{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:52:05Z","timestamp":1775170325434,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3172273","type":"journal-article","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:06:18Z","timestamp":1651608378000},"page":"48622-48632","source":"Crossref","is-referenced-by-count":55,"title":["An Efficient CNN Model to Detect Copy-Move Image Forgery"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"first","affiliation":[{"name":"Department of Information Technology, Zagazig University, Zagazig, Egypt"}]},{"given":"Akram M.","family":"Mortda","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Faculty of Information Technology and Computer Science, Sinai University, Arish, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1790-8640","authenticated-orcid":false,"given":"Mostafa M.","family":"Fouda","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Idaho State University, Pocatello, ID, USA"}]},{"given":"Nabil A.","family":"Lashin","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Zagazig University, Zagazig, Egypt"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.07.009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0905-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7100193"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA48430.2020.9074951"},{"key":"ref5","first-page":"6416","article-title":"Dissecting the literature for studying various approaches to copy move forgery detection","volume":"29","author":"Velmurugan","year":"2020","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.1145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.09.013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ATSIP.2014.6834590"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2013.6920733"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CESYS.2018.8723954"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08354-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/sym12040492"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.1145"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12105"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2013.03.006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6891-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/267691"},{"key":"ref19","first-page":"62","article-title":"Simulative comparison of copy-move forgery detection methods for digital images","volume":"4","author":"Kaur","year":"2015","journal-title":"Int. J. Electron., Elect. Comput. Syst."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/13682199.2018.1461345"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2018.5356"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08082-2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955308"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102536"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08751-7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09816-3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7030059"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12051"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-021-10620-9"},{"key":"ref30","first-page":"1","article-title":"Efficient approach towards detection and identification of copy move and image splicing forgeries using mask R-CNN with MobileNet V1","volume":"2022","author":"Dhananjay","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2957693"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2982705"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09766302.pdf?arnumber=9766302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:51:02Z","timestamp":1705963862000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9766302\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3172273","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}