{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:52:08Z","timestamp":1775170328177,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"14","license":[{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research Project of the Macao Polytechnic University","award":["RP\/ESCA-03\/2021"],"award-info":[{"award-number":["RP\/ESCA-03\/2021"]}]},{"name":"Research Project of the Macao Polytechnic University","award":["0045\/2022\/A"],"award-info":[{"award-number":["0045\/2022\/A"]}]},{"DOI":"10.13039\/501100006469","name":"Science and Technology Development Fund of Macau SAR","doi-asserted-by":"publisher","award":["RP\/ESCA-03\/2021"],"award-info":[{"award-number":["RP\/ESCA-03\/2021"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006469","name":"Science and Technology Development Fund of Macau SAR","doi-asserted-by":"publisher","award":["0045\/2022\/A"],"award-info":[{"award-number":["0045\/2022\/A"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the wide application of visual sensors and development of digital image processing technology, image copy-move forgery detection (CMFD) has become more and more prevalent. Copy-move forgery is copying one or several areas of an image and pasting them into another part of the same image, and CMFD is an efficient means to expose this. There are improper uses of forged images in industry, the military, and daily life. In this paper, we present an efficient end-to-end deep learning approach for CMFD, using a span-partial structure and attention mechanism (SPA-Net). The SPA-Net extracts feature roughly using a pre-processing module and finely extracts deep feature maps using the span-partial structure and attention mechanism as a SPA-net feature extractor module. The span-partial structure is designed to reduce the redundant feature information, while the attention mechanism in the span-partial structure has the advantage of focusing on the tamper region and suppressing the original semantic information. To explore the correlation between high-dimension feature points, a deep feature matching module assists SPA-Net to locate the copy-move areas by computing the similarity of the feature map. A feature upsampling module is employed to upsample the features to their original size and produce a copy-move mask. Furthermore, the training strategy of SPA-Net without pretrained weights has a balance between copy-move and semantic features, and then the module can capture more features of copy-move forgery areas and reduce the confusion from semantic objects. In the experiment, we do not use pretrained weights or models from existing networks such as VGG16, which would bring the limitation of the network paying more attention to objects other than copy-move areas.To deal with this problem, we generated a SPANet-CMFD dataset by applying various processes to the benchmark images from SUN and COCO datasets, and we used existing copy-move forgery datasets, CMH, MICC-F220, MICC-F600, GRIP, Coverage, and parts of USCISI-CMFD, together with our generated SPANet-CMFD dataset, as the training set to train our model. In addition, the SPANet-CMFD dataset could play a big part in forgery detection, such as deepfakes. We employed the CASIA and CoMoFoD datasets as testing datasets to verify the performance of our proposed method. The Precision, Recall, and F1 are calculated to evaluate the CMFD results. Comparison results showed that our model achieved a satisfactory performance on both testing datasets and performed better than the existing methods.<\/jats:p>","DOI":"10.3390\/s23146430","type":"journal-article","created":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T01:06:36Z","timestamp":1689555996000},"page":"6430","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["SPA-Net: A Deep Learning Approach Enhanced Using a Span-Partial Structure and Attention Mechanism for Image Copy-Move Forgery Detection"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3436-2249","authenticated-orcid":false,"given":"Kaiqi","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macao 999078, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7490-6695","authenticated-orcid":false,"given":"Xiaochen","family":"Yuan","sequence":"additional","affiliation":[{"name":"Faculty of Applied Sciences, Macao Polytechnic University, Macao 999078, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4608-6895","authenticated-orcid":false,"given":"Zhiyao","family":"Xie","sequence":"additional","affiliation":[{"name":"Faculty of Applied Sciences, Macao Polytechnic University, Macao 999078, China"}]},{"given":"Yan","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macao 999078, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3640-3229","authenticated-orcid":false,"given":"Guoheng","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6172-8650","authenticated-orcid":false,"given":"Li","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macao 999078, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,7,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/TIFS.2006.890307","article-title":"Nonintrusive component forensics of visual sensors using output images","volume":"2","author":"Swaminathan","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Yao, H., Xu, M., Qiao, T., Wu, Y., and Zheng, N. (2020). Image forgery detection and localization via a reliability fusion map. Sensors, 20.","DOI":"10.3390\/s20226668"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Pu, H., Huang, T., Weng, B., Ye, F., and Zhao, C. (2021). Overcome the Brightness and Jitter Noises in Video Inter-Frame Tampering Detection. Sensors, 21.","DOI":"10.3390\/s21123953"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Seo, Y., and Kook, J. (2023). DRRU-Net: DCT-Coefficient-Learning RRU-Net for Detecting an Image-Splicing Forgery. Appl. Sci., 13.","DOI":"10.3390\/app13052922"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Lin, Y.K., and Yen, T.Y. (2023). A Meta-Learning Approach for Few-Shot Face Forgery Segmentation and Classification. Sensors, 23.","DOI":"10.3390\/s23073647"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/TIFS.2012.2188390","article-title":"Exposing postprocessed copy\u2013paste forgeries through transform-invariant features","volume":"7","author":"Kakar","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Farid, H. (2006, January 26\u201327). Exposing digital forgeries in scientific images. Proceedings of the 8th Workshop on Multimedia and Security, Geneva, Switzerland.","DOI":"10.1145\/1161366.1161374"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.3724\/SP.J.1004.2009.01488","article-title":"Fast and robust forensics for image region-duplication forgery","volume":"35","author":"Wang","year":"2009","journal-title":"Acta Autom. Sin."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","article-title":"Rotation invariant localization of duplicated image regions based on Zernike moments","volume":"8","author":"Ryu","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"3812","DOI":"10.1093\/nar\/gkg509","article-title":"SIFT: Predicting amino acid changes that affect protein function","volume":"31","author":"Ng","year":"2003","journal-title":"Nucleic Acids Res."