Open Access
Issue
EPJ Web Conf.
Volume 341, 2025
2nd International Conference on Advent Trends in Computational Intelligence and Communication Technologies (ICATCICT 2025)
Article Number 01042
Number of page(s) 10
DOI https://doi.org/10.1051/epjconf/202534101042
Published online 20 November 2025
  1. R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega-Garcia, "DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection," Information Fusion, vol. 64, pp. 131-148 (2020) [CrossRef] [Google Scholar]
  2. A. Diwan, R. Mahadeva, and V. Gupta, "Advancing Copy-Move Manipulation Detection in Complex Image Scenarios Through Multiscale Detector," IEEE Access, vol. 12, pp. 64736-64753 (2024). [Google Scholar]
  3. Y. Liu et al., "CMFDFormer: Transformer-based Copy-Move Forgery Detection with Continual Learning," arXiv preprint, arXiv:2311.13263 (2023) [Google Scholar]
  4. A. Dosovitskiy et al., "An image is worth 16x16 words: Transformers for image recognition at scale," in Proc. Int. Conf. Learning Representations (ICLR), (2021) [Google Scholar]
  5. S. Hochreiter and J. Schmidhuber, "Long Short-Term Memory," in Neural Computation, vol. 9, no. 8, pp. 1735-1780, 15 Nov. (1997) 10.1162/neco.1997.9.8.1735. [Google Scholar]
  6. Liu, Y., Xia, C., Xiao, S., Guan, Q., Dong, W., Zhang, Y., & Yu, N.H. CMFDFormer: Transformer-based Copy-Move Forgery Detection with Continual Learning. (2023) ArXiv, abs/2311.13263. [Google Scholar]
  7. A. Diwan, R. Mahadeva and V. Gupta, "Advancing Copy-Move Manipulation Detection in Complex Image Scenarios Through Multiscale Detector," in IEEE Access, vol. 12, pp. 64736-64753 (2024) 10.1109/ACCESS.2024.3397466. [Google Scholar]
  8. N. Dhiman, H. Singh and A. Thakur, "An Efficient Approach for Image Forgery Detection Using Deep Convolutional Neural Network," International Conference on Electrical, Electronics, Communication and Computers (ELEXCOM), Roorkee, India, pp. 1-5 (2023) 10.1109/ELEXCOM58812.2023.10370304 [Google Scholar]
  9. K. M. Hosny, A. M. Mortda, M. M. Fouda and N. A. Lashin, "An Efficient CNN Model to Detect Copy-Move Image Forgery," in IEEE Access, vol. 10, pp. 4862248632 (2022) 10.1109/ACCESS.2022.3172273. [Google Scholar]
  10. Chaitra B, P.V. Bhaskar Reddy, An approach for copy-move image multiple forgery detection based on an optimized pre-trained deep learning model, Knowledge-Based Systems, Volume 269, (2023), 110508, ISSN 0950-7051, https://doi.org/10.1016/j.knosys.2023.110508. [Google Scholar]
  11. Fu, G.; Zhang, Y.; Wang, Y. Image Copy-Move Forgery Detection Based on Fused Features and Density Clustering. Appl. Sci. 13, 7528 (2023) https://doi.org/10.3390/app13137528 [Google Scholar]
  12. A. Diwan and A. K. Roy, "CNN-Keypoint Based Two-Stage Hybrid Approach for Copy-Move Forgery Detection," in IEEE Access, vol. 12, pp. 43809-43826, (2024) doi: 10.1109/ACCESS.2024.3380460. [Google Scholar]
  13. S. Teerakanok and T. Uehara, "Copy-Move Forgery Detection: A State-of-the-Art Technical Review and Analysis," in IEEE Access, vol. 7, pp. 40550-40568, (2019) doi: 10.1109/ACCESS.2019.2907316. [Google Scholar]
  14. S., S. ., & G. K., R. K. Optimization of Copy Move Forgery Detection with Region Selection Based on Domain Specific Characteristics. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 693-702 (2023) [Google Scholar]
  15. A. H. Khalil, A. Z. Ghalwash, H.A.-G. Elsayed, G.I. Salama and H.A. Ghalwash, "Enhancing Digital Image Forgery Detection Using Transfer Learning," in IEEE Access, vol. 11, pp. 91583-91594, (2023) doi: 10.1109/ACCESS.2023.3307357. [Google Scholar]
