{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T16:13:16Z","timestamp":1765383196566,"version":"3.46.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T00:00:00Z","timestamp":1752451200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T00:00:00Z","timestamp":1752451200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Oper. Res. Forum"],"DOI":"10.1007\/s43069-025-00500-6","type":"journal-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T09:42:42Z","timestamp":1752486162000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Effective Detection Approach for Copy-Move Image Forgery Using Feature Matching by Adaptive Threshold-Aided Reserved G2NN"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1574-5334","authenticated-orcid":false,"given":"Sai Pratheek","family":"Chalamalasetty","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9429-368X","authenticated-orcid":false,"given":"Srinivasa Rao","family":"Giduturi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,14]]},"reference":[{"key":"500_CR1","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.neucom.2022.09.017","volume":"511","author":"M Aria","year":"2022","unstructured":"Aria M, Hashemzadeh M, Farajzadeh N (2022) QDL-CMFD: a quality-independent and deep learning-based copy-move image forgery detection method. Neurocomputing 511:213\u2013236","journal-title":"Neurocomputing"},{"issue":"6","key":"500_CR2","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christin","year":"2012","unstructured":"Christin V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"500_CR3","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/s11045-019-00688-x","volume":"31","author":"XY Wang","year":"2020","unstructured":"Wang XY, Wang C, Wang L, Jiao LX, Yang HY, Niu PP (2020) A fast and highly accurate image copy-move forgery detection approach. Multidimension Syst Signal Process 31:857\u2013883","journal-title":"Multidimension Syst Signal Process"},{"key":"500_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"MH Alkawaz","year":"2018","unstructured":"Alkawaz MH (2018) Ghazali Sulong, Tanzila Saba, and Amjad Rehman, Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Appl 30:183\u2013192","journal-title":"Neural Comput Appl"},{"key":"500_CR5","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s11045-016-0416-1","volume":"27","author":"J Zheng","year":"2016","unstructured":"Zheng J, Liu Y, Ren J, Zhu T, Yan Y, Yang H (2016) Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidimension Syst Signal Process 27:989\u20131005","journal-title":"Multidimension Syst Signal Process"},{"issue":"16","key":"500_CR6","doi-asserted-by":"publisher","first-page":"22867","DOI":"10.1007\/s11042-021-11503-w","volume":"81","author":"G Tahaoglu","year":"2022","unstructured":"Tahaoglu G, Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2022) Ciratefi based copy move forgery detection on digital images. Multimedia Tools and Applications 81(16):22867\u201322902","journal-title":"Multimedia Tools and Applications"},{"issue":"39","key":"500_CR7","doi-asserted-by":"publisher","first-page":"29977","DOI":"10.1007\/s11042-020-09415-2","volume":"79","author":"SP Jaiprakash","year":"2020","unstructured":"Jaiprakash SP, Desai MB, Prakash CS, Mistry VH, Radadiya KL (2020) Low dimensional DCT and DWT feature-based model for detection of image splicing and copy-move forgery. Multimedia Tools and Applications 79(39):29977\u201330005","journal-title":"Multimedia Tools and Applications"},{"key":"500_CR8","doi-asserted-by":"crossref","unstructured":"Muzaffer G, Ulutas G (2019) A new deep learning-based method to detection of copy-move forgery in digital images. Scientific Meeting on Electrical-Electronics & Biomedical Engineering and Computer Science (EBBT), pp 1\u20134","DOI":"10.1109\/EBBT.2019.8741657"},{"issue":"26","key":"500_CR9","doi-asserted-by":"publisher","first-page":"37847","DOI":"10.1007\/s11042-022-12755-w","volume":"81","author":"S Lu","year":"2022","unstructured":"Lu S, Hu X, Wang C, Chen L, Han S, Han Y (2022) Copy-move image forgery detection based on evolving circular domains coverage. Multimedia Tools and Applications 