{"id":"https://openalex.org/W4385819677","doi":"https://doi.org/10.1109/access.2023.3304728","title":"Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture","display_name":"Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385819677","doi":"https://doi.org/10.1109/access.2023.3304728"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3304728","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3304728","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10216281.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10216281.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075804313","display_name":"Anjali Diwan","orcid":"https://orcid.org/0000-0002-2322-7780"},"institutions":[{"id":"https://openalex.org/I3132999081","display_name":"Marwadi University","ror":"https://ror.org/030dn1812","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132999081"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Anjali Diwan","raw_affiliation_strings":["Department of CE-AI, Marwadi University, Rajkot, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Department of CE-AI, Marwadi University, Rajkot, Gujarat, India","institution_ids":["https://openalex.org/I3132999081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089608785","display_name":"Dinesh Kumar","orcid":"https://orcid.org/0000-0002-2122-5845"},"institutions":[{"id":"https://openalex.org/I3132999081","display_name":"Marwadi University","ror":"https://ror.org/030dn1812","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132999081"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dinesh Kumar","raw_affiliation_strings":["Department of CE-AI, Marwadi University, Rajkot, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Department of CE-AI, Marwadi University, Rajkot, Gujarat, India","institution_ids":["https://openalex.org/I3132999081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083628749","display_name":"Rajesh Mahadeva","orcid":"https://orcid.org/0000-0001-8952-7172"},"institutions":[{"id":"https://openalex.org/I154851008","display_name":"Indian Institute of Technology Roorkee","ror":"https://ror.org/00582g326","country_code":"IN","type":"education","lineage":["https://openalex.org/I154851008"]},{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE","IN"],"is_corresponding":false,"raw_author_name":"Rajesh Mahadeva","raw_affiliation_strings":["Department of Physics, Khalifa University, Abu Dhabi, United Arab Emirates","Department of Polymer and Process Engineering, Indian Institute of Technology, Roorkee, India"],"affiliations":[{"raw_affiliation_string":"Department of Physics, Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Department of Polymer and Process Engineering, Indian Institute of Technology, Roorkee, India","institution_ids":["https://openalex.org/I154851008"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048685854","display_name":"H. C. S. Perera","orcid":"https://orcid.org/0000-0001-8644-7396"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"H. C. S. Perera","raw_affiliation_strings":["Department of Physics, Khalifa University, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Physics, Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056029451","display_name":"Janaka Alawatugoda","orcid":"https://orcid.org/0000-0001-9431-5836"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]},{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE","AU"],"is_corresponding":false,"raw_author_name":"Janaka Alawatugoda","raw_affiliation_strings":["Research Innovation Centers Division, Faculty of Resilience, Rabdan Academy, Abu Dhabi, United Arab Emirates","Institute for Integrated and Intelligent Systems, Griffith University, Nathan, Qld, Australia","Faculty of Resilience, Research Innovation Centers Division, Rabdan Academy, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Research Innovation Centers Division, Faculty of Resilience, Rabdan Academy, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]},{"raw_affiliation_string":"Institute for Integrated and Intelligent Systems, Griffith University, Nathan, Qld, Australia","institution_ids":["https://openalex.org/I11701301"]},{"raw_affiliation_string":"Faculty of Resilience, Research Innovation Centers Division, Rabdan Academy, Abu Dhabi, United Arab Emirates","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5075804313"],"corresponding_institution_ids":["https://openalex.org/I3132999081"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.6524,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91854642,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":null,"first_page":"86132","last_page":"86148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13114","display_name":"Image Processing Techniques and Applications","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8147766590118408},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7296198606491089},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6610535383224487},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.5171403288841248},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4461984634399414},{"id":"https://openalex.org/keywords/scale-invariant-feature-transform","display_name":"Scale-invariant feature transform","score":0.44074922800064087},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4392474293708801},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.42021384835243225},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4121853709220886},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4075252115726471},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.39454832673072815},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.3463938236236572}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8147766590118408},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7296198606491089},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6610535383224487},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.5171403288841248},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4461984634399414},{"id":"https://openalex.org/C61265191","wikidata":"https://www.wikidata.org/wiki/Q767770","display_name":"Scale-invariant feature transform","level":3,"score":0.44074922800064087},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4392474293708801},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.42021384835243225},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4121853709220886},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4075252115726471},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.39454832673072815},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3463938236236572},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2023.3304728","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3304728","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10216281.