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Huang, H., Guo, W., and Zhang, Y. (2008, January 19\u201320). Detection of copy-move forgery in digital images using SIFT algorithm. Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China.","DOI":"10.1109\/PACIIA.2008.240"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"18293","DOI":"10.1007\/s11042-019-7165-8","article-title":"Rotational copy-move forgery detection using SIFT and region growing strategies","volume":"78","author":"Chen","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"23535","DOI":"10.1007\/s11042-019-7629-x","article-title":"Detection of copy-move forgery using AKAZE and SIFT keypoint extraction","volume":"78","author":"Prakash","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1007\/s11045-019-00688-x","article-title":"A fast and high accurate image copy-move forgery detection approach","volume":"31","author":"Wang","year":"2020","journal-title":"Multidimens. Syst. Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1007\/11744023_32","article-title":"Surf: Speeded up robust features","volume":"3951","author":"Bay","year":"2006","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Ng, T.T., Wen, B., Shen, X., and Li, B. (2017, January 4\u20136). Copy-move forgery detection in the presence of similar but genuine objects. Proceedings of the 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP), Singapore.","DOI":"10.1109\/SIPROCESS.2017.8124499"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Rao, Y., and Ni, J. (2016, January 4\u20137). A deep learning approach to detection of splicing and copy-move forgeries in images. Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., and Natarajan, P. (2018, January 8\u201314). Busternet: Detecting copy-move image forgery with source\/target localization. Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany.","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., and Natarajan, P. (2018, January 12\u201325). Image copy-move forgery detection via an end-to-end deep neural network. Proceedings of the 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), Lake Tahoe, NV, USA.","DOI":"10.1109\/WACV.2018.00211"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2134","DOI":"10.1109\/TIFS.2019.2957693","article-title":"An end-to-end dense-inceptionnet for image copy-move forgery detection","volume":"15","author":"Zhong","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"6714","DOI":"10.1109\/TII.2020.2982705","article-title":"AR-Net: Adaptive attention and residual refinement network for copy-move forgery detection","volume":"16","author":"Zhu","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"11259","DOI":"10.1007\/s11042-022-11974-5","article-title":"An efficient approach for copy-move image forgery detection using convolution neural network","volume":"81","author":"Koul","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Xiao, J., Hays, J., Ehinger, K.A., Oliva, A., and Torralba, A. (2010, January 13\u201318). Sun database: Large-scale scene recognition from abbey to zoo. Proceedings of the 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Francisco, CA, USA.","DOI":"10.1109\/CVPR.2010.5539970"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., Doll\u00e1r, P., and Zitnick, C.L. (2014, January 6\u201312). Microsoft coco: Common objects in context. Proceedings of the Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland. Proceedings, Part V 13.","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wang, C.Y., Liao, H.Y.M., Wu, Y.H., Chen, P.Y., Hsieh, J.W., and Yeh, I.H. (2020, January 14\u201319). CSPNet: A new backbone that can enhance learning capability of CNN. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, Seattle, WA, USA.","DOI":"10.1109\/CVPRW50498.2020.00203"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., and Sun, G. (2018, January 18\u201323). Squeeze-and-excitation networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref_28","unstructured":"Tan, M., and Le, Q. (2019, January 9\u201315). Efficientnet: Rethinking model scaling for convolutional neural networks. Proceedings of the International Conference on Machine Learning. PMLR, Long Beach, CA, USA."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., and Natarajan, P. (2017, January 23\u201327). Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. Proceedings of the 25th ACM International Conference on Multimedia, Mountain View, CA, USA.","DOI":"10.1145\/3123266.3123411"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","article-title":"An evaluation of popular copy-move forgery detection approaches","volume":"7","author":"Christlein","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","article-title":"Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes","volume":"29","author":"Silva","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","article-title":"A sift-based forensic method for copy\u2013move attack detection and transformation recovery","volume":"6","author":"Amerini","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","article-title":"Copy-move forgery detection and localization by means of robust clustering with J-Linkage","volume":"28","author":"Amerini","year":"2013","journal-title":"Signal Process. Image Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","article-title":"Efficient dense-field copy\u2013move forgery detection","volume":"10","author":"Cozzolino","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., and Winkler, S. (2016, January 25\u201328). COVERAGE\u2014A novel database for copy-move forgery detection. Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, USA.","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"11513","DOI":"10.1007\/s11042-015-2872-2","article-title":"PCET based copy-move forgery detection in images under geometric transforms","volume":"75","author":"Emam","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","article-title":"Image forgery detection using adaptive oversegmentation and feature point matching","volume":"10","author":"Pun","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_38","first-page":"507","article-title":"Segmentation-based image copy-move forgery detection scheme","volume":"10","author":"Li","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., and Tan, T. (2013, January 6\u201310). Casia image tampering detection evaluation database. Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China.","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"ref_40","unstructured":"Tralic, D., Zupancic, I., Grgic, S., and Grgic, M. (2013, January 25\u201327). CoMoFoD\u2014New database for copy-move forgery detection. Proceedings of the Proceedings ELMAR-2013, Zadar, Croatia."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/14\/6430\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:12:34Z","timestamp":1760127154000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/14\/6430"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,15]]},"references-count":40,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2023,7]]}},"alternative-id":["s23146430"],"URL":"https:\/\/doi.org\/10.3390\/s23146430","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,15]]}}}