81(26):37847\u201337872","journal-title":"Multimedia Tools and Applications"},{"key":"500_CR10","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s42044-019-00029-y","volume":"2","author":"A Parveen","year":"2019","unstructured":"Parveen A (2019) Zishan Husain Khan, and Syed Naseem Ahmad, Block-based copy\u2013move image forgery detection using DCT. Iran Journal of Computer Science 2:89\u201399","journal-title":"Iran Journal of Computer Science"},{"issue":"35","key":"500_CR11","doi-asserted-by":"publisher","first-page":"26045","DOI":"10.1007\/s11042-020-09225-6","volume":"79","author":"P Niyishaka","year":"2020","unstructured":"Niyishaka P, Bhagvati C (2020) Copy-move forgery detection using image blobs and BRISK feature. Multimedia Tools and Applications 79(35):26045\u201326059","journal-title":"Multimedia Tools and Applications"},{"key":"500_CR12","first-page":"336","volume":"9028","author":"I Amerini","year":"2014","unstructured":"Amerini I, Caldelli R, Del Bimbo Alberto, Di Fuccia Andrea, Saravo Luigi, Rizzo Anna Paola (2014) Copy-move forgery detection from printed images. In Media Watermarking, Security, and Forensics 9028:336\u2013345","journal-title":"In Media Watermarking, Security, and Forensics"},{"key":"500_CR13","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.jvcir.2017.04.004","volume":"46","author":"NB Warif","year":"2017","unstructured":"Warif NB, Abd AW, Wahab A, Idris MYI, Salleh R, Othman F (2017) SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46:219\u2013232","journal-title":"J Vis Commun Image Represent"},{"key":"500_CR14","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.ins.2017.08.044","volume":"418","author":"X Bi","year":"2017","unstructured":"Bi X, Pun C-M (2017) Fast reflective offset-guided searching method for copy-move forgery detection. Inf Sci 418:531\u2013545","journal-title":"Inf Sci"},{"issue":"3","key":"500_CR15","first-page":"183","volume":"71","author":"M Samuel","year":"2022","unstructured":"Samuel M, Reddy AM (2022) An empirical study on copy-move forgery detection techniques in images. mathematical statistician and engineering applications 71(3):183\u2013193","journal-title":"mathematical statistician and engineering applications"},{"key":"500_CR16","doi-asserted-by":"publisher","first-page":"19167","DOI":"10.1007\/s11042-020-08751-7","volume":"79","author":"MA Elaskily","year":"2020","unstructured":"Elaskily MA, Elnemr HA, Sedik A, Dessouky MM, El Banby GM, Elshakankiry OA, Khalaf AA, Aslan HK, Faragallah OS, Abd El-Samie FE (2020) A novel deep learning framework for copy-moveforgery detection in images. Multimedia Tools and Applications 79:19167\u201319192","journal-title":"Multimedia Tools and Applications"},{"issue":"73","key":"500_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.4114\/intartif.vol27iss73pp80-91","volume":"27","author":"S Arivazhagan","year":"2024","unstructured":"Arivazhagan S, Newlin Shebiah R, Saranyaa M, Shanmuga Priya R (2024) CNN-based approach for robust detection of copy-move forgery in images. Inteligencia Artificial 27(73):80\u201391","journal-title":"Inteligencia Artificial"},{"key":"500_CR18","doi-asserted-by":"publisher","unstructured":"Agarwal R,   Verma OP (2019) An efficient copy move forgery detection using deep learning feature extraction and matching algorithm. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-08495-z","DOI":"10.1007\/s11042-019-08495-z"},{"key":"500_CR19","doi-asserted-by":"crossref","unstructured":"Abbas MN, Ansari MS, Asghar MN (2021) Lightweight deep learning model for detection of copy-move image forgery with post-processed attacks, IEEE 19th World Symposium on Applied Machine Intelligence and Informatics, pp.21\u201323","DOI":"10.1109\/SAMI50585.2021.9378690"},{"key":"500_CR20","first-page":"4385","volume":"40","author":"MA Elaskilya","year":"2021","unstructured":"Elaskilya MA, Alkinanib MH, Sedikc A, Dessouky MM (2021) Deep learning based algorithm (ConvLSTM) for Copy Move Forgery Detection. Journal of Intelligent & Fuzzy Systems 40:4385\u20134405","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"2","key":"500_CR21","first-page":"730","volume":"11","author":"Thiiban