{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T03:54:48Z","timestamp":1772078088510,"version":"3.50.1"},"reference-count":32,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:p> In modern society, digital images can be far-reaching, and the images are manipulated by various software and hardware technologies. The image forgery activities are undertaken by the attackers mainly for damaging the reputation of people or receiving fiscal gain, etc. Taking this into consideration, many techniques are developed to detect the forged images. In this paper, a new deep learning-based approach is introduced for copy-move forgery detection. The input images are segmented into non-overlapping patches using superpixel-based modified dense peak clustering and the features are extracted from the segmented patches by applying deep learning structure of attention-based DenseNet 121 model. Besides, to compare every block, the depth of each pixel is reconstructed, and eventually matching process is carried out using the adaptive chimp patch matching approach, which detects the suspicious forged regions in an image. Finally, the matched keypoints are merged with the segmented patches using the merged keypoint matching algorithm. As a result, the new deep learning approach has detected the forged regions efficiently from the tampered image with less time even the image is compressed, rotated, or scaled. The performance is evaluated in terms of recall, precision, accuracy, F1-score, computational time, and False Positive Rate (FPR). Moreover, the performance is compared with the other existing approaches, and the outcomes showed that the proposed method has achieved higher accuracy of 97%, recall of 99%, precision of 97.84%, F1-score of 98.81%, FPR of 0.022 and less computational time of 2.5 s. <\/jats:p>","DOI":"10.1142\/s0219467823500420","type":"journal-article","created":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T16:05:51Z","timestamp":1656518751000},"source":"Crossref","is-referenced-by-count":2,"title":["Deep Learning Feature Extraction Using Attention-Based DenseNet 121 for Copy Move Forgery Detection"],"prefix":"10.1142","volume":"23","author":[{"given":"Rajeev","family":"Rajkumar","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Manipur Institute of Technology, Imphal, Manipur 795001, India"}]}],"member":"219","published-online":{"date-parts":[[2022,6,29]]},"reference":[{"issue":"8","key":"S0219467823500420BIB001","doi-asserted-by":"crossref","first-page":"2560","DOI":"10.1166\/jctn.2018.7498","volume":"15","author":"Kumar B. S.","year":"2018","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"issue":"4","key":"S0219467823500420BIB002","first-page":"6416","volume":"29","author":"Velmurugan S.","year":"2020","journal-title":"IJAST"},{"key":"S0219467823500420BIB003","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/ICRITO48877.2020.9197801","volume-title":"2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","author":"Bansal A.","year":"2020"},{"key":"S0219467823500420BIB004","doi-asserted-by":"crossref","first-page":"40550","DOI":"10.1109\/ACCESS.2019.2907316","volume":"7","author":"Teerakanok S.","year":"2019","journal-title":"IEEE Access"},{"key":"S0219467823500420BIB005","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.jisa.2019.01.007","volume":"45","author":"Soni B.","year":"2019","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"S0219467823500420BIB006","doi-asserted-by":"crossref","first-page":"023007","DOI":"10.1117\/1.JEI.27.2.023007","volume":"27","author":"Dixit R.","year":"2018","journal-title":"Journal of Electronic Imaging"},{"issue":"10","key":"S0219467823500420BIB007","doi-asserted-by":"crossref","first-page":"4713","DOI":"10.1007\/s00521-020-05433-1","volume":"33","author":"Vega E. A. A.","year":"2021","journal-title":"Neural Computing and Applications"},{"issue":"6","key":"S0219467823500420BIB008","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1080\/00450618.2019.1629018","volume":"52","author":"Varghese J.","journal-title":"Australian Journal of Forensic Sciences"},{"issue":"1","key":"S0219467823500420BIB009","first-page":"6","volume":"14","author":"Zhang Z.","year":"2018","journal-title":"Journal of Information Processing Systems"},{"issue":"10","key":"S0219467823500420BIB010","doi-asserted-by":"crossref","first-page":"3630","DOI":"10.1007\/s10489-018-1168-4","volume":"48","author":"Wang X. Y.","year":"2018","journal-title":"Applied Intelligence"},{"issue":"3","key":"S0219467823500420BIB011","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1007\/s11045-019-00688-x","volume":"31","author":"Wang X. Y.","year":"2020","journal-title":"Multidimensional Systems and Signal