{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:25:12Z","timestamp":1757622312873,"version":"3.44.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04242-4","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T13:19:39Z","timestamp":1754659179000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Metaheuristic-Assisted Convolutional Neural Network for Copy-Move Forgery Detection"],"prefix":"10.1007","volume":"6","author":[{"given":"R.","family":"Anushree","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. B. Vinay","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,8,8]]},"reference":[{"key":"4242_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100746","volume":"27","author":"MF Abdulqader","year":"2023","unstructured":"Abdulqader MF, Dawod AY, Ablahd AZ. Detection of tamper forgery image in security digital mage. Meas Sensors. 2023;27: 100746.","journal-title":"Meas Sensors"},{"key":"4242_CR2","doi-asserted-by":"publisher","first-page":"48622","DOI":"10.1109\/ACCESS.2022.3172273","volume":"10","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Mortda AM, Fouda MM, Lashin NA. An efficient CNN model to detect copy-move image forgery. IEEE Access. 2022;10:48622\u201332.","journal-title":"IEEE Access"},{"issue":"2","key":"4242_CR3","first-page":"730","volume":"11","author":"TM Thiiban Muniappan","year":"2023","unstructured":"Thiiban Muniappan TM, Abd Warif NB, Ismail A, Mat Abir NA. An evaluation of convolutional neural network (cnn) model for copy-move and splicing forgery detection. Int J Intell Syst Appl Eng. 2023;11(2):730\u201340.","journal-title":"Int J Intell Syst Appl Eng"},{"key":"4242_CR4","doi-asserted-by":"publisher","first-page":"86132","DOI":"10.1109\/ACCESS.2023.3304728","volume":"11","author":"A Diwan","year":"2023","unstructured":"Diwan A, Kumar D, Mahadeva R, Perera HCS, Alawatugoda J. Unveiling copy-move forgeries: enhancing detection with superpoint keypoint architecture. IEEE Access. 2023;11:86132\u201348.","journal-title":"IEEE Access"},{"issue":"2","key":"4242_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.jksuci.2018.11.004","volume":"34","author":"PM Raju","year":"2022","unstructured":"Raju PM, Nair MS. Copy-move forgery detection using binary discriminant features. J King Saud Univ Comput Inf Sci. 2022;34(2):165\u201378.","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"4242_CR6","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.icte.2021.08.016","volume":"8","author":"ST Babu","year":"2022","unstructured":"Babu ST, Rao CS. An optimized technique for copy\u2013move forgery localization using statistical features. ICT Express. 2022;8(2):244\u20139.","journal-title":"ICT Express"},{"key":"4242_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108286","volume":"122","author":"JL Zhong","year":"2022","unstructured":"Zhong JL, Gan YF, Vong CM, Yang JX, Zhao JH, Luo JH. Effective and efficient pixel-level detection for diverse video copy-move forgery types. Pattern Recogn. 2022;122: 108286.","journal-title":"Pattern Recogn"},{"key":"4242_CR8","doi-asserted-by":"publisher","first-page":"106217","DOI":"10.1109\/ACCESS.2022.3212069","volume":"10","author":"SI Lee","year":"2022","unstructured":"Lee SI, Park JY, Eom IK. Cnn-based copy-move forgery detection using rotation-invariant wavelet feature. IEEE Access. 2022;10:106217\u201329.","journal-title":"IEEE Access"},{"key":"4242_CR9","first-page":"23","volume":"44","author":"D Vaishnavi","year":"2019","unstructured":"Vaishnavi D, Subashini TS. Application of local invariant symmetry features to detect and localize image copy move forgeries. J Inf Secur Appl. 2019;44:23\u201331.","journal-title":"J Inf Secur Appl"},{"key":"4242_CR10","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","volume":"15","author":"JL Zhong","year":"2019","unstructured":"Zhong JL, Pun CM. An end-to-end dense-inceptionnet for image copy-move forgery detection. IEEE Trans Inf Forensics Secur. 