{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T15:12:03Z","timestamp":1777734723252,"version":"3.51.4"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Key Area R&D Program of Guangdong Province","award":["2018B030338001"],"award-info":[{"award-number":["2018B030338001"]}]},{"name":"Key Area R&D Program of Guangdong Province","award":["2018B010115002"],"award-info":[{"award-number":["2018B010115002"]}]},{"name":"Key Area R&D Program of Guangdong Province","award":["2018B010107003"],"award-info":[{"award-number":["2018B010107003"]}]},{"name":"Guangdong Education Department"},{"name":"the Guangdong University of Technology","award":["220413548"],"award-info":[{"award-number":["220413548"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The copy-move forgery refers to the copying and pasting of a region of the original image into the target region of the same image, which represents a typical tampering method with the characteristics of easy tampering and high-quality tampering. The existing single feature-based methods of forgery detection have certain shortcomings, such as high false alarm rate, low robustness, and low detection accuracy. To address these shortcomings, this paper proposes an improved two-stage detection method based on parallel feature fusion and an adaptive threshold generation algorithm. Firstly, the SLIC super-pixels segmentation algorithm is used for image preprocessing, and a similar region extraction algorithm without threshold is employed to obtain the suspected tampering regions with high similarity. Secondly, the parallel fusion feature is obtained based on the SIFT and HU features to express the characteristics of local regions. Then, the corresponding threshold value is generated based on the histogram of oriented gradient (HOG) to describe the texture characteristics of the obtained regions, which acts as a criterion to judge whether a region has been forged or not. The experimental results show that the proposed method outperforms the existing methods, achieving the accuracy of 99.01% and 98.5% on the MICC-F220 and MICC-F2000 datasets respectively. In addition, the proposed method has stronger robustness performance on COMOFOD dataset than the comparison methods.<\/jats:p>","DOI":"10.1186\/s13638-022-02112-8","type":"journal-article","created":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T10:13:27Z","timestamp":1648808007000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A two-stage detection method of copy-move forgery based on parallel feature fusion"],"prefix":"10.1186","volume":"2022","author":[{"given":"Wujian","family":"Ye","sequence":"first","affiliation":[]},{"given":"Qingyuan","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Yihang","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4044-4680","authenticated-orcid":false,"given":"Yijun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,1]]},"reference":[{"issue":"4","key":"2112_CR1","doi-asserted-by":"publisher","first-page":"2150054","DOI":"10.1142\/S0219467821500546","volume":"21","author":"SP Chalamalasetty","year":"2021","unstructured":"S.P. Chalamalasetty, S.R. Giduturi, Research perception towards copy-move image forgery detection: challenges and future directions. Int. J. Image Graph. 21(4), 2150054 (2021). https:\/\/doi.org\/10.1142\/S0219467821500546","journal-title":"Int. J. Image Graph."},{"issue":"2","key":"2112_CR2","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1049\/iet-ipr.2017.0441","volume":"12","author":"B Soni","year":"2018","unstructured":"B. Soni, P.K. Das, D.M. Thounaojam, CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. LET Image Process. 12(2), 67\u2013178 (2018). https:\/\/doi.org\/10.1049\/iet-ipr.2017.0441","journal-title":"LET Image Process."},{"key":"2112_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103032","volume":"113","author":"J Yang","year":"2021","unstructured":"J. Yang, Z. Liang, Y. Gan, J. Zhong, A novel copy-move forgery detection algorithm via two-stage filtering. Digit. Signal Process. 113, 103032 (2021). https:\/\/doi.org\/10.1016\/j.dsp.2021.103032","journal-title":"Digit. Signal Process."