{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T19:59:45Z","timestamp":1770494385595,"version":"3.49.0"},"reference-count":54,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Wavelets Multiresolut Inf. Process."],"published-print":{"date-parts":[[2023,3]]},"abstract":"<jats:p> Digital forgery is increasing day by day due to the increase in the usage of digital media files and the ease of editing media files. But digital media editing is a serious issue, as digital media are the primary source of evidence for criminal cases in the courtrooms. Consequently, there is an urge to detect and localize forgeries in digital media to aid digital forensics. The main aim of the proposed work is to detect forgeries in digital images. Image splicing forgery involves copying an image region from one image and pasting it into another image. A deep learning-based technique is proposed to detect image splicing forgery. A pre-trained deep Convolution Neural Network is transferred for the proposed application. The network is trained using spliced and original images to adapt it to the image splicing detection problem. The layers in the network are modified and fine-tuned to make it perform well for the new unseen dataset. This re-designed convolution network discriminates spliced and original images accurately. Also, the proposed work locates the spliced image regions if both the source and spliced images are provided as input image pairs. The proposed work is tested on CASIA and Columbia splicing image datasets and achieved good results. <\/jats:p>","DOI":"10.1142\/s0219691322500515","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:51:50Z","timestamp":1667526710000},"source":"Crossref","is-referenced-by-count":4,"title":["Effective image splicing detection using deep neural network"],"prefix":"10.1142","volume":"21","author":[{"given":"S.","family":"Priyadharsini","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Mepco Schlenk Engineering College, Sivakasi, India"}]},{"given":"K. Kamala","family":"Devi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Mepco Schlenk Engineering College, Sivakasi, India"}]}],"member":"219","published-online":{"date-parts":[[2022,12,19]]},"reference":[{"issue":"17","key":"S0219691322500515BIB001","doi-asserted-by":"crossref","first-page":"11465","DOI":"10.1007\/s00521-021-05837-7","volume":"33","author":"Arivazhagan S.","year":"2021","journal-title":"Neural Comput. Appl."},{"issue":"5","key":"S0219691322500515BIB002","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1109\/TIFS.2015.2394231","volume":"10","author":"Bahrami K.","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"S0219691322500515BIB003","first-page":"2654","volume-title":"Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)","author":"Bahrami K.","year":"2014"},{"key":"S0219691322500515BIB004","first-page":"144","volume-title":"Int. Workshop on Information Forensics and Security (WIFS)","author":"Bahrami K.","year":"2013"},{"key":"S0219691322500515BIB005","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1980.0044"},{"issue":"3","key":"S0219691322500515BIB006","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"Bianchi T.","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"S0219691322500515BIB007","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1109\/TIFS.2009.2033749","volume":"4","author":"Cao H.","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"S0219691322500515BIB008","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TIFS.2015.2506548","volume":"11","author":"Carvalho T.","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"S0219691322500515BIB009","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","volume":"3","author":"Chen M.","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"S0219691322500515BIB010","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1109\/TIFS.2014.2302078","volume":"9","author":"Chierchia G.","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"S0219691322500515BIB011","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","volume":"8","author":"De Carvalho T. J.","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"S0219691322500515BIB012","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.diin.2011.06.004","volume":"8","author":"Devi Mahalakshmi S.","year":"2012","journal-title":"Int. J. Digit. Invest."},{"key":"S0219691322500515BIB013","first-page":"422","volume-title":"IEEE China Summit and Int. Conf. Signal and Information Processing","author":"Dong J.","year":"2013"},{"key":"S0219691322500515BIB014","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/1597817.1597839","volume-title":"11th ACM Multimedia and Security Workshop","author":"Fan N.","year":"2009"},{"key":"S0219691322500515BIB015","doi-asserted-by":"crossref","first-page":"75410J","DOI":"10.1117\/12.838888","volume":"7541","author":"Feng X.","year":"2010","journal-title":"Proc. Media Forensics Secur. II"},{"key":"S0219691322500515BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"S0219691322500515BIB017","first-page":"574","volume-title":"Security, Steganography, Watermarking of Multimedia Contents IX","volume":"6505","author":"Fu D.","year":"2007"},{"key":"S0219691322500515BIB018","doi-asserted-by":"publisher","DOI":"10.3390\/e18030084"},{"key":"S0219691322500515BIB019","doi-asserted-by":"publisher","DOI":"10.3390\/e20090714"},{"key":"S0219691322500515BIB020","doi-asserted-by":"publisher","DOI":"10.3390\/e21030304"},{"key":"S0219691322500515BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42105-6_16"},{"issue":"1","key":"S0219691322500515BIB022","first-page":"12457","volume":"76","author":"Heng Y.","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"S0219691322500515BIB023","first-page":"549","volume-title":"IEEE Int. Conf. Multimedia and Expo (ICME)","author":"Hsu Y.-F.","year":"2006"},{"key":"S0219691322500515BIB024","first-page":"1","volume-title":"Int. Workshop on Information Forensics and Security (WIFS)","author":"Iuliani M.","year":"2015"},{"issue":"2","key":"S0219691322500515BIB025","doi-asserted-by":"crossref","first-page":"101805","DOI":"10.1016\/j.jksus.2021.101805","volume":"34","author":"Jalab H. A.","year":"2022","journal-title":"J. King Saud Univ. Sci."