Muniappan","year":"2023","unstructured":"Muniappan Thiiban, Abd Warif NB, Ismail A, Mat Abir NA (2023) An Evaluation of Convolutional Neural Network (CNN) model for copy-move and splicing forgery detection. International Journal of Intelligent Systems and Applications in Engineering 11(2):730\u2013740","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"key":"500_CR22","doi-asserted-by":"crossref","unstructured":"Islam A, Long C, Basharat A, Hoogs A (2020) DOA-GAN: dual-order attentive generative adversarial network for image copy-move forgery detection and localization. IEEE Access. pp 4676\u20134685","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"500_CR23","doi-asserted-by":"publisher","first-page":"109778","DOI":"10.1016\/j.asoc.2022.109778","volume":"131","author":"Nazir Tahira","year":"2022","unstructured":"Tahira Nazir, Nawaz Marriam, Masood Momina, Javed Ali (2022) Copy move forgery detection and segmentation using improved mask region-based convolution network (RCNN). Applied Soft Computing 131:109778","journal-title":"Applied Soft Computing"},{"issue":"10","key":"500_CR24","doi-asserted-by":"publisher","first-page":"6714","DOI":"10.1109\/TII.2020.2982705","volume":"16","author":"Ye Zhu","year":"2020","unstructured":"Zhu Ye, Chen C, Yan G, Guo Y, Dong Y (2020) AR-Net: adaptive attention and residual refinement network for copy-move forgery detection. IEEE Trans Industr Inf 16(10):6714\u20136723","journal-title":"IEEE Trans Industr Inf"},{"key":"500_CR25","doi-asserted-by":"crossref","unstructured":"Magudeeswaran V,  Subramani B (2023) Artificial bee colony optimized image enhancement framework for invisible images. Multimed Tools Appl 82:3627\u20133646","DOI":"10.1007\/s11042-022-13409-7"},{"issue":"4","key":"500_CR26","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1002\/col.22777","volume":"47","author":"B Subramani","year":"2022","unstructured":"Subramani B, Veluchamy M (2022) Cuckoo search optimization-based image color and detail enhancement for contrast distorted images. , Vol. 47. Color Research & Application 47(4):1005\u20131022","journal-title":"Color Research & Application"},{"key":"500_CR27","doi-asserted-by":"crossref","unstructured":"Subramani B, Bhandari AK, Veluchamy M (2021) Optimal Bezier curve modification function for contrast degraded images. IEEE Trans Instrum Meas 70:1\u201310","DOI":"10.1109\/TIM.2021.3073320"},{"key":"500_CR28","doi-asserted-by":"crossref","unstructured":"Hijazi MHA, Josmin ES (2024) Copy-move forgery detection optimization using harmony search with clonal selection algorithm. IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), pp 349\u2013353","DOI":"10.1109\/IICAIET62352.2024.10730406"},{"issue":"10","key":"500_CR29","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1016\/j.ifacol.2022.09.488","volume":"55","author":"K Tafakkori","year":"2022","unstructured":"Tafakkori K, Tavakkoli-Moghaddam R (2022) Hermit Crab Optimizer (HCO): a novel meta-heuristic algorithm. IFAC-PapersOnLine 55(10):702\u2013707","journal-title":"IFAC-PapersOnLine"},{"issue":"10","key":"500_CR30","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1016\/j.measurement.2010.09.021","volume":"43","author":"LH Juang","year":"2010","unstructured":"Juang LH, Wu MN (2010) Image noise reduction using Wiener filtering with pseudo-inverse. Measurement 43(10):1649\u20131655","journal-title":"Measurement"},{"issue":"2","key":"500_CR31","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.infrared.2010.12.001","volume":"54","author":"X Bai","year":"2011","unstructured":"Bai X, Zhou F, Xue B (2011) Infrared image enhancement through contrast enhancement by using multiscale new top-hat transform. Infrared Phys Technol 54(2):61\u201369","journal-title":"Infrared Phys Technol"},{"key":"500_CR32","doi-asserted-by":"publisher","unstructured":"Wu H, Zhang X, Song L, Zhang Y, Gu L, Zhao X (2022) Wild geese migration optimization algorithm: a new meta-heuristic algorithm for solving inverse kinematics of robot. Comput Intell Neurosci. https:\/\/doi.org\/10.1155\/2022\/5191758","DOI":"10.1155\/2022\/5191758"},{"key":"500_CR33","doi-asserted-by":"crossref","unstructured":"Chen C-FR, Fan Q, Panda R (2021) Crossvit: cross-attention multi-scale vision transformer for image classification. