{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:44:26Z","timestamp":1761396266036,"version":"3.41.2"},"reference-count":90,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2023,7]]},"abstract":"<jats:p> Copy move forgery in digital images became a common problem due to the wide accessibility of image processing algorithms and open-source editing software. The human visual system cannot identify the traces of forgery in the tampered image. The proliferation of such digital images through the internet and social media is possible with a finger touch. These tampered images have been used in news reports, judicial forensics, medical records, and financial statements. In this paper, a detailed review has been carried on various copy-move forgery detection (CMFD) and localization techniques. Further, challenges in the research are identified along with possible solutions. <\/jats:p>","DOI":"10.1142\/s0219467823500250","type":"journal-article","created":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T15:34:07Z","timestamp":1650641647000},"source":"Crossref","is-referenced-by-count":3,"title":["Detection and Localization of Copy-Move Forgery in Digital Images: Review and Challenges"],"prefix":"10.1142","volume":"23","author":[{"given":"Gulivindala","family":"Suresh","sequence":"first","affiliation":[{"name":"Department of ECE, Aditya Engineering College, Surampalem, AP 533437, India"}]},{"given":"Chanamallu Srinivasa","family":"Rao","sequence":"additional","affiliation":[{"name":"Department of ECE, JNTUK University, Kakinada, AP 533003, India"}]}],"member":"219","published-online":{"date-parts":[[2022,4,21]]},"reference":[{"key":"S0219467823500250BIB001","volume-title":"Digital Image Processing","author":"Gonzalez R. C.","year":"2002","edition":"2"},{"issue":"1","key":"S0219467823500250BIB002","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","volume":"51","author":"Redi J. A.","year":"2011","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"S0219467823500250BIB003","first-page":"46","volume":"4","author":"Li L.","year":"2013","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"S0219467823500250BIB004","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-59745-577-0","volume-title":"Handbook of Digital and Multimedia Forensic Evidence","author":"Barbara J. J.","year":"2008"},{"issue":"1","key":"S0219467823500250BIB005","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"Chen M.","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"S0219467823500250BIB006","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","volume":"171","author":"Mahdian B.","year":"2007","journal-title":"Forensic Sci. Int."},{"issue":"1","key":"S0219467823500250BIB007","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.forsciint.2013.05.027","volume":"231","author":"Al-Qershi O. M.","year":"2013","journal-title":"Forensic Sci. Int."},{"key":"S0219467823500250BIB008","first-page":"395","volume-title":"Eigth Int. Conf. Signal Image Technology and Internet Based Systems","author":"Hussain M.","year":"2012"},{"key":"S0219467823500250BIB009","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/978-3-642-41939-3_49","volume-title":"Advances in Visual Computing. ISVC 2013","volume":"8034","author":"Al-Hammadi B. G.","year":"2013"},{"key":"S0219467823500250BIB010","doi-asserted-by":"crossref","first-page":"1586","DOI":"10.1109\/EUROCON.2013.6625188","volume-title":"IEEE EuroCon 2013","author":"Muhammad G.","year":"2013"},{"issue":"4","key":"S0219467823500250BIB011","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","volume":"25","author":"Muhammad G.","year":"2014","journal-title":"Mach. Vis. Appl."},{"issue":"4","key":"S0219467823500250BIB012","doi-asserted-by":"crossref","first-page":"1540016","DOI":"10.1142\/s0218213015400163","volume":"24","author":"Hussain M.","year":"2015","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"S0219467823500250BIB013","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.procs.2015.08.016","volume":"58","author":"Isaac M. M.","year":"2015","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"S0219467823500250BIB014","first-page":"183","volume":"22","author":"Hashmi M. F.","year":"2014","journal-title":"Eng. Lett."},{"issue":"4","key":"S0219467823500250BIB015","first-page":"125","volume":"9","author":"Hashmir M. F.","year":"2015","journal-title":"Int. J. Secur. Appl."},{"issue":"10","key":"S0219467823500250BIB016","doi-asserted-by":"crossref","first-page":"78","DOI":"10.5815\/ijigsp.2015.10.08","volume":"8","author":"Agarwal S.","year":"2015","journal-title":"Int. J. Image Graph. Signal Process."