{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:52:05Z","timestamp":1775170325052,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,9]]},"DOI":"10.1109\/dese58274.2023.10100318","type":"proceedings-article","created":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T19:56:56Z","timestamp":1691438216000},"page":"439-444","source":"Crossref","is-referenced-by-count":4,"title":["Double Dual Convolutional Neural Network (D2CNN) for Copy-Move Forgery Detection"],"prefix":"10.1109","author":[{"given":"Mahmoud H.","family":"Farhan","sequence":"first","affiliation":[{"name":"College of Computer Science and IT, University of Anbar,Ramadi,Iraq"}]},{"given":"Khalid","family":"Shaker","sequence":"additional","affiliation":[{"name":"College of Computer Science and IT, University of Anbar,Ramadi,Iraq"}]},{"given":"Sufyan","family":"Al-Janabi","sequence":"additional","affiliation":[{"name":"College of Computer Science and IT, University of Anbar,Ramadi,Iraq"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTM.2019.8776709"},{"issue":"71","key":"ref2","first-page":"755","article-title":"Efficient copy-move forgery detection for digital images","author":"Sadeghi","year":"2012","journal-title":"Proceedings of World Academy of Science, Engineering and Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08495-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2663-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s42044-019-00029-y"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-016-0899-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2019.8936108"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.03.013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09415-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102510"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.040"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT49239.2020.9225276"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6605-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08082-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-016-0588-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/13682199.2018.1461345"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IICSPI48186.2019.9096005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974804"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT51525.2021.9579701"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04795-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/00450618.2020.1715479"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4370-2_25"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09225-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-016-0416-1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00304-8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2438008"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083247"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/cisp-bmei.2017.8301940"},{"issue":"1","key":"ref31","article-title":"Cnn based image forgery detection using pre-trained alexnet model","volume-title":"International Journal of Computational Intelligence & IoT","volume":"2","author":"Doegar","year":"2019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08495-z"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00211"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2011.2129512"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12051"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07998-1_23"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA52141.2021.9377272"}],"event":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","location":"Baghdad & Anbar, Iraq","start":{"date-parts":[[2023,1,9]]},"end":{"date-parts":[[2023,1,12]]}},"container-title":["2023 15th International Conference on Developments in eSystems Engineering (DeSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10099472\/10099478\/10100318.pdf?arnumber=10100318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:35:01Z","timestamp":1709253301000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10100318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/dese58274.2023.10100318","relation":{},"subject":[],"published":{"date-parts":[[2023,1,9]]}}}