  16. U. Diaa, "A Deep Learning Model to Inspect Image Forgery on SURF Keypoints of SLIC Segmented Regions", Eng. Technol. Appl. Sci. Res., vol. 14, no. 1, pp. 1254912555, Feb. (2024) [Google Scholar]
  17. Devasis Pradhan, P. K. Sahu, N.S. Goje, M.M. Ghonge, H.M. Tun, R. Rajeswari, and S. Pramanik, "Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN)," in Cyber Security and Network Security, Wiley, 2022, pp.193-216, doi: 10.1002/9781119812555.ch9. [Google Scholar]
  18. Pranshav Gajjar, Aayush Saxena, Het Shah, Nandish Kikani, Karan Lakhani, Pooja Shah, Ankit Sharma, and Krishn Limbachiya, "Copy Move Forgery Detection: The Current Implications and Contemporary Practices," in Journal of Physics: Conference Series, vol. 2325, no. 1, p. 012050, Aug. (2022) doi: 10.1088/17426596/2325/1/012050. [Google Scholar]
  19. Barglazan, A.-A.; Brad, R.; Constantinescu, C. Image Inpainting Forgery Detection: A Review. J. Imaging (2024), 10, 42. https://doi.org/10.3390/jimaging10020042 [Google Scholar]
  20. Shi, C.; Chen, L.; Wang, C.; Zhou, X.; Qin, Z. Review of Image Forensic Techniques Based on Deep Learning. Mathematics (2023), 11, 3134. https://doi.org/10.3390/math11143134 [Google Scholar]
  21. M. Maashi et al., "Modeling of Reptile Search Algorithm With Deep Learning Approach for Copy Move Image Forgery Detection," in IEEE Access, vol. 11, pp. 87297-87304, (2023) doi: 10.1109/ACCESS.2023.3304237. [Google Scholar]
  22. J. Rao, S. Teerakanok and T. Uehara, "ResTran: Long Distance Relationship on Image Forgery Detection," in IEEE Access, vol. 11, pp. 120492-120501, (2023) doi: 10.1109/ACCESS.2023.3327761. [Google Scholar]
  23. Chakraborty, S., Chatterjee, K. & Dey, P. Detection of Image Tampering Using Deep Learning, Error Levels and Noise Residuals. Neural Process Lett 56, 112 (2024). https://doi.org/10.1007/s11063-024-11448-9 [Google Scholar]
  24. Zhao, K.; Yuan, X.; Xie, Z.; Xiang, Y.; Huang, G.; Feng, L SPA-Net: A Deep Learning Approach Enhanced Using a Span-Partial Structure and Attention Mechanism for Image Copy-Move Forgery Detection. Sensors 23, 6430 (2023). https://doi.org/10.3390/s23146430 [Google Scholar]
  25. N. T. Pham and C.-S. Park, "Toward Deep-Learning-Based Methods in Image Forgery Detection: A Survey," in IEEE Access, vol. 11, pp. 11224-11237 (2023) doi: 10.1109/ACCESS.2023.32 [Google Scholar]
  26. Rodriguez-Ortega Y, Ballesteros DM, Renza D. Copy-Move Forgery Detection (CMFD) Using Deep Learning for Image and Video Forensics. Journal of Imaging. 7(3):59 (2021). https://doi.org/10.3390/jimaging7030059 [Google Scholar]
  27. Tahaoglu, Gul & Ulutas, Guzin. A new deep learning-based method to detection of copy-move forgery in digital images. 1-4 (2019) 10.1109/EBBT.2019.8741657. [Google Scholar]
  28. Kaur, N., Jindal, N. & Singh, K. A deep learning framework for copy-move forgery detection in digital images. Multimed Tools Appl 82, 17741-17768 (2023). https://doi.org/10.1007/s11042-022-14016-2 [Google Scholar]
  29. T. Nazir, M. Nawaz, M. Masood, and A. Javed, "Copy move forgery detection and segmentation using improved mask region-based convolution network (RCNN)," Appl. Soft Comput., vol. 131, p. 109778, 2022, doi: 10.1016/j.asoc.2022.109778. [Google Scholar]
  30. S. Vathana, "CASIA dataset," Kaggle, (2024) [Online]. Available: https://www.kaggle.com/datasets/sophatvathana/casia-dataset/data. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.