},{"first-page":"694","volume-title":"Proc. 2016 2nd Int. Conf. Next Generation Computing Technologies, NGCT 2016","author":"Mangat S. S.","key":"S0219467823500250BIB017"},{"key":"S0219467823500250BIB018","first-page":"196","volume-title":"Proc. 2016 UKSim-AMSS 18th Int. Conf. Comput. Model. Simul. UKSim","author":"Alhussein M.","year":"2016"},{"key":"S0219467823500250BIB019","first-page":"1","volume-title":"2016 9th Int. Conf. Contemporary Computing, IC3 2016","author":"Agarwal S.","year":"2016"},{"key":"S0219467823500250BIB020","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/s10489-017-0893-4","volume":"47","author":"Wu M. L.","year":"2017","journal-title":"Appl. Intell."},{"issue":"4","key":"S0219467823500250BIB021","doi-asserted-by":"crossref","first-page":"3177","DOI":"10.3233\/JIFS-169261","volume":"32","author":"Vidyadharan D. S.","year":"2017","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"1","key":"S0219467823500250BIB022","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s11760-016-0899-0","volume":"11","author":"Alahmadi A.","year":"2017","journal-title":"Signal, Image Video Process."},{"key":"S0219467823500250BIB023","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-018-5899-3","volume":"77","author":"Prakash C. S.","year":"2018","journal-title":"Multimedia Tools Appl."},{"key":"S0219467823500250BIB024","first-page":"1","volume-title":"IEEE Int. Workshop on Information Forensics and Security (WIFS)","author":"Rao Y.","year":"2016"},{"key":"S0219467823500250BIB025","first-page":"65","volume-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"Zhou J.","year":"2017"},{"issue":"3","key":"S0219467823500250BIB026","doi-asserted-by":"crossref","DOI":"10.4018\/IJDCF.2020070103","volume":"12","author":"Suresh G.","year":"2020","journal-title":"Int. J. Digital Crime Forensics"},{"issue":"2","key":"S0219467823500250BIB027","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"Lowe D. G.","year":"2004","journal-title":"Int. J. Comput. Vis."},{"issue":"4","key":"S0219467823500250BIB028","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","volume":"5","author":"Pan X.","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"S0219467823500250BIB029","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"Amerini I.","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"S0219467823500250BIB030","doi-asserted-by":"crossref","first-page":"90","DOI":"10.4304\/jmm.7.1.90-97","volume":"7","author":"Jing L.","year":"2012","journal-title":"J. Multimed."},{"issue":"6","key":"S0219467823500250BIB031","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"Amerini I.","year":"2013","journal-title":"Signal Process. Image Commun."},{"issue":"2","key":"S0219467823500250BIB032","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s00138-013-0522-0","volume":"25","author":"Jaberi M.","year":"2014","journal-title":"Mach. Vis. Appl."},{"issue":"3","key":"S0219467823500250BIB033","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"Li J.","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"S0219467823500250BIB034","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1111\/1556-4029.13456","volume":"63","author":"Emam M.","year":"2017","journal-title":"J. Forensic Sci."},{"issue":"1","key":"S0219467823500250BIB035","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/s11042-016-4289-y","volume":"77","author":"Yang B.","year":"2018","journal-title":"Multimed. Tools Appl."},{"issue":"15","key":"S0219467823500250BIB036","doi-asserted-by":"crossref","first-page":"20739","DOI":"10.1007\/s11042-019-7342-9","volume":"78","author":"Lin C.","year":"2019","journal-title":"Multimed. Tools Appl."},{"issue":"22","key":"S0219467823500250BIB037","doi-asserted-by":"crossref","first-page":"31387","DOI":"10.1007\/s11042-019-07930-5","volume":"78","author":"Liu K.","year":"2019","journal-title":"Multimed. Tools Appl."},{"issue":"16","key":"S0219467823500250BIB038","doi-asserted-by":"crossref","first-page":"23535","DOI":"10.1007\/s11042-019-7629-x","volume":"78","author":"Prakash C. S.","year":"2019","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"S0219467823500250BIB039","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"Bay H.","year":"2008","journal-title":"Comput. Vis. Image Underst."},{"issue":"4","key":"S0219467823500250BIB040","first-page":"199","volume":"8","author":"Baboo S.","year":"2011","journal-title":"Int. J. Comput. Sci."},{"issue":"17","key":"S0219467823500250BIB041","first-page":"521","volume":"4","author":"Zhang G.","year":"2012","journal-title":"Int. J. Adv. Comput. Technol."},{"key":"S0219467823500250BIB042","first-page":"1","volume":"2013","author":"Mishra P.","year":"2013","journal-title":"Sci. World J."