{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T02:26:39Z","timestamp":1769999199420,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s13198-025-02971-6","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T08:15:12Z","timestamp":1757924112000},"page":"286-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modelling of features of fusion using a hybrid swarm optimization algorithm with deep learning methodology for copy-move image forgery detection"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8458-5241","authenticated-orcid":false,"given":"Alesh Kumar","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Ritu","family":"Tiwari","sequence":"additional","affiliation":[]},{"given":"Rahul","family":"Dixit","sequence":"additional","affiliation":[]},{"given":"Mahendra Pratap","family":"Yadav","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,15]]},"reference":[{"issue":"3","key":"2971_CR1","doi-asserted-by":"publisher","first-page":"403","DOI":"10.3390\/electronics11030403","volume":"11","author":"SS Ali","year":"2022","unstructured":"Ali SS, Ganapathi II, Vu NS, Ali SD, Saxena N, Werghi N (2022) Image forgery detection using deep learning by recompressing images. Electronics 11(3):403. https:\/\/doi.org\/10.3390\/electronics11030403","journal-title":"Electronics"},{"key":"2971_CR2","doi-asserted-by":"publisher","unstructured":"Al_Azrak, F. M., Sedik, A., Dessowky, M. I., El Banby, G. M., Khalaf, A. A., Elkorany, A. S., & Abd. El-Samie, F. E. (2020). An efficient method for image forgery detection based on trigonometric transforms and deep learning. Multimedia Tools and Applications 79, 18221-18243. https:\/\/doi.org\/10.1007\/s11042-019-08162-3","DOI":"10.1007\/s11042-019-08162-3"},{"issue":"3","key":"2971_CR3","doi-asserted-by":"publisher","first-page":"563","DOI":"10.5755\/j01.itc.51.3.31510","volume":"51","author":"PM Arunkumar","year":"2022","unstructured":"Arunkumar PM, Sangeetha Y, Raja PV, Sangeetha SN (2022) Deep learning for forgery face detection using fuzzy fisher capsule dual graph. Inf Technol Control 51(3):563\u2013574. https:\/\/doi.org\/10.5755\/j01.itc.51.3.31510","journal-title":"Inf Technol Control"},{"issue":"6","key":"2971_CR4","first-page":"69","volume":"18","author":"BS Balbhim","year":"2021","unstructured":"Balbhim BS, Mathur H (2021) Robust image forgery detection methodology based on glow-worm optimization and support vector machine. Webology 18(6):69","journal-title":"Webology"},{"key":"2971_CR5","doi-asserted-by":"crossref","unstructured":"Bunk J, Bappy JH, Mohammed TM, Nataraj L, Flenner A, Manjunath BS, Peterson L (2017) Detection and localization of image forgeries using resampling features and deep learning. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW) (pp. 1881\u20131889). IEEE.","DOI":"10.1109\/CVPRW.2017.235"},{"issue":"3","key":"2971_CR6","doi-asserted-by":"publisher","first-page":"88","DOI":"10.20517\/jsss.2022.02","volume":"3","author":"NH Celebi","year":"2022","unstructured":"Celebi NH, Hsu TL, Liu Q (2022) A comparison study to detect seam carving forgery in JPEG images with deep learning models. J Surveill Secur Saf 3(3):88\u2013100","journal-title":"J Surveill Secur Saf"},{"issue":"2","key":"2971_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/s11063-024-11448-9","volume":"56","author":"S Chakraborty","year":"2024","unstructured":"Chakraborty S, Chatterjee K, Dey P (2024) Detection of image tampering using deep learning, error levels and noise residuals. Neural Process Lett 56(2):112. https:\/\/doi.org\/10.1007\/s11063-024-11448-9","journal-title":"Neural Process Lett"},{"issue":"16","key":"2971_CR8","doi-asserted-by":"publisher","first-page":"4491","DOI":"10.3390\/s20164491","volume":"20","author":"D Chaves","year":"2020","unstructured":"Chaves D, Fidalgo E, Alegre E, Alaiz-Rodr\u00edguez R, J\u00e1\u00f1ez-Martino F, Azzopardi G (2020) Assessment and estimation of face detection performance based on deep learning for forensic applications. Sensors (Basel) 20(16):4491","journal-title":"Sensors (Basel)"},{"issue":"15","key":"2971_CR9","doi-asserted-by":"publisher","first-page":"8417","DOI":"10.1007\/s00521-024-09536-x","volume":"36","author":"L Cunha","year":"2024","unstructured":"Cunha L, Zhang L, Sowan B, Lim CP, Kong Y (2024) Video deep fake detection using particle swarm optimization improved deep neural networks. Neural Comput Appl 36(15):8417\u20138453. https:\/\/doi.org\/10.1007\/s00521-024-09536-x","journal-title":"Neural Comput Appl"},{"key":"2971_CR10","doi-asserted-by":"publisher","unstructured":"Guillaro F, Cozzolino D, Sud A, Dufour N, Verdoliva L (2023) Trufor: Leveraging all-round clues for trustworthy image forgery detection and localization. