{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T22:35:40Z","timestamp":1775687740516,"version":"3.50.1"},"reference-count":36,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","funder":[{"name":"the Innovative Young Talents Foundation in Higher Education of Guangdong","award":["2021KQNCX164"],"award-info":[{"award-number":["2021KQNCX164"]}]},{"name":"the Guangdong basic and applied basic research foundation","award":["2020A1515010700"],"award-info":[{"award-number":["2020A1515010700"]}]},{"name":"the Innovation team of scientific research platform of universities in Guangdong Province","award":["2021KCXTD053"],"award-info":[{"award-number":["2021KCXTD053"]}]},{"name":"the Guangdong scientific research capacity improvement project of key construction disciplines","award":["2021ZDJS058"],"award-info":[{"award-number":["2021ZDJS058"]}]},{"name":"the Special project in key fields of Guangdong universities","award":["2022ZDZX1048"],"award-info":[{"award-number":["2022ZDZX1048"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2023,5]]},"abstract":"<jats:p> Copy\u2013move forgery is one of the most frequently used methods for producing fake digital images. Current algorithms for copy\u2013move forgery detection (CMFD) cannot combine high accuracy and fast speed. Motivated by the observation, we propose a novel CMFD algorithm whose workflow is as follows. First, we use a keypoint-extraction method with the lowest contrast threshold to extract more keypoints from the input image. Second, a new technique, gradient-hash matching, finds pairs of similar keypoints quickly and effectively using a hash table, where the hash value is computed using gradients of keypoints. Subsequently, a new method called simplified cluster-based filtering exploits the density pattern of keypoints in the copy\u2013move regions to remove false matching keypoint pairs. Finally, image matting is applied to indicate the forgery regions vividly. Extensive experiments show that not only the new algorithm is better than the state-of-the-art algorithms in terms of computation correctness, but also its computation time is drastically less. Commonly only about half time is needed. The relative time saving is even higher when images are larger. Different algorithms modules are compared through experiments to choose the best combination. <\/jats:p>","DOI":"10.1142\/s0218001423500118","type":"journal-article","created":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T08:02:07Z","timestamp":1682409727000},"source":"Crossref","is-referenced-by-count":5,"title":["A Novel Copy\u2013Move Forgery Detection Algorithm via Gradient-Hash Matching and Simplified Cluster-Based Filtering"],"prefix":"10.1142","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2876-5975","authenticated-orcid":false,"given":"Jixiang","family":"Yang","sequence":"first","affiliation":[{"name":"Faculty of Innovative Engineering, Macau University of Science and Technology, Avenida Wai Long, Macau 999078, P. R. China"}]},{"given":"Zhiyao","family":"Liang","sequence":"additional","affiliation":[{"name":"Faculty of Innovative Engineering, Macau University of Science and Technology, Avenida Wai Long, Macau 999078, P. R. China"}]},{"given":"Jianqing","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Innovative Engineering, Macau University of Science and Technology, Avenida Wai Long, Macau 999078, P. R. China"}]},{"given":"Yanfen","family":"Gan","sequence":"additional","affiliation":[{"name":"School of Computer Science, The South China Business College, Guangdong University of Foreign Studies, Guangzhou, Guangdong 510545, P. R. China"}]},{"given":"Junliu","family":"Zhong","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Guangzhou Maritime University, Guangzhou, Guangdong 510725, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2023,4,25]]},"reference":[{"issue":"3","key":"S0218001423500118BIB001","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"Amerini I.","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"S0218001423500118BIB002","first-page":"404","volume-title":"European Conf. Computer Vision","author":"Bay H.","year":"2006"},{"key":"S0218001423500118BIB003","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.patcog.2018.03.028","volume":"81","author":"Bi X. L.","year":"2018","journal-title":"Pattern Recognit."},{"issue":"1","key":"S0218001423500118BIB004","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Cao Y.","year":"2012","journal-title":"Forensic Sci. Int."},{"issue":"6","key":"S0218001423500118BIB005","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"Christlein V.","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"11","key":"S0218001423500118BIB006","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"Cozzolino D.","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"9","key":"S0218001423500118BIB007","first-page":"4467","volume":"12","author":"Deng J. H.","year":"2018","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"5","key":"S0218001423500118BIB008","first-page":"1801","volume":"2","author":"Khan E. S.","year":"2010","journal-title":"Int.J. Comput. Sci. Eng."},{"issue":"1","key":"S0218001423500118BIB009","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.forsciint.2012.10.031","volume":"224","author":"Li Y. N.","year":"2013","journal-title":"Forens. Sci. Int."