{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:28:46Z","timestamp":1777854526862,"version":"3.51.4"},"reference-count":31,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Prince Sultan University, Riyadh Saudi Arabia","award":["[SEED-CCIS-2020{23}]"],"award-info":[{"award-number":["[SEED-CCIS-2020{23}]"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:p>Image tempering is one of the significant issues in the modern era. The use of powerful tools for image editing with advanced technology and its widespread on social media raised questions on data integrity. Currently, the protection of images is uncertain and a severe concern, mainly when it transfers over the Internet. Thus, it is essential to detect an anomaly in images through artificial intelligence techniques. The simple way of image forgery is called copy-move, where a part of an image is replicated in the same image to hide unwanted content of the image. However, image processing through handcrafted features usually looks for pattern concerns with duplicate content, limiting their employment for huge data classification. On the other side, deep learning approaches achieve promising results, but their performance depends on training data with fine-tuning of hyperparameters. Thus, we proposed a custom convolutional neural network (CNN) architecture with a pre-trained model ResNet101 through a transfer learning approach. For this purpose, both models are trained on five different datasets. In both cases, the impact of the model is evaluated through accuracy, precision, recall, F-score and achieved the highest 98.4% accuracy using the Coverage dataset.<\/jats:p>","DOI":"10.1177\/01655515211050024","type":"journal-article","created":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T06:37:37Z","timestamp":1639463857000},"page":"1325-1334","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["Copy-move image forged information detection and localisation in digital images using deep convolutional network"],"prefix":"10.1177","volume":"49","author":[{"given":"Tanzila","family":"Saba","sequence":"first","affiliation":[{"name":"Artificial Intelligence & Data Analytics Lab, CCIS, Prince Sultan University, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3817-2655","authenticated-orcid":false,"given":"Amjad","family":"Rehman","sequence":"additional","affiliation":[{"name":"Artificial Intelligence & Data Analytics Lab, CCIS, Prince Sultan University, Saudi Arabia"}]},{"given":"Tariq","family":"Sadad","sequence":"additional","affiliation":[{"name":"Department of CS & SE, International Islamic University, Islamabad, Pakistan"}]},{"given":"Zahid","family":"Mehmood","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Engineering and Technology, Taxila, Pakistan"}]}],"member":"179","published-online":{"date-parts":[[2021,12,14]]},"reference":[{"key":"bibr1-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068897"},{"key":"bibr2-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1080\/00450618.2020.1715479"},{"key":"bibr3-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2000.879336"},{"key":"bibr4-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.03.015"},{"key":"bibr5-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2663-3"},{"key":"bibr6-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04238-2"},{"key":"bibr7-01655515211050024","first-page":"561","volume-title":"2019 2nd international conference on power energy environment and intelligent control (PEEIC)","author":"Thakur R"},{"key":"bibr8-01655515211050024","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-191700"},{"key":"bibr9-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106685"},{"key":"bibr10-01655515211050024","first-page":"102481","volume":"52","author":"Meena KB","year":"2020","journal-title":"J Inf Secur Appl"},{"key":"bibr11-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1002\/jemt.22646"},{"key":"bibr12-01655515211050024","first-page":"102510","volume":"54","author":"Gani G","year":"2020","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"bibr13-01655515211050024","first-page":"159","volume":"3","author":"Alberry HA","year":"2018","journal-title":"Futur Comput Inf J"},{"key":"bibr14-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116433"},{"key":"bibr15-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102966"},{"key":"bibr16-01655515211050024","volume-title":"Proceedings of the 2016 IEEE international Workshop on Information Forensics and Security (WIFS)","author":"Rao Y"},{"key":"bibr17-01655515211050024","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7030059"},{"key":"bibr18-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2013-0010"},{"key":"bibr19-01655515211050024","volume-title":"Proceedings of the 2019 scientific meeting on electrical-electronics and biomedical engineering and computer science (EBBT)","author":"Muzaffer G"},{"key":"bibr20-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08495-z"},{"key":"bibr21-01655515211050024","first-page":"770","volume-title":"Proceedings of the IEEE Computer Society conference on computer vision and pattern recognition","author":"He K"},{"key":"bibr22-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2019.104864"},{"key":"bibr23-01655515211050024","unstructured":"Castro M, Ballesteros L DM, Renza D. Original and tampered images (color and grayscale), 2019, https:\/\/data.mendeley.com\/datasets\/dk84bmnyw9\/2"},{"key":"bibr24-01655515211050024","first-page":"161","volume-title":"Proceedings of the International Conference on Image Processing (ICIP)","author":"Wen B"},{"key":"bibr25-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"bibr26-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2445742"},{"key":"bibr27-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2014-112"},{"key":"bibr28-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9636-0"},{"key":"bibr29-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2014-0007"},{"key":"bibr30-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2362-y"},{"key":"bibr31-01655515211050024","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974804"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211050024","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/01655515211050024","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/01655515211050024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:26Z","timestamp":1777504166000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/01655515211050024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,14]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["10.1177\/01655515211050024"],"URL":"https:\/\/doi.org\/10.1177\/01655515211050024","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,14]]}}}