},{"key":"2112_CR4","doi-asserted-by":"publisher","first-page":"40550","DOI":"10.1109\/ACCESS.2019.2907316","volume":"7","author":"S Teerakanok","year":"2019","unstructured":"S. Teerakanok, T. Uhara, Copy-move forgery detection: a state-of-the-art technical review and analysis. IEEE Access 7, 40550\u201340568 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2907316","journal-title":"IEEE Access"},{"key":"2112_CR5","unstructured":"J. Fridrich, D. Soukal, J. Luk\u00e1\u0161, Detection of copy-move forgery in digital images, in Proceedings of Digital Forensic Research Workshop, pp. 1\u201310 (2003)"},{"issue":"1\u20133","key":"2112_CR6","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.forsciint.2013.09.013","volume":"233","author":"J Zhao","year":"2013","unstructured":"J. Zhao, J. Guo, Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci. Int. 233(1\u20133), 158\u2013166 (2013). https:\/\/doi.org\/10.1016\/j.forsciint.2013.09.013","journal-title":"Forensic Sci. Int."},{"key":"2112_CR7","unstructured":"A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions. Computer Science Technical Report. TR2004-515 (2004)"},{"key":"2112_CR8","doi-asserted-by":"publisher","unstructured":"W. Luo, J. Huang, G. Qiu, Robust detection of region-duplication forgery in digital image, in 18th International Conference on Pattern Recognition (ICPR'06), pp. 746\u2013749 (2006). https:\/\/doi.org\/10.1109\/ICPR.2006.1003","DOI":"10.1109\/ICPR.2006.1003"},{"issue":"1","key":"2112_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.diin.2012.04.004","volume":"9","author":"G Muhammad","year":"2012","unstructured":"G. Muhammad, M. Hussain, G. Bebis, Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1), 49\u201357 (2012). https:\/\/doi.org\/10.1016\/j.diin.2012.04.004","journal-title":"Digit. Investig."},{"issue":"8","key":"2112_CR10","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"S Ryu","year":"2013","unstructured":"S. Ryu, M. Kirchner, M. Lee, H. Lee, Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans. Inf. Forensics Secur. 8(8), 1355\u20131370 (2013). https:\/\/doi.org\/10.1109\/TIFS.2013.2272377","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"2112_CR11","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"D. Cozzolino, G. Poggi, L. Verdoliva, Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284\u20132297 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2455334","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2112_CR12","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s11071-015-2524-0","volume":"84","author":"Y Gan","year":"2016","unstructured":"Y. Gan, J. Zhong, Application of AFMT method for composite forgery detection. Nonlinear Dyn. 84, 341\u2013353 (2016). https:\/\/doi.org\/10.1007\/s11071-015-2524-0","journal-title":"Nonlinear Dyn."},{"issue":"7","key":"2112_CR13","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1109\/TPAMI.2009.119","volume":"32","author":"P Yap","year":"2010","unstructured":"P. Yap, X. Jiang, A.C. Kot, Two-dimensional polar harmonic transforms for invariant image representation. IEEE Trans. Pattern Anal. Mach. Intell. 32(7), 1259\u20131270 (2010). https:\/\/doi.org\/10.1109\/TPAMI.2009.119","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2112_CR14","doi-asserted-by":"publisher","first-page":"102536","DOI":"10.1016\/j.jisa.2020.102536","volume":"54","author":"Y Wang","year":"2020","unstructured":"Y. Wang, X. Kang, Y. Chen, Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. J. Inf. Secur. Appl. 54, 102536 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2020.102536","journal-title":"J. Inf. Secur. Appl."},{"key":"2112_CR15","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.forsciint.2018.12.004","volume":"295","author":"NBA Warif","year":"2019","unstructured":"N.B.A. Warif, M.Y.I. Idris, A.W.A. Wahab, R. Salleh, A. Ismail, CMF-iteMS: an automatic threshold selection for detection of copy-move forgery. Forensic Sci. Int. 295, 83\u201399 (2019). https:\/\/doi.org\/10.1016\/j.forsciint.2018.12.004","journal-title":"Forensic Sci. Int."