},{"key":"S0219691322500515BIB026","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/978-3-540-77370-2_21","volume-title":"Int. Workshop on Information Hiding","volume":"4567","author":"Johnson M. K.","year":"2007"},{"key":"S0219691322500515BIB027","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-540-92238-4_3","volume-title":"Detecting photographic composites of people","volume":"5041","author":"Johnson M. K.","year":"2008"},{"key":"S0219691322500515BIB028","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6845326"},{"issue":"1","key":"S0219691322500515BIB029","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s11265-019-01449-6","volume":"92","author":"Kobozeva A. A.","year":"2020","journal-title":"J. Signal Process. Syst."},{"issue":"2","key":"S0219691322500515BIB030","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TIFS.2010.2046268","volume":"5","author":"Li C.-T.","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"S0219691322500515BIB031","first-page":"730","volume-title":"10th Workshop Multimedia Signal Processing","author":"Li B,","year":"2008"},{"issue":"1","key":"S0219691322500515BIB032","doi-asserted-by":"crossref","first-page":"6729","DOI":"10.1109\/ACCESS.2019.2963745","volume":"8","author":"Liu Y.","year":"2020","journal-title":"IEEE Access"},{"key":"S0219691322500515BIB033","first-page":"201","volume-title":"IFIP International Conference on Digital Forensics","author":"Li Y.","year":"2019"},{"issue":"10","key":"S0219691322500515BIB034","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TIFS.2019.2902826","volume":"14","author":"Liu Y.","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"S0219691322500515BIB035","first-page":"362","volume-title":"Proc. Security, Steganography, and Watermarking of Multimedia Contents VIII","volume":"6072","author":"Lukas J.","year":"2006"},{"issue":"1","key":"S0219691322500515BIB036","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s11263-013-0688-y","volume":"110","author":"Lyu S.","year":"2014","journal-title":"Int. J. Comput. Vision"},{"issue":"2","key":"S0219691322500515BIB038","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/TIFS.2016.2623589","volume":"12","author":"Peng B.","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"S0219691322500515BIB039","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"Pevny T.","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"S0219691322500515BIB040","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/978-3-540-30114-1_10","volume-title":"6th Int. Workshop on Information Hiding","author":"Popescu A. C.","year":"2004"},{"issue":"1","key":"S0219691322500515BIB041","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.jvcir.2016.03.005","volume":"38","author":"Pun C.-M.","year":"2016","journal-title":"J. Vis. Comm. Image Represent."},{"issue":"1","key":"S0219691322500515BIB042","doi-asserted-by":"crossref","first-page":"25611","DOI":"10.1109\/ACCESS.2020.2970735","volume":"8","author":"Rao Y.","year":"2020","journal-title":"IEEE Access"},{"issue":"1","key":"S0219691322500515BIB043","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"Russakovsky O.","year":"2015","journal-title":"Int. J. Comput. Vision"},{"issue":"3","key":"S0219691322500515BIB044","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1049\/iet-ipr.2019.0842","volume":"14","author":"Selvaraj P.","year":"2020","journal-title":"IET Image Process."},{"key":"S0219691322500515BIB045","first-page":"309","volume-title":"Third Int. Conf. Multimedia Information Networking and Security","author":"Shen X.-J.","year":"2011"},{"issue":"4","key":"S0219691322500515BIB046","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s11265-019-01477-2","volume":"92","author":"Shi Z.","year":"2020","journal-title":"J. Signal Process. Syst."},{"issue":"1","key":"S0219691322500515BIB047","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/TIFS.2006.890307","volume":"2","author":"Swaminathan A","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"S0219691322500515BIB048","doi-asserted-by":"crossref","first-page":"108347","DOI":"10.1016\/j.patcog.2021.108347","volume":"122","author":"Wang X.","year":"2022","journal-title":"Pattern Recognit."},{"key":"S0219691322500515BIB049","first-page":"907","volume-title":"International Conference on Multimedia Information Networking and Security","author":"Wang J.","year":"2010"},{"key":"S0219691322500515BIB050","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.ins.2019.09.038","volume":"511","author":"Xiao B.","year":"2020","journal-title":"Inf. Sci."},{"key":"S0219691322500515BIB051","doi-asserted-by":"publisher","DOI":"10.1142\/S0219691319500504"},{"issue":"3","key":"S0219691322500515BIB052","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/LSP.2011.2182191","volume":"19","author":"Yao H.","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"S0219691322500515BIB053","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/TIFS.2010.2051666","volume":"5","author":"Zhang W.","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"S0219691322500515BIB054","doi-asserted-by":"crossref","first-page":"22223","DOI":"10.1007\/s11042-019-7408-8","volume":"78","author":"Zhang D.","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"S0219691322500515BIB055","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2896246"}],"container-title":["International Journal of Wavelets, Multiresolution and Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219691322500515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T08:06:06Z","timestamp":1672733166000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219691322500515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,19]]},"references-count":54,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["10.1142\/S0219691322500515"],"URL":"https:\/\/doi.org\/10.1142\/s0219691322500515","relation":{},"ISSN":["0219-6913","1793-690X"],"issn-type":[{"value":"0219-6913","type":"print"},{"value":"1793-690X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,19]]},"article-number":"2250051"}}