2019;15:2134\u201346.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4242_CR11","doi-asserted-by":"publisher","first-page":"2783","DOI":"10.1109\/ACCESS.2021.3136781","volume":"10","author":"KH Rhee","year":"2021","unstructured":"Rhee KH. Generation of novelty ground truth image using image classification and semantic segmentation for copy-move forgery detection. IEEE Access. 2021;10:2783\u201396.","journal-title":"IEEE Access"},{"key":"4242_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103068","volume":"77","author":"PP Niu","year":"2021","unstructured":"Niu PP, Wang C, Chen W, Yang H, Wang X. Fast and effective keypoint-based image copy-move forgery detection using complex-valued moment invariants. J Vis Commun Image Represent. 2021;77: 103068.","journal-title":"J Vis Commun Image Represent"},{"key":"4242_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107536","volume":"109","author":"L Darmet","year":"2021","unstructured":"Darmet L, Wang K, Cayre F. Disentangling copy-moved source and target areas. Appl Soft Comput. 2021;109: 107536.","journal-title":"Appl Soft Comput"},{"key":"4242_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103057","volume":"76","author":"Q Lyu","year":"2021","unstructured":"Lyu Q, Luo J, Liu K, Yin X, Liu J, Lu W. Copy move forgery detection based on double matching. J Vis Commun Image Represent. 2021;76: 103057.","journal-title":"J Vis Commun Image Represent"},{"key":"4242_CR15","doi-asserted-by":"publisher","first-page":"36863","DOI":"10.1109\/ACCESS.2020.2974804","volume":"8","author":"H Chen","year":"2020","unstructured":"Chen H, Yang X, Lyu Y. Copy-move forgery detection based on keypoint clustering and similar neighborhood search algorithm. IEEE Access. 2020;8:36863\u201375.","journal-title":"IEEE Access"},{"key":"4242_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102966","volume":"74","author":"S Tinnathi","year":"2021","unstructured":"Tinnathi S, Sudhavani G. An efficient copy move forgery detection using adaptive watershed segmentation with AGSO and hybrid feature extraction. J Vis Commun Image Represent. 2021;74: 102966.","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"4242_CR17","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.plrev.2005.10.001","volume":"2","author":"C Blum","year":"2005","unstructured":"Blum C. Ant colony optimization: introduction and recent trends. Phys Life Rev. 2005;2(4):353\u201373.","journal-title":"Phys Life Rev"},{"key":"4242_CR18","doi-asserted-by":"crossref","unstructured":"Pan W, Wang L. An ant colony optimization algorithm based on the experience model. In\u00a02009 Fifth International Conference on Natural Computation (Vol. 3, pp. 13\u201318). IEEE, 2009.","DOI":"10.1109\/ICNC.2009.690"},{"key":"4242_CR19","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.ins.2020.05.134","volume":"537","author":"JL Zhong","year":"2020","unstructured":"Zhong JL, Pun CM, Gan YF. Dense moment feature index and best match algorithms for video copy-move forgery detection. Inf Sci. 2020;537:184\u2013202.","journal-title":"Inf Sci"},{"issue":"9","key":"4242_CR20","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1016\/j.jksuci.2019.07.007","volume":"33","author":"A Hegazi","year":"2021","unstructured":"Hegazi A, Taha A, Selim MM. An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal. J King Saud Univ Comput Inf Sci. 2021;33(9):1055\u201363.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"4242_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103032","volume":"113","author":"J Yang","year":"2021","unstructured":"Yang J, Liang Z, Gan Y, Zhong J. A novel copy-move forgery detection algorithm via two-stage filtering. Digit Signal Process. 2021;113: 103032.","journal-title":"Digit Signal Process"},{"key":"4242_CR22","volume":"54","author":"Y Wang","year":"2020","unstructured":"Wang Y, Kang X, Chen Y. Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. J Inf Secur Appl. 2020;54: 102536.","journal-title":"J Inf Secur Appl"},{"key":"4242_CR23","volume":"52","author":"KB Meena","year":"2020","unstructured":"Meena KB, Tyagi V. A copy-move image forgery detection technique based on tetrolet transform. J Inf Secur Appl. 2020;52: 102481.","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"4242_CR24","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.jksuci.2022.12.014","volume":"35","author":"MMA Alhaidery","year":"2023","unstructured":"Alhaidery MMA, Taherinia AH, Shahadi HI. A robust detection and localization technique for copy-move forgery in digital images. J King Saud Univ Comput Inf Sci. 2023;35(1):449\u201361.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"4242_CR25","volume":"54","author":"G Gani","year":"2020","unstructured":"Gani G, Qadir F. A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata. J Inf Secur Appl. 2020;54: 102510.","journal-title":"J Inf Secur Appl"},{"key":"4242_CR26","doi-asserted-by":"publisher","first-page":"87297","DOI":"10.1109\/ACCESS.2023.3304237","volume":"11","author":"M Maashi","year":"2023","unstructured":"Maashi M, Alamro H, Mohsen H, Negm N, Mohammed GP, Ahmed NA, Alsaid MI. Modeling of reptile search algorithm with deep learning approach for copy move image forgery detection. IEEE Access. 2023;11:87297\u2013304.","journal-title":"IEEE Access"},{"issue":"3","key":"4242_CR27","doi-asserted-by":"publisher","first-page":"347","DOI":"10.26599\/BDMA.2022.9020029","volume":"6","author":"ST Babu","year":"2023","unstructured":"Babu ST, Rao CS. Copy-move forgery verification in images using local feature extractors and optimized classifiers. Big Data Min Anal. 2023;6(3):347\u201360.","journal-title":"Big Data Min Anal"},{"key":"4242_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109778","volume":"144","author":"FZ Mehrjardi","year":"2023","unstructured":"Mehrjardi FZ, Latif AM, Zarchi MS, Sheikhpour R. A survey on deep learning-based image forgery detection. Pattern Recogn. 2023;144: 109778.","journal-title":"Pattern Recogn"},{"issue":"1","key":"4242_CR29","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/s11227-023-05504-9","volume":"80","author":"B Ustubioglu","year":"2024","unstructured":"Ustubioglu B, Tahaoglu G, Ulutas G, Ustubioglu A, Kilic M. Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach. J Supercomput. 2024;80(1):486\u2013518.","journal-title":"J Supercomput"},{"key":"4242_CR30","doi-asserted-by":"crossref","unstructured":"Krishnalal G, Jagathy Raj VP, Madhu G, Arun KS. DNN-STACK: a stacking technique based on deep neural network for detecting copy-move forgery. Neural Comput Appl, 1\u201316, 2024.","DOI":"10.1007\/s00521-024-10804-z"},{"key":"4242_CR31","doi-asserted-by":"publisher","first-page":"170032","DOI":"10.1109\/ACCESS.2019.2955308","volume":"7","author":"C Wang","year":"2019","unstructured":"Wang C, Zhang Z, Li Q, Zhou X. An image copy-move forgery detection method based on SURF and PCET. IEEE Access. 2019;7:170032\u201347.","journal-title":"IEEE Access"},{"issue":"3","key":"4242_CR32","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8030324","volume":"8","author":"RI Bendjillali","year":"2019","unstructured":"Bendjillali RI, Beladgham M, Merit K, Taleb-Ahmed A. Improved facial expression recognition based on DWT feature for deep CNN. Electronics. 2019;8(3): 324.","journal-title":"Electronics"},{"issue":"7","key":"4242_CR33","doi-asserted-by":"publisher","first-page":"2877","DOI":"10.1109\/TIP.2014.2321495","volume":"23","author":"KC Fan","year":"2014","unstructured":"Fan KC, Hung TY. A novel local pattern descriptor\u2014local vector pattern in high-order derivative space for face recognition. IEEE Trans Image Process. 2014;23(7):2877\u201391.","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"4242_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuri.2022.100078","volume":"2","author":"S Raziani","year":"2022","unstructured":"Raziani S, Azimbagirad M. Deep CNN hyperparameter optimization algorithms for sensor-based human activity recognition. Neurosci Inform. 