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bfe4eaf1cdee455aadad7e203cb496a8","is_oa":true,"landing_page_url":"https://doaj.org/article/bfe4eaf1cdee455aadad7e203cb496a8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 86132-86148 (2023)","raw_type":"article"},{"id":"pmh:oai:research-repository.griffith.edu.au:10072/425227","is_oa":true,"landing_page_url":"http://hdl.handle.net/10072/425227","pdf_url":null,"source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3304728","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3304728","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10216281.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385819677.pdf","grobid_xml":"https://content.openalex.org/works/W4385819677.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W1781863451","https://openalex.org/W1963943170","https://openalex.org/W2149073238","https://openalex.org/W2162963619","https://openalex.org/W2169439181","https://openalex.org/W2498412031","https://openalex.org/W2512195769","https://openalex.org/W2518397542","https://openalex.org/W2530647424","https://openalex.org/W2540421039","https://openalex.org/W2568962199","https://openalex.org/W2594352707","https://openalex.org/W2606210793","https://openalex.org/W2749771371","https://openalex.org/W2751052406","https://openalex.org/W2766694263","https://openalex.org/W2795299328","https://openalex.org/W2801234257","https://openalex.org/W2890369013","https://openalex.org/W2892850415","https://openalex.org/W2897180259","https://openalex.org/W2940942512","https://openalex.org/W2947342032","https://openalex.org/W2963228374","https://openalex.org/W2963720850","https://openalex.org/W2965240382","https://openalex.org/W2992064760","https://openalex.org/W2993563321","https://openalex.org/W3000120601","https://openalex.org/W3005632797","https://openalex.org/W3011172498","https://openalex.org/W3013316990","https://openalex.org/W3043075211","https://openalex.org/W3091692088","https://openalex.org/W3092369712","https://openalex.org/W3105087494","https://openalex.org/W3108145079","https://openalex.org/W3111101999","https://openalex.org/W3116937991","https://openalex.org/W3137351206","https://openalex.org/W3208230534"],"related_works":["https://openalex.org/W4205142576","https://openalex.org/W2786939550","https://openalex.org/W2554073349","https://openalex.org/W4211037617","https://openalex.org/W3036827782","https://openalex.org/W2004536454","https://openalex.org/W2951194758","https://openalex.org/W2356087891","https://openalex.org/W2553152692","https://openalex.org/W2593357727"],"abstract_inverted_index":{"The":[0,158],"authentication":[1],"of":[2,14,29,36,70,84,121,140,187,201,209],"digital":[3,106,229],"images":[4,107,148,168],"poses":[5],"a":[6,24,98,174,184],"significant":[7],"challenge":[8],"due":[9],"to":[10,48,79,130,146,163],"the":[11,40,53,68,87,109,118,198,206],"wide":[12],"range":[13,186],"image":[15,38,55,111,235],"forgery":[16,30,104,135,182,194,214,227],"techniques":[17,61],"employed,":[18],"with":[19,149,169,192],"one":[20],"notable":[21],"example":[22],"being":[23],"copy-move":[25,103,134,181,226],"forgery.":[26],"This":[27,95],"form":[28],"involves":[31],"duplicating":[32],"and":[33,67,89,127,132,154,176,237],"relocating":[34],"segments":[35],"an":[37,221],"within":[39],"same":[41],"image,":[42],"often":[43],"accompanied":[44],"by":[45],"geometric":[46],"transformations":[47],"deceive":[49],"viewers":[50],"into":[51],"perceiving":[52],"forged":[54,188],"as":[56],"authentic.":[57],"Furthermore,":[58,205],"additional":[59],"processing":[60],"like":[62],"scaling,":[63],"rotation,":[64],"JPEG":[65],"compression,":[66],"application":[69],"Additive":[71],"White":[72],"Gaussian":[73],"Noise":[74],"(AWGN)":[75],"are":[76],"frequently":[77],"employed":[78],"further":[80],"obscure":[81],"any":[82],"traces":[83],"forgery,":[85],"making":[86,172,231],"detection":[88,126,195],"verification":[90],"process":[91],"even":[92],"more":[93],"complex.":[94],"paper":[96],"presents":[97],"novel":[99],"approach":[100,116,142,160,217],"for":[101,179,224,234],"detecting":[102,180,225],"in":[105,167,183,228],"using":[108,218],"self-supervised":[110],"keypoint":[112,125],"detector,":[113],"SuperPoint.":[114],"Our":[115,216],"leverages":[117],"advanced":[119],"capabilities":[120],"SuperPoint,":[122],"which":[123],"combines":[124],"descriptor":[128],"extraction,":[129],"identify":[131],"localize":[133],"accurately.":[136],"One":[137],"important":[138],"aspect":[139],"our":[141,202,210],"is":[143,161],"its":[144],"ability":[145],"handle":[147],"different":[150],"textures,":[151],"including":[152],"smooth":[153],"self-similar":[155],"structural":[156],"images.":[157,189],"proposed":[159,203],"able":[162],"produce":[164],"stable":[165],"results":[166],"various":[170],"attacks,":[171],"it":[173,232],"functional":[175],"reliable":[177],"tool":[178],"diverse":[185],"Comparative":[190],"analysis":[191],"existing":[193],"methods":[196],"shows":[197],"superior":[199],"performance":[200],"approach.":[204],"computational":[207],"efficiency":[208],"algorithm":[211],"enables":[212],"real-time":[213],"detection.":[215],"SuperPoint":[219],"offers":[220],"effective":[222],"solution":[223],"images,":[230],"valuable":[233],"forensics":[236],"authenticity.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