},{"issue":"5","key":"S0218001423500118BIB010","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Li Y. M.","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"14","key":"S0218001423500118BIB011","doi-asserted-by":"crossref","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","volume":"77","author":"Liu Y. Q.","year":"2018","journal-title":"Multim. Tools Appl."},{"key":"S0218001423500118BIB012","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TIP.2021.3132828","volume":"31","author":"Liu Y.","year":"2021","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"S0218001423500118BIB013","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"Lowe D. G.","year":"2004","journal-title":"Int.J. Comput. Vis."},{"issue":"18","key":"S0218001423500118BIB014","doi-asserted-by":"crossref","first-page":"11513","DOI":"10.1007\/s11042-015-2872-2","volume":"75","author":"Mahmoud E.","year":"2016","journal-title":"Multim. Tools Appl."},{"issue":"1","key":"S0218001423500118BIB015","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"Muhammad G.","year":"2012","journal-title":"Digit. Invest."},{"key":"S0218001423500118BIB016","first-page":"32","volume-title":"Computer Science Technical Report of Department of Computer Science","author":"Popescu A.","year":"2004"},{"key":"S0218001423500118BIB017","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.ins.2018.06.040","volume":"463","author":"Pun C. M.","year":"2018","journal-title":"Inf. Sci."},{"issue":"8","key":"S0218001423500118BIB018","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"Pun C. M.","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"S0218001423500118BIB019","first-page":"1","volume-title":"IEEE Int. Workshop on Information Forensics and Security","author":"Rao Y.","year":"2016"},{"key":"S0218001423500118BIB020","first-page":"2564","volume-title":"IEEE Int. Conf. Computer Vision","author":"Rublee E.","year":"2011"},{"key":"S0218001423500118BIB021","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","volume-title":"Int. Workshop on Information Hiding","author":"Ryu S. J.","year":"2010"},{"key":"S0218001423500118BIB022","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"Silva E.","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"S0218001423500118BIB023","first-page":"49","volume-title":"Int. Symp. ELMAR","author":"Tralic D.","year":"2013"},{"key":"S0218001423500118BIB024","doi-asserted-by":"crossref","first-page":"4713","DOI":"10.1007\/s00521-020-05433-1","volume":"33","author":"Vega E. A. A.","year":"2021","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"S0218001423500118BIB025","doi-asserted-by":"crossref","first-page":"1655008","DOI":"10.1142\/S0218001416550089","volume":"30","author":"Wang X.","year":"2016","journal-title":"Int.J. Pattern Recognit. Artif. Intell."},{"key":"S0218001423500118BIB026","first-page":"168","volume-title":"European Conf. Computer Vision","author":"Wu Y.","year":"2018"},{"key":"S0218001423500118BIB027","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1109\/TIFS.2022.3144878","volume":"17","author":"Wu H.","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"S0218001423500118BIB028","doi-asserted-by":"crossref","first-page":"103032","DOI":"10.1016\/j.dsp.2021.103032","volume":"113","author":"Yang J. X.","year":"2021","journal-title":"Digit. Signal Process."},{"issue":"13","key":"S0218001423500118BIB029","doi-asserted-by":"crossref","first-page":"14887","DOI":"10.1007\/s11042-016-4201-9","volume":"76","author":"Zhong J.","year":"2017","journal-title":"Multim. Tools Appl."},{"issue":"1","key":"S0218001423500118BIB030","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s11071-015-2374-9","volume":"84","author":"Zhong J.","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"S0218001423500118BIB031","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.ins.2019.09.085","volume":"512","author":"Zhong J. L.","year":"2020","journal-title":"Inf. Sci."},{"issue":"18","key":"S0218001423500118BIB032","doi-asserted-by":"crossref","first-page":"26313","DOI":"10.1007\/s11042-019-07817-5","volume":"78","author":"Zhong J. L.","year":"2019","journal-title":"Multim. Tools Appl."},{"key":"S0218001423500118BIB033","doi-asserted-by":"crossref","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","volume":"15","author":"Zhong J. L.","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"2","key":"S0218001423500118BIB034","doi-asserted-by":"crossref","first-page":"1754005","DOI":"10.1142\/S0218001417540052","volume":"31","author":"Zhong J. L.","year":"2017","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"issue":"10","key":"S0218001423500118BIB035","doi-asserted-by":"crossref","first-page":"6714","DOI":"10.1109\/TII.2020.2982705","volume":"16","author":"Zhu Y.","year":"2020","journal-title":"IEEE Trans. Ind. Inf."},{"key":"S0218001423500118BIB036","doi-asserted-by":"crossref","first-page":"2986","DOI":"10.1109\/TIFS.2021.3070444","volume":"16","author":"Zhuang P. Y.","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Sec."}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001423500118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T08:08:23Z","timestamp":1685434103000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218001423500118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,25]]},"references-count":36,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10.1142\/S0218001423500118"],"URL":"https:\/\/doi.org\/10.1142\/s0218001423500118","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"value":"0218-0014","type":"print"},{"value":"1793-6381","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,25]]},"article-number":"2350011"}}