{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:39:46Z","timestamp":1770748786815,"version":"3.50.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,18]]},"DOI":"10.1109\/dese60595.2023.10468748","type":"proceedings-article","created":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T17:58:39Z","timestamp":1711043919000},"page":"276-281","source":"Crossref","is-referenced-by-count":3,"title":["Image Forgery Detection Using Combined 2D DWT-Neural Network"],"prefix":"10.1109","author":[{"given":"Haider","family":"Abdulkarim","sequence":"first","affiliation":[{"name":"University of Technology,Department of Communication Engineering,Baghdad,Iraq"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marwa K.","family":"Farhan","sequence":"additional","affiliation":[{"name":"Scholarships and Culture Relations Directorate Ministry of Higher Education and Scientific Research,Baghdad,Iraq"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mustafa","family":"Ghanim","sequence":"additional","affiliation":[{"name":"University of Technology-Iraq,Department of Communication Engineering,Baghdad,Iraq"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13797-w"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1228\/1\/012036"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1892\/1\/012010"},{"issue":"May","key":"ref4","volume-title":"A Passive-Blind Forgery Detection Scheme Based on Content-Adaptive Quantization Table Estimation A Passive-Blind Forgery Detection Scheme Based on Content-Adaptive Quantization Table Estimation","author":"Lin","year":"2011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14257\/ijsip.2015.8.7.25"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.08.008"},{"issue":"January","key":"ref7","volume-title":"Revisiting copy-move forgery detection by considering realistic image with similar but genuine objects","author":"Zhu","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2005.855406"},{"key":"ref9","volume-title":"A Survey of Copy-Move Forgery Detection Techniques for Digital Images","author":"Oommen"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iccphot.2012.6215223"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/12.640109"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2012.2202227"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11030403"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2004.839932"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1117\/12.640109"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icip.2009.5414611"},{"key":"ref17","volume-title":"Learning Rich Features for Image Manipulation Detection RPN layer RGB stream input RGB RoI features Bilinear Noise stream input Noise Conv Layers Noise RoI features","author":"Zhou"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.03.013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/9781118382905.ch18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970104"},{"key":"ref22","first-page":"354","article-title":"Eigenvector-based Feature Extraction for Classification","volume-title":"Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference","author":"Tsymbal"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i5.pp4016-4026"},{"issue":"September","key":"ref24","first-page":"25","volume-title":"CoMoFoD - New Database for Copy-Move Forgery Detection","author":"Tralic","year":"2013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2011.07.015"},{"issue":"1","key":"ref26","first-page":"251","volume-title":"DWT-PCA (EVD) Based Copymove Image Forgery Detection","volume":"5","author":"Zimba","year":"2011"}],"event":{"name":"2023 16th International Conference on Developments in eSystems Engineering (DeSE)","location":"Istanbul, Turkiye","start":{"date-parts":[[2023,12,18]]},"end":{"date-parts":[[2023,12,20]]}},"container-title":["2023 16th International Conference on Developments in eSystems Engineering (DeSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10468572\/10468673\/10468748.pdf?arnumber=10468748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T21:08:36Z","timestamp":1711487316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10468748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,18]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/dese60595.2023.10468748","relation":{},"subject":[],"published":{"date-parts":[[2023,12,18]]}}}