},{"key":"S0219467823500250BIB043","first-page":"645","volume":"2016","author":"Manu V. T.","journal-title":"Adv. Intell. Syst. Comput."},{"issue":"15","key":"S0219467823500250BIB044","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s12209-016-2705-z","volume":"22","author":"Gong J.","year":"2016","journal-title":"Trans. TIANJIN Univ."},{"issue":"12","key":"S0219467823500250BIB045","doi-asserted-by":"crossref","first-page":"706","DOI":"10.3390\/sym10120706","volume":"10","author":"Wang C.","year":"2018","journal-title":"Symmetry (Basel)"},{"issue":"6","key":"S0219467823500250BIB047","doi-asserted-by":"crossref","first-page":"1769","DOI":"10.1109\/78.845934","volume":"48","author":"Lucchese L.","year":"2000","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"S0219467823500250BIB048","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","volume":"206","author":"Huang Y.","year":"2011","journal-title":"Forensic Sci. Int."},{"issue":"1","key":"S0219467823500250BIB049","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.forsciint.2011.07.015","volume":"214","author":"Cao Y.","year":"2012","journal-title":"Forensic Sci. Int."},{"issue":"7","key":"S0219467823500250BIB050","first-page":"30","volume":"70","author":"Kaur A.","year":"2013","journal-title":"Int. J. Comput. Appl."},{"issue":"6","key":"S0219467823500250BIB051","doi-asserted-by":"crossref","first-page":"38","DOI":"10.5815\/ijigsp.2015.06.05","volume":"7","author":"Kumar S.","year":"2015","journal-title":"Int. J. Image Graph. Signal Process."},{"key":"S0219467823500250BIB052","doi-asserted-by":"crossref","DOI":"10.1155\/2016\/8713202","volume":"2016","author":"Mahmood T.","year":"2016","journal-title":"Math. Probl. Eng."},{"key":"S0219467823500250BIB053","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s00521-016-2663-3","volume":"30","author":"Hazim M.","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"S0219467823500250BIB054","first-page":"1","volume":"2018","author":"Wang H.","year":"2018","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"S0219467823500250BIB055","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"Muhammad G.","year":"2012","journal-title":"Digit. Investig."},{"issue":"4","key":"S0219467823500250BIB056","first-page":"1098","volume":"22","author":"Yang B.","year":"2013","journal-title":"Radioengineering"},{"issue":"2","key":"S0219467823500250BIB057","doi-asserted-by":"crossref","first-page":"254","DOI":"10.3923\/jse.2015.254.264","volume":"9","author":"Gan J.","year":"2014","journal-title":"J. Softw. Eng."},{"key":"S0219467823500250BIB058","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.compeleceng.2017.03.013","volume":"62","author":"Hayat K.","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"S0219467823500250BIB059","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"Mahmood T.","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"S0219467823500250BIB060","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.ins.2013.03.028","volume":"239","author":"Lynch G.","year":"2013","journal-title":"Inf. Sci. (Ny)"},{"issue":"1","key":"S0219467823500250BIB061","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","volume":"8","author":"Zhao Y.","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"S0219467823500250BIB062","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"Ryu S. J.","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"S0219467823500250BIB063","first-page":"930","volume":"13","author":"Khaled A. H. A.-A.","year":"2016","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"4","key":"S0219467823500250BIB064","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1007\/s11045-016-0416-1","volume":"27","author":"Zheng J.","year":"2016","journal-title":"Multidimens. Syst. Signal Process."},{"key":"S0219467823500250BIB065","first-page":"1","volume-title":"2016 24th Signal Processing and Communication Application Conf. (SIU)","author":"Aymaz S.","year":"2016"},{"issue":"4","key":"S0219467823500250BIB066","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1080\/13682199.2016.1162922","volume":"64","author":"Ustubioglu B.","year":"2016","journal-title":"Imaging Sci. J."},{"issue":"2","key":"S0219467823500250BIB067","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s10044-016-0588-1","volume":"21","author":"Xu H.","year":"2018","journal-title":"Pattern Anal. Appl."},{"key":"S0219467823500250BIB068","doi-asserted-by":"crossref","first-page":"33505","DOI":"10.1007\/s11042-019-08082-2","volume":"78","author":"Meena K. B.","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"S0219467823500250BIB069","first-page":"59","volume-title":"ACM Workshop on Multimedia in Forensics, Security and Intelligence","author":"Bruno A.","year":"2010"},{"issue":"1","key":"S0219467823500250BIB070","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4218\/etrij.02.0102.0103","volume":"24","author":"Won C. S.","year":"2002","journal-title":"ETRI J."