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 20606\u201320615). https:\/\/doi.org\/10.1109\/CVPR52729.2023.01974","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"2971_CR11","doi-asserted-by":"publisher","unstructured":"Gupta A, Joshi R, Laban R (2022) Detection of tool based edited images from error level analysis and convolutional neural network. arXiv preprint arXiv:2204.09075. https:\/\/doi.org\/10.48550\/arxiv.2204.09075","DOI":"10.48550\/arxiv.2204.09075"},{"key":"2971_CR12","doi-asserted-by":"publisher","first-page":"100847","DOI":"10.1016\/j.swevo.2021.100847","volume":"62","author":"F Han","year":"2021","unstructured":"Han F, Chen WT, Ling QH, Han H (2021) Multi-objective particle swarm optimization with adaptive strategies for feature selection. Swarm Evol Comput 62:100847","journal-title":"Swarm Evol Comput"},{"issue":"3","key":"2971_CR13","doi-asserted-by":"publisher","first-page":"1272","DOI":"10.3390\/app13031272","volume":"13","author":"KM Hosny","year":"2023","unstructured":"Hosny KM, Mortda AM, Lashin NA, Fouda MM (2023) A new method to detect splicing image forgery using convolutional neural network. Appl Sci 13(3):1272. https:\/\/doi.org\/10.3390\/app13031272","journal-title":"Appl Sci"},{"key":"2971_CR14","doi-asserted-by":"publisher","unstructured":"Joshi R, Gupta A, Kanvinde N, Ghonge P (2022) Forged image detection using SOTA image classification deep learning methods for image forensics with error level analysis. In: 2022, 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1\u20136). IEEE. https:\/\/doi.org\/10.48550\/arXiv.2211. 15196.","DOI":"10.48550\/arXiv.2211"},{"key":"2971_CR15","first-page":"200524","volume":"8","author":"R Jyothsna","year":"2025","unstructured":"Jyothsna R, Singh N (2025) GAN-ViT-CMFD: a novel framework integrating generative adversarial networks and vision transformers for enhanced copy-move forgery detection and classification with spectral clustering. Intell Syst Appl 8:200524","journal-title":"Intell Syst Appl"},{"key":"2971_CR16","doi-asserted-by":"publisher","first-page":"78","DOI":"10.3390\/jimaging9040078","volume":"9","author":"A Kanadath","year":"2023","unstructured":"Kanadath A, Jothi AA, Urolagin JS (2023) Multilevel multiobjective particle swarm optimization guided superpixel algorithm for histopathology image detection and segmentation. J Imag 9:78","journal-title":"J Imag"},{"key":"2971_CR17","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-2469782\/v1","author":"L Koshy","year":"2024","unstructured":"Koshy L, Shyry SP (2024) Detection of tampered real time videos using deep neural networks. Neural Comput Appl. https:\/\/doi.org\/10.21203\/rs.3.rs-2469782\/v1","journal-title":"Neural Comput Appl"},{"key":"2971_CR18","doi-asserted-by":"publisher","first-page":"1090307","DOI":"10.1155\/2022\/1090307","volume":"2022","author":"F Li","year":"2022","unstructured":"Li F, Pei Z, Wei W, Li J, Qin C (2022) Image forgery detection using tamper-guided dual self-attention network with multiresolution hybrid feature. Secur Commun Networks 2022:1090307. https:\/\/doi.org\/10.1155\/2022\/1090307","journal-title":"Secur Commun Networks"},{"key":"2971_CR19","doi-asserted-by":"publisher","first-page":"4272","DOI":"10.1109\/tifs.2023.3293951","volume":"18","author":"D Liu","year":"2023","unstructured":"Liu D, Dang Z, Peng C, Zheng Y, Li S, Wang N, Gao X (2023) Fed forgery: generalized face forgery detection with residual federated learning. IEEE Trans Inf Forensics Secur 18:4272\u20134284. https:\/\/doi.org\/10.1109\/tifs.2023.3293951","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2971_CR20","doi-asserted-by":"publisher","first-page":"87297","DOI":"10.1109\/ACCESS.2023.3304237","volume":"11","author":"M Maashi","year":"2023","unstructured":"Maashi M, Alamro H, Mohsen H, Negm N, Mohammed GP, Ahmed NA, Ibrahim SS, Alsaid MI (2023) Modeling of reptile search algorithm with deep learning approach for copy-move image forgery detection. IEEE Access 11:87297\u201387304. https:\/\/doi.org\/10.1109\/ACCESS.2023.3304237","journal-title":"IEEE Access"},{"issue":"4","key":"2971_CR21","doi-asserted-by":"publisher","first-page":"3241","DOI":"10.1007\/s11277-021-08396-1","volume":"119","author":"D Monika Bansal","year":"2021","unstructured":"Monika Bansal D, Passi A (2021) Image forensic investigation using discrete cosine transform-based approach. Wirel Pers Commun 119(4):3241\u20133253","journal-title":"Wirel Pers Commun"},{"key":"2971_CR22","first-page":"100471","volume":"12","author":"S Mugemanyi","year":"2023","unstructured":"Mugemanyi S, Qu Z, Rugema FX, Dong Y, Wang L, Bananeza C, Nshimiyimana A, Mutabazi E (2023) Marine predators\u2019 algorithm: a comprehensive review. Mach Learn Appl 12:100471","journal-title":"Mach Learn Appl"},{"key":"2971_CR23","doi-asserted-by":"crossref","unstructured":"Passi A (2021) Digital image forensics based on machine learning