},{"key":"2112_CR16","doi-asserted-by":"publisher","unstructured":"T. Das, R. Hasan, M.R. Azam, J. Uddin, A robust method for detecting copy-move image forgery using stationary wavelet transform and scale invariant feature transform, in 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2), pp. 1\u20134 (2018). https:\/\/doi.org\/10.1109\/IC4ME2.2018.8465668","DOI":"10.1109\/IC4ME2.2018.8465668"},{"issue":"3","key":"2112_CR17","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, G. Serra, A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011). https:\/\/doi.org\/10.1109\/TIFS.2011.2129512","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2112_CR18","doi-asserted-by":"publisher","unstructured":"H. Huang, W. Guo, Y. Zhang, Detection of copy-move forgery in digital images using SIFT algorithm, in 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, pp. 272\u2013276 (2008). https:\/\/doi.org\/10.1109\/PACIIA.2008.240","DOI":"10.1109\/PACIIA.2008.240"},{"key":"2112_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","volume":"29","author":"E Silva","year":"2015","unstructured":"E. Silva, T. Carvalho, A. Ferreira, A. Rocha, Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J. Vis. Commun. Image Represent. 29, 16\u201332 (2015). https:\/\/doi.org\/10.1016\/j.jvcir.2015.01.016","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"6","key":"2112_CR20","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, L.D. Tongo, G. Serra, Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process. Image Commun. 28(6), 659\u2013669 (2013). https:\/\/doi.org\/10.1016\/j.image.2013.03.006","journal-title":"Signal Process. Image Commun."},{"key":"2112_CR21","doi-asserted-by":"publisher","unstructured":"M.R. Resmi, S. Vishnukumar, A novel segmentation based copy-move forgery detection in digital images, in 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), pp. 346\u2013350 (2017). https:\/\/doi.org\/10.1109\/NETACT.2017.8076793","DOI":"10.1109\/NETACT.2017.8076793"},{"key":"2112_CR22","doi-asserted-by":"publisher","unstructured":"B. Xu, J. Wang, G. Liu, Y. Dai, Image copy-move forgery detection based on SURF, in 2010 International Conference on Multimedia Information Networking and Security, pp. 889\u2013892 (2010). https:\/\/doi.org\/10.1109\/MINES.2010.189","DOI":"10.1109\/MINES.2010.189"},{"key":"2112_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.jisa.2019.01.007","volume":"45","author":"B Soni","year":"2019","unstructured":"B. Soni, P.K. Das, D.M. Thounaojama, Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features. J. Inf. Secur. Appl. 45, 44\u201351 (2019). https:\/\/doi.org\/10.1016\/j.jisa.2019.01.007","journal-title":"J. Inf. Secur. Appl."},{"key":"2112_CR24","doi-asserted-by":"publisher","unstructured":"A. Shahroudnejad, M. Rahmati, Copy-move forgery detection in digital images using affine-SIFT, in 2016 2nd International Conference of Signal Processing and Intelligent Systems (ICSPIS), pp. 1\u20135 (2016). https:\/\/doi.org\/10.1109\/ICSPIS.2016.7869896","DOI":"10.1109\/ICSPIS.2016.7869896"},{"issue":"4","key":"2112_CR25","first-page":"804","volume":"4","author":"R Kaur","year":"2016","unstructured":"R. Kaur, A. Kaur, Copy-move forgery detection using ORB and SIFT detector. Int. J. Eng. Dev. Res. 4(4), 804\u2013813 (2016)","journal-title":"Int. J. Eng. Dev. Res."},{"key":"2112_CR26","doi-asserted-by":"publisher","first-page":"619564, 1\u201312","DOI":"10.1155\/2013\/619564","volume":"2013","author":"J Zhao","year":"2013","unstructured":"J. Zhao, W. Zhao, Passive forensics for region duplication image forgery based on Harris feature points and local binary patterns. Math. Probl. Eng. 2013, 619564, 1\u201312 (2013). https:\/\/doi.org\/10.1155\/2013\/619564","journal-title":"Math. Probl. Eng."},{"key":"2112_CR27","doi-asserted-by":"publisher","first-page":"23419","DOI":"10.1007\/s11042-020-10241-9","volume":"80","author":"G Tahaoglu","year":"2021","unstructured":"G. Tahaoglu, G. Ulutas, B. Ustubioglu, V.V. Nabiyev, Improved copy move forgery detection method via L* a* b* color space and enhanced localization technique. Multimed. Tools Appl. 80, 23419\u201323456 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10241-9","journal-title":"Multimed. Tools Appl."