},{"issue":"6","key":"S0219467823500250BIB071","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TSMC.1978.4309999","volume":"8","author":"Hideyuki T.","year":"1978","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"12","key":"S0219467823500250BIB072","first-page":"14","volume":"24","author":"Farrokhnia F.","year":"1991","journal-title":"Pattern Recognit."},{"issue":"5","key":"S0219467823500250BIB073","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1109\/PROC.1979.11328","volume":"67","author":"Haralick R. M.","year":"1979","journal-title":"Proc. IEEE"},{"key":"S0219467823500250BIB074","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.neucom.2012.10.017","volume":"106","author":"Zhao Y.","year":"2013","journal-title":"Neurocomputing"},{"issue":"2","key":"S0219467823500250BIB075","first-page":"351","volume":"6","author":"Thajeel S. A.","year":"2015","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"issue":"6","key":"S0219467823500250BIB076","doi-asserted-by":"crossref","first-page":"1451","DOI":"10.1111\/1556-4029.12853","volume":"60","author":"Shabnam S.","year":"2015","journal-title":"J. Forensic Sci."},{"issue":"1","key":"S0219467823500250BIB077","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.forsciint.2013.04.023","volume":"231","author":"Davarzani R.","year":"2013","journal-title":"Forensic Sci. Int."},{"issue":"24","key":"S0219467823500250BIB078","doi-asserted-by":"crossref","first-page":"16881","DOI":"10.1007\/s11042-015-2961-2","volume":"75","author":"Tralic D.","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"S0219467823500250BIB079","first-page":"7","volume-title":"ICOS 2015\u20132015 IEEE Conf. Open Systems","author":"Uliyan D. M.","year":"2016"},{"key":"S0219467823500250BIB080","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.forsciint.2017.07.037","volume":"279","author":"Mahmood T.","year":"2017","journal-title":"Forensic Sci. Int."},{"issue":"9","key":"S0219467823500250BIB081","first-page":"4467","volume":"12","author":"Deng J.","year":"2018","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"15","key":"S0219467823500250BIB082","doi-asserted-by":"crossref","first-page":"20655","DOI":"10.1007\/s11042-019-7277-1","volume":"78","author":"Pavlovi\u0107 A.","year":"2019","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"S0219467823500250BIB083","first-page":"4005","volume":"13","author":"Thajeel S. A.","year":"2019","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"4","key":"S0219467823500250BIB084","first-page":"1098","volume":"22","author":"Bin Y.","year":"2013","journal-title":"Radio Eng."},{"key":"S0219467823500250BIB085","first-page":"311","volume-title":"2013 8th Int. Conf. Electrical and Electronics Engineering","author":"Bilgehan M.","year":"2013"},{"first-page":"5312","volume-title":"2014 IEEE Int. Conf. Image Process. (ICIP 2014)","author":"Leida L.","key":"S0219467823500250BIB086"},{"key":"S0219467823500250BIB087","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","volume-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","volume":"6387","author":"Ryu S.","year":"2010"},{"key":"S0219467823500250BIB088","first-page":"1053","volume-title":"IEEE Acoustics, Speech and Signal Processing","author":"Bayram S.","year":"2009"},{"issue":"4","key":"S0219467823500250BIB089","first-page":"331","volume":"24","author":"Suresh G.","year":"2021","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"0","key":"S0219467823500250BIB090","first-page":"1","volume":"0","author":"Kashyap A.","year":"2020","journal-title":"Comput. J."},{"key":"S0219467823500250BIB091","first-page":"100036","volume":"5","author":"Ali S.","year":"2021","journal-title":"Mach. Learn. Appl."}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467823500250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T05:57:37Z","timestamp":1691128657000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219467823500250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,21]]},"references-count":90,"journal-issue":{"issue":"04","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10.1142\/S0219467823500250"],"URL":"https:\/\/doi.org\/10.1142\/s0219467823500250","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"type":"print","value":"0219-4678"},{"type":"electronic","value":"1793-6756"}],"subject":[],"published":{"date-parts":[[2022,4,21]]},"article-number":"2350025"}}