2022;2(3): 100078.","journal-title":"Neurosci Inform"},{"key":"4242_CR35","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.knosys.2015.07.006","volume":"89","author":"S Mirjalili","year":"2015","unstructured":"Mirjalili S. Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl-Based Syst. 2015;89:228\u201349.","journal-title":"Knowl-Based Syst"},{"key":"4242_CR36","doi-asserted-by":"crossref","unstructured":"Ruiye J, Tao C, Songyan W, Ming Y, A modified whale optimization algorithm based on chaos initialization and regulation operation. In\u00a02019 Chinese control conference (CCC) (pp. 2702\u20132707). IEEE, 2019.","DOI":"10.23919\/ChiCC.2019.8866240"},{"issue":"1","key":"4242_CR37","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/924652","volume":"2014","author":"H Lu","year":"2014","unstructured":"Lu H, Wang X, Fei Z, Qiu M. The effects of using chaotic map on improving the performance of multiobjective evolutionary algorithms. Math Probl Eng. 2014;2014(1): 924652.","journal-title":"Math Probl Eng"},{"issue":"2","key":"4242_CR38","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1007\/978-981-13-1595-4_73","volume":"2017","author":"P Sharma","year":"2019","unstructured":"Sharma P, Sharma H, Kumar S, Bansal JC. A review on scale factor strategies in differential evolution algorithm. Soft Comput Probl Solving SocProS. 2019;2017(2):925\u201343.","journal-title":"Soft Comput Probl Solving SocProS"},{"key":"4242_CR39","unstructured":"http:\/\/lci.micc.unifi.it\/labd\/2015\/01\/copy-move-forgery-detection-and-localization\/"},{"key":"4242_CR40","unstructured":"https:\/\/www.vcl.fer.hr\/comofod\/download.html"},{"issue":"3","key":"4242_CR41","doi-asserted-by":"publisher","DOI":"10.3390\/s22030855","volume":"22","author":"P Trojovsk\u00fd","year":"2022","unstructured":"Trojovsk\u00fd P, Dehghani M. Pelican optimization algorithm: a novel nature-inspired algorithm for engineering applications. Sensors (Basel). 2022;22(3): 855.","journal-title":"Sensors (Basel)"},{"issue":"8","key":"4242_CR42","doi-asserted-by":"publisher","first-page":"10131","DOI":"10.1007\/s11063-023-11321-1","volume":"55","author":"E Ba\u015f","year":"2023","unstructured":"Ba\u015f E, Yildizdan G. Enhanced coati optimization algorithm for big data optimization problem. Neural Process Lett. 2023;55(8):10131\u201399.","journal-title":"Neural Process Lett"},{"key":"4242_CR43","doi-asserted-by":"publisher","DOI":"10.3389\/fmech.2022.1126450","volume":"8","author":"M Dehghani","year":"2023","unstructured":"Dehghani M, Trojovsk\u00fd P. Osprey optimization algorithm: a new bio-inspired metaheuristic algorithm for solving engineering optimization problems. Front Mech Eng. 2023;8: 1126450.","journal-title":"Front Mech Eng"},{"key":"4242_CR44","doi-asserted-by":"publisher","first-page":"19599","DOI":"10.1109\/ACCESS.2022.3151641","volume":"10","author":"M Dehghani","year":"2022","unstructured":"Dehghani M, Hub\u00e1lovsk\u00fd \u0160, Trojovsk\u00fd P. Tasmanian devil optimization: a new bio-inspired optimization algorithm for solving optimization algorithm. IEEE Access. 2022;10:19599\u2013620.","journal-title":"IEEE Access"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04242-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04242-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04242-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T19:20:44Z","timestamp":1757359244000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04242-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,8]]},"references-count":44,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4242"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04242-4","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2025,8,8]]},"assertion":[{"value":"9 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"732"}}