Processing"},{"issue":"4","key":"S0219467823500420BIB012","doi-asserted-by":"crossref","first-page":"492","DOI":"10.3390\/sym12040492","volume":"12","author":"Park J. Y.","year":"2020","journal-title":"Symmetry"},{"issue":"5","key":"S0219467823500420BIB013","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Li Y.","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"39","key":"S0219467823500420BIB014","doi-asserted-by":"crossref","first-page":"29977","DOI":"10.1007\/s11042-020-09415-2","volume":"79","author":"Jaiprakash S. P.","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"S0219467823500420BIB015","doi-asserted-by":"crossref","first-page":"45","DOI":"10.22401\/ANJS.24.1.08","volume":"24","author":"Sewan A. F. H.","year":"2021","journal-title":"Al-Nahrain Journal of Science"},{"key":"S0219467823500420BIB016","doi-asserted-by":"crossref","first-page":"1096","DOI":"10.1109\/ICICCS48265.2020.9121083","volume-title":"2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS)","author":"Agarwal R.","year":"2020"},{"key":"S0219467823500420BIB017","first-page":"1","volume-title":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","author":"Abidin A. B. Z.","year":"2019"},{"key":"S0219467823500420BIB018","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1109\/ICACCS48705.2020.9074408","volume-title":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","author":"Barad Z. J.","year":"2020"},{"key":"S0219467823500420BIB019","doi-asserted-by":"crossref","first-page":"1907","DOI":"10.1109\/WACV.2018.00211","volume-title":"2018 IEEE Winter Conference on Applications of Computer Vision (WACV)","author":"Wu Y.","year":"2018"},{"issue":"25","key":"S0219467823500420BIB020","doi-asserted-by":"crossref","first-page":"18221","DOI":"10.1007\/s11042-019-08162-3","volume":"79","author":"Al_Azrak F. M.","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"S0219467823500420BIB021","first-page":"4676","volume-title":"Proc. IEEE\/CVF Conf. Computer Vision and Pattern Recognition","author":"Islam A.","year":"2020"},{"issue":"10","key":"S0219467823500420BIB022","doi-asserted-by":"crossref","first-page":"6714","DOI":"10.1109\/TII.2020.2982705","volume":"16","author":"Zhu Y.","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"S0219467823500420BIB023","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-020-08751-7","volume":"79","author":"Elaskily M. A.","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"S0219467823500420BIB024","first-page":"000125-000130","volume-title":"2021 IEEE 19th World Symposium on Applied Machine Intelligence and Informatics (SAMI) IEEE","author":"Abbas M. N."},{"issue":"3","key":"S0219467823500420BIB025","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1049\/ipr2.12051","volume":"15","author":"Goel N.","year":"2021","journal-title":"IET Image Processing"},{"key":"S0219467823500420BIB026","first-page":"1160\u20131165","volume-title":"2020 25th International Conference on Pattern Recognition (ICPR)","author":"Kafali E.","year":"2021"},{"issue":"6","key":"S0219467823500420BIB027","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"Christlein V.","year":"2012","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"S0219467823500420BIB028","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"Cozzolino D.","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"S0219467823500420BIB029","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"Silva E.","year":"2015","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"11","key":"S0219467823500420BIB030","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1109\/TIFS.2016.2585118","volume":"11","author":"Zandi M.","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"S0219467823500420BIB031","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","volume-title":"Information Hiding","volume":"6387","author":"Ryu S. J.","year":"2010"},{"key":"S0219467823500420BIB032","doi-asserted-by":"crossref","first-page":"113338","DOI":"10.1016\/j.eswa.2020.113338","volume":"149","author":"Khishe M.","year":"2020","journal-title":"Expert Systems with Applications"}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467823500420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T15:15:21Z","timestamp":1697123721000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219467823500420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,29]]},"references-count":32,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10.1142\/S0219467823500420"],"URL":"https:\/\/doi.org\/10.1142\/s0219467823500420","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"value":"0219-4678","type":"print"},{"value":"1793-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,29]]},"article-number":"2350042"}}