approach for forgery detection and localization. In: Journal of Physics: Conference Series (Vol. 1950, No. 1, p. 012035). IOP Publishing.","DOI":"10.1088\/1742-6596\/1950\/1\/012035"},{"issue":"6","key":"2971_CR24","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.3390\/electronics12061451","volume":"12","author":"J Peng","year":"2023","unstructured":"Peng J, Li Y, Liu C, Gao X (2023) The circular U-net with attention gate for image splicing forgery detection. Electronics 12(6):1451","journal-title":"Electronics"},{"issue":"1","key":"2971_CR25","doi-asserted-by":"publisher","first-page":"7422","DOI":"10.1038\/s41598-023-34629-3","volume":"13","author":"R Rafique","year":"2023","unstructured":"Rafique R, Gantassi R, Amin R, Frnda J, Mustapha A, Alshehri AH (2023) Deep fake detection and classification using error-level analysis and deep learning. Sci Rep 13(1):7422. https:\/\/doi.org\/10.1038\/s41598-023-34629-3","journal-title":"Sci Rep"},{"issue":"17","key":"2971_CR26","doi-asserted-by":"publisher","first-page":"26333","DOI":"10.1007\/s11042-021-10925-w","volume":"80","author":"M Sabeena","year":"2021","unstructured":"Sabeena M, Abraham L (2021) Digital image forensic using deep flower pollination with adaptive Harris hawk optimization. Multimed Tools Appl 80(17):26333\u201326355","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"2971_CR27","doi-asserted-by":"publisher","first-page":"15364","DOI":"10.1038\/s41598-020-71294-2","volume":"10","author":"AT Sahlol","year":"2020","unstructured":"Sahlol AT, Yousri D, Ewees AA, Al-Qaness MA, Damasevicius R, Elaziz MA (2020) COVID-19 image classification using deep features and fractional-order marine predators algorithm. Sci Rep 10(1):15364","journal-title":"Sci Rep"},{"issue":"12","key":"2971_CR28","doi-asserted-by":"publisher","first-page":"18117","DOI":"10.1007\/s11042-022-13808-w","volume":"82","author":"P Sharma","year":"2023","unstructured":"Sharma P, Kumar M, Sharma H (2023) Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation. Multimed Tools Appl 82(12):18117\u201318150. https:\/\/doi.org\/10.1007\/s11042-022-13808-w","journal-title":"Multimed Tools Appl"},{"key":"2971_CR29","doi-asserted-by":"publisher","first-page":"73","DOI":"10.17762\/ijritcc.v11i3s.6157","volume":"11","author":"Y Shelar","year":"2023","unstructured":"Shelar Y, Sharma P, Rawat CSD (2023) An improved VGG16 and CNN-LSTM deep learning model for image forgery detection. Int J Recent Innov Trends Comput Commun 11:73\u201380. https:\/\/doi.org\/10.17762\/ijritcc.v11i3s.6157","journal-title":"Int J Recent Innov Trends Comput Commun"},{"issue":"5","key":"2971_CR30","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1007\/s00530-023-01140-8","volume":"29","author":"M Soleimani","year":"2023","unstructured":"Soleimani M, Nazari A, Moghaddam ME (2023) Deep fake detection of occluded images using a patch-based approach. Multimed Syst 29(5):2669\u20132687. https:\/\/doi.org\/10.1007\/s00530-023-01140-8","journal-title":"Multimed Syst"},{"issue":"12","key":"2971_CR31","doi-asserted-by":"publisher","first-page":"17521","DOI":"10.1007\/s11042-022-13797-w","volume":"82","author":"M Zanardelli","year":"2023","unstructured":"Zanardelli M, Guerrini F, Leonardi R, Adami N (2023) Image forgery detection: a survey of recent deep-learning approaches. Multimed Tools Appl 82(12):17521\u201317566","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"2971_CR32","doi-asserted-by":"publisher","first-page":"4703","DOI":"10.1109\/TCSVT.2023.3247607","volume":"33","author":"Y Zeng","year":"2023","unstructured":"Zeng Y, Zhao B, Qiu S, Dai T, Xia ST (2023) Toward effective image manipulation detection with proposal contrastive learning. IEEE Trans Circuits Syst Video Technol 33(9):4703\u20134714","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"2971_CR33","doi-asserted-by":"publisher","first-page":"249","DOI":"10.3390\/e22020249","volume":"22","author":"W Zhang","year":"2020","unstructured":"Zhang W, Zhao C, Li Y (2020) A novel counterfeit feature extraction technique for exposing face-swap images based on deep learning and error level analysis. Entropy 22(2):249","journal-title":"Entropy"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02971-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-02971-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02971-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T14:45:10Z","timestamp":1769957110000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-02971-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,15]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["2971"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-02971-6","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,15]]},"assertion":[{"value":"30 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}