Learn Comput 9(2):1","journal-title":"Int J Mach Learn Comput"},{"key":"2370_CR19","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TIP.2021.3132828","volume":"31","author":"Y Liu","year":"2021","unstructured":"Liu Y, Xia C, Zhu X, Xu S (2021) Two-stage copy-move forgery detection with self deep matching and proposal superglue. IEEE Trans Image Process 31:541\u2013555","journal-title":"IEEE Trans Image Process"},{"key":"2370_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103057","volume":"76","author":"Q Lyu","year":"2021","unstructured":"Lyu Q, Luo J, Liu K, Yin X, Liu J, Lu W (2021) Copy Move Forgery Detection based on double matching. J Vis Commun Image Represent 76:103057","journal-title":"J Vis Commun Image Represent"},{"key":"2370_CR21","doi-asserted-by":"crossref","unstructured":"Novozamsky A, Mahdian B, Saic S. IMD2020: a large-scale annotated dataset tailored for detecting manipulated images. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision workshops 2020, pp 71\u201380","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"2370_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102092","volume":"100","author":"E Nowroozi","year":"2021","unstructured":"Nowroozi E, Dehghantanha A, Parizi RM, Choo KK (2021) A survey of machine learning techniques in adversarial image forensics. Comput Secur 100:102092","journal-title":"Comput Secur"},{"issue":"2","key":"2370_CR23","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s42044-019-00029-y","volume":"1","author":"A Parveen","year":"2019","unstructured":"Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy\u2013move image forgery detection using DCT. Iran J Comput Sci 1(2):89\u201399","journal-title":"Iran J Comput Sci"},{"issue":"4","key":"2370_CR24","doi-asserted-by":"publisher","first-page":"492","DOI":"10.3390\/sym12040492","volume":"12","author":"JY Park","year":"2020","unstructured":"Park JY, Kang TA, Moon YH, Eom IK (2020) Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry 12(4):492","journal-title":"Symmetry"},{"issue":"3","key":"2370_CR25","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3390\/jimaging7030059","volume":"7","author":"Y Rodriguez-Ortega","year":"2021","unstructured":"Rodriguez-Ortega Y, Ballesteros DM, Renza D (2021) Copy-move forgery detection (CMFD) using deep learning for image and video forensics. J Imaging 7(3):59","journal-title":"J Imaging"},{"issue":"2","key":"2370_CR26","first-page":"165","volume":"34","author":"PM Raju","year":"2022","unstructured":"Raju PM, Nair MS (2022) Copy-move forgery detection using binary discriminant features. J King Saud Univ Comput Inf Sci 34(2):165\u2013178","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"2370_CR27","unstructured":"Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD\u2014new database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, pp 49\u201354"},{"key":"2370_CR28","doi-asserted-by":"crossref","unstructured":"Wang C, Huang Z, Qi S, Yu Y, Shen G, Zhang Y (2023) Shrinking the semantic gap: spatial pooling of local moment invariants for copy-move forgery detection. IEEE Trans Inf Forensics Secur 18:1064\u20131079","DOI":"10.1109\/TIFS.2023.3234861"},{"key":"2370_CR29","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1007\/s10044-021-00968-y","volume":"24","author":"XY Wang","year":"2021","unstructured":"Wang XY, Wang C, Wang L, Yang HY, Niu PP (2021) Robust and effective multiple copy-move forgeries detection and localization. Pattern Anal Appl 24:1025\u20131046","journal-title":"Pattern Anal Appl"},{"key":"2370_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107200","volume":"127","author":"X Xia","year":"2024","unstructured":"Xia X, Su LC, Wang SP, Li XY (2024) DMFF-Net: double-stream multilevel feature fusion network for image forgery localization. Eng Appl Artif Intell 127:107200","journal-title":"Eng Appl Artif Intell"},{"key":"2370_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103032","volume":"113","author":"J Yang","year":"2021","unstructured":"Yang J, Liang Z, Gan Y, Zhong J (2021) A novel copy-move forgery detection algorithm via two-stage filtering. Digit Signal Process 113:103032","journal-title":"Digit Signal Process"},{"key":"2370_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121918","volume":"238","author":"K Zhao","year":"2024","unstructured":"Zhao K, Yuan X, Liu T, Xiang Y, Xie Z, Huang G, Feng L (2024) CAMU-Net: copy-move forgery detection utilizing coordinate attention and multi-scale feature fusion-based up-sampling. Expert Syst Appl 238:121918","journal-title":"Expert Syst Appl"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02370-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02370-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02370-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T18:26:50Z","timestamp":1739989610000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02370-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["2370"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02370-6","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,13]]},"assertion":[{"value":"8 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declares that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants\u00a0and\/or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"There is no informed consent for this study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}