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp 357\u2013366","DOI":"10.1109\/ICCV48922.2021.00041"},{"key":"500_CR34","doi-asserted-by":"publisher","first-page":"103057","DOI":"10.1016\/j.jvcir.2021.103057","volume":"76","author":"Qiyue Lyu","year":"2021","unstructured":"Lyu Qiyue, Luo Junwei, Liu Ke, Yin Xiaolin, Liu Jiarui, Wei Lu (2021) Copy move forgery detection based on double matching. J Vis Commun Image R 76:103057","journal-title":"J Vis Commun Image R"},{"key":"500_CR35","doi-asserted-by":"crossref","unstructured":"Roy A, Dixit R, Naskar R, Chakraborty RS, Roy A, Dixit R, Naskar R and Chakraborty RS (2020 ) Copy-move forgery detection with similar but genuine objects. Digit Image Forensics, pp 65\u201377","DOI":"10.1007\/978-981-10-7644-2_5"},{"issue":"2","key":"500_CR36","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1111\/1556-4029.15210","volume":"68","author":"S Tyagi","year":"2023","unstructured":"Tyagi S, Yadav D (2023) ForensicNet: modern convolutional neural network-based image forgery detection network. J Forensic Sci 68(2):461\u2013469","journal-title":"J Forensic Sci"},{"issue":"19","key":"500_CR37","doi-asserted-by":"publisher","first-page":"14429","DOI":"10.1007\/s00500-020-04795-x","volume":"24","author":"S Dhivya","year":"2020","unstructured":"Dhivya S, Sangeetha J, Sudhakar BJSC (2020) Copy-move forgery detection using SURF feature extraction and SVM supervised learning technique. Soft Comput 24(19):14429\u201314440","journal-title":"Soft Comput"},{"key":"500_CR38","doi-asserted-by":"crossref","unstructured":"Rajkumar R, Roy S, and Manglem Singh K (2019) A robust and forensic transform for copy-move digital image forgery detection based on dense depth block matching. Imaging Sc J 67(6):343\u2013357","DOI":"10.1080\/13682199.2019.1663069"},{"key":"500_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106728","volume":"97","author":"H Kasban","year":"2020","unstructured":"Kasban H, Nassar S (2020) An efficient approach for forgery detection in digital images using Hilbert-Huang transform. Appl Soft Comput 97:106728","journal-title":"Appl Soft Comput"},{"issue":"23","key":"500_CR40","doi-asserted-by":"publisher","first-page":"pp","DOI":"10.1002\/cpe.7191","volume":"34","author":"M Ahmad","year":"2022","unstructured":"Ahmad M, Khursheed F (2022) Detection and localization of image tampering in digital images with fused features. Concurrency and Computation: Practice and Experience 34(23):pp","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"15","key":"500_CR41","doi-asserted-by":"publisher","first-page":"6676","DOI":"10.1016\/j.eswa.2014.05.009","volume":"41","author":"M Ghaemi","year":"2014","unstructured":"Ghaemi M, Feizi-Derakhshi M-R (2014) Forest optimization algorithm. Expert Syst Appl 41(15):6676\u20136687","journal-title":"Expert Syst Appl"},{"issue":"2","key":"500_CR42","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.aci.2017.09.001","volume":"14","author":"M Mareli","year":"2018","unstructured":"Mareli M, Twala B (2018) An adaptive Cuckoo search algorithm for optimization. Applied computing and informatics 14(2):107\u2013115","journal-title":"Applied computing and informatics"}],"container-title":["Operations Research Forum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43069-025-00500-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43069-025-00500-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43069-025-00500-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T16:07:55Z","timestamp":1765382875000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43069-025-00500-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,14]]},"references-count":42,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["500"],"URL":"https:\/\/doi.org\/10.1007\/s43069-025-00500-6","relation":{},"ISSN":["2662-2556"],"issn-type":[{"type":"electronic","value":"2662-2556"}],"subject":[],"published":{"date-parts":[[2025,7,14]]},"assertion":[{"value":"28 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"94"}}