},{"key":"2112_CR28","doi-asserted-by":"publisher","unstructured":"Y. Wu, W. Abd-Almageed, P. Natarajan, Deep matching and validation network: an end-to-end solution to constrained image splicing localization and detection, in The 25th ACM international conference on Multimedia (MM '17) (Association for Computing Machinery, 2017), pp. 1480\u20131502. https:\/\/doi.org\/10.1145\/3123266.3123411","DOI":"10.1145\/3123266.3123411"},{"key":"2112_CR29","doi-asserted-by":"crossref","unstructured":"Y. Wu, W. Abd-Almageed, P. Natarajan, BusterNet: detecting copy-move image forgery with source\/target localization, in The 15th European Conference on Computer Vision (ECCV), pp. 168\u2013184 (2018)","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"2112_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11063-021-10620-9","volume":"54","author":"AK Jaiswal","year":"2021","unstructured":"A.K. Jaiswal, R. Srivastava, Detection of copy-move forgery in digital image using multi-scale, multi-stage deep learning model. Neural Process. Lett. 54, 1\u201326 (2021). https:\/\/doi.org\/10.1007\/s11063-021-10620-9","journal-title":"Neural Process. Lett."},{"key":"2112_CR31","doi-asserted-by":"publisher","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","volume":"77","author":"Y Liu","year":"2018","unstructured":"Y. Liu, Q. Guan, X. Zhao, Copy-move forgery detection based on convolutional kernel network. Multimed. Tools Appl. 77, 18269\u201318293 (2018). https:\/\/doi.org\/10.1007\/s11042-017-5374-6","journal-title":"Multimed. Tools Appl."},{"key":"2112_CR32","doi-asserted-by":"publisher","unstructured":"K. Sunitha, A.N. Krishna, Efficient keypoint based copy move forgery detection method using hybrid feature extraction, in The 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (2020). https:\/\/doi.org\/10.1109\/ICIMIA48430.2020.9074951","DOI":"10.1109\/ICIMIA48430.2020.9074951"},{"issue":"2","key":"2112_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3788\/LOP202259.0211001","volume":"59","author":"Y Peng","year":"2022","unstructured":"Y. Peng, W. Ye, Y. Liu, Copy-move tampered image detection based on progressive hybrid features. Laser Optoelectron. Prog. 59(2), 1\u201315 (2022). https:\/\/doi.org\/10.3788\/LOP202259.0211001","journal-title":"Laser Optoelectron. Prog."},{"key":"2112_CR34","doi-asserted-by":"publisher","unstructured":"U.A. Khan, M.A. Kaloi, Z.A. Shaikh, A.A. Arain, A hybrid technique for copy-move image forgery detection, in The 3rd International Conference on Computer and Communication Systems (ICCCS), pp. 212\u2013216 (2018). https:\/\/doi.org\/10.1109\/CCOMS.2018.8463337","DOI":"10.1109\/CCOMS.2018.8463337"},{"key":"2112_CR35","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ins.2018.06.040","volume":"463\u2013464","author":"C Pun","year":"2018","unstructured":"C. Pun, J. Chung, A two-stage localization for copy-move forgery detection. Inf. Sci. 463\u2013464, 33\u201355 (2018). https:\/\/doi.org\/10.1016\/j.ins.2018.06.040","journal-title":"Inf. Sci."},{"issue":"8","key":"2112_CR36","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"C Pun","year":"2015","unstructured":"C. Pun, X.X. Yuan, Bi image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans. Inf. Forensics Secur. 10(8), 1705\u20131716 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2423261","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2112_CR37","unstructured":"D. Tralic, I. Zupancic, S. Grgic, M. Grgic, CoMoFoD\u2014new database for copy-move forgery detection, in The 55th International Symposium ELMAR, pp. 49\u201354 (2013)"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-022-02112-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-022-02112-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-022-02112-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T14:25:11Z","timestamp":1648823111000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-022-02112-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["2112"],"URL":"https:\/\/doi.org\/10.1186\/s13638-022-02112-8","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,1]]},"assertion":[{"value":"25 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Ethical approval was obtained from the Ethics Committee of Guangdong University of Technology. And the datasets are publicly available on the Internet.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"30"}}