{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T09:38:00Z","timestamp":1774431480751,"version":"3.50.1"},"reference-count":146,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:00:00Z","timestamp":1630713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1016\/j.engappai.2021.104456","type":"journal-article","created":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T23:42:37Z","timestamp":1632094957000},"page":"104456","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":67,"special_numbering":"C","title":["A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions"],"prefix":"10.1016","volume":"106","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-0570-1813","authenticated-orcid":false,"given":"Abdul Rehman","family":"Javed","sequence":"first","affiliation":[]},{"given":"Zunera","family":"Jalil","sequence":"additional","affiliation":[]},{"given":"Wisha","family":"Zehra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-0097-801X","authenticated-orcid":false,"given":"Thippa Reddy","family":"Gadekallu","sequence":"additional","affiliation":[]},{"given":"Doug Young","family":"Suh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-3229-6785","authenticated-orcid":false,"given":"Md. Jalil","family":"Piran","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2021.104456_b1","series-title":"Proc. 2018 IEEE International Workshop on Information Forensics and Security (WIFS)","first-page":"1","article-title":"Mesonet: a compact facial video forgery detection network","author":"Afchar","year":"2018"},{"key":"10.1016\/j.engappai.2021.104456_b2","series-title":"2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","first-page":"1","article-title":"Whatsapp network forensics: Discovering the IP addresses of suspects","author":"Ahmed","year":"2021"},{"issue":"5","key":"10.1016\/j.engappai.2021.104456_b3","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1007\/s00521-018-3649-0","article-title":"Open-set single-sample face recognition in video surveillance using fuzzy ARTMAP","volume":"32","author":"Al-Obaydy","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.engappai.2021.104456_b4","series-title":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","first-page":"33","article-title":"Deleting object in video copy-move forgery detection based on optical flow concept","author":"Al-Sanjary","year":"2018"},{"key":"10.1016\/j.engappai.2021.104456_b5","series-title":"2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","first-page":"388","article-title":"Detection clone an object movement using an optical flow approach","author":"Al-Sanjary","year":"2018"},{"issue":"2","key":"10.1016\/j.engappai.2021.104456_b6","article-title":"Detection of video forgery: A review of literature","volume":"74","author":"Al-Sanjary","year":"2015","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"4","key":"10.1016\/j.engappai.2021.104456_b7","first-page":"437","article-title":"Digital video forensics: a comprehensive survey","volume":"15","author":"Alsmirat","year":"2020","journal-title":"Int. J. Adv. Intell. Paradigms"},{"key":"10.1016\/j.engappai.2021.104456_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2020.106929","article-title":"Detection and localization of inter-frame forgeries in videos based on macroblock variation and motion vector analysis","volume":"89","author":"Bakas","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.engappai.2021.104456_b9","first-page":"1","article-title":"A comprehensive survey of AI-enabled phishing attacks detection techniques","author":"Basit","year":"2020","journal-title":"Telecommun. Syst."},{"key":"10.1016\/j.engappai.2021.104456_b10","doi-asserted-by":"crossref","unstructured":"Bermejo, C., Chatzopoulos, D., Hui, P., 2020. EyeShopper: Estimating Shoppers\u2019 Gaze using CCTV Cameras. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 2765\u20132774.","DOI":"10.1145\/3394171.3413683"},{"key":"10.1016\/j.engappai.2021.104456_b11","doi-asserted-by":"crossref","unstructured":"Besita Augustin, M., Juliet, S., Palanikumar, S., 2011. Motion and feature based person tracking in surveillance videos. In: Proc. 2011 International Conference on Emerging Trends in Electrical and Computer Technology, Nagercoil, India, pp. 605\u2013609.","DOI":"10.1109\/ICETECT.2011.5760189"},{"key":"10.1016\/j.engappai.2021.104456_b12","series-title":"Handbook of Research on Multimedia Cyber Security","first-page":"165","article-title":"The fundamentals of digital forensics","author":"Bhatele","year":"2020"},{"issue":"7","key":"10.1016\/j.engappai.2021.104456_b13","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1109\/TIFS.2014.2318433","article-title":"On recognizing faces in videos using clustering-based re-ranking and fusion","volume":"9","author":"Bhatt","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.engappai.2021.104456_b14","doi-asserted-by":"crossref","first-page":"219","DOI":"10.3390\/electronics9020219","article-title":"A novel PCA-firefly based xgboost classification model for intrusion detection in networks using GPU","volume":"9","author":"Bhattacharya","year":"2020","journal-title":"Electronics"},{"key":"10.1016\/j.engappai.2021.104456_b15","series-title":"2015 the International Symposium on Artificial Intelligence and Signal Processing (AISP)","first-page":"13","article-title":"Detection of regional copy\/move forgery in MPEG videos using optical flow","author":"Bidokhti","year":"2015"},{"issue":"4","key":"10.1016\/j.engappai.2021.104456_b16","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1111\/1556-4029.14307","article-title":"Quantifying and ranking quality for acquired recordings on digital video recorders","volume":"65","author":"Bruehs","year":"2020","journal-title":"J. Forensic Sci."},{"issue":"9","key":"10.1016\/j.engappai.2021.104456_b17","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.3390\/electronics9091379","article-title":"A review of machine learning algorithms for cloud computing security","volume":"9","author":"Butt","year":"2020","journal-title":"Electronics"},{"key":"10.1016\/j.engappai.2021.104456_b18","series-title":"You won\u2019t believe what obama says in this video!","author":"BuzzFeedVideo","year":"2018"},{"key":"10.1016\/j.engappai.2021.104456_b19","series-title":"2016 6th International Conference on Digital Home (ICDH)","article-title":"Detecting abnormal behavior in examination surveillance video with 3D convolutional neural networks","author":"Cai","year":"2016"},{"issue":"6","key":"10.1016\/j.engappai.2021.104456_b20","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSP.2017.4251117","article-title":"The future of digital forensics: Challenges and the road ahead","volume":"15","author":"Caviglione","year":"2017","journal-title":"IEEE Secur. Priv."},{"issue":"10","key":"10.1016\/j.engappai.2021.104456_b21","doi-asserted-by":"crossref","first-page":"4087","DOI":"10.3390\/su12104087","article-title":"Computational system to classify cyber crime offenses using machine learning","volume":"12","author":"Ch","year":"2020","journal-title":"Sustainability"},{"issue":"10","key":"10.1016\/j.engappai.2021.104456_b22","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.3923\/itj.2012.1456.1462","article-title":"Video forgery detection based on non-subsampled contourlet transform and gradient information","volume":"11","author":"Chen","year":"2012","journal-title":"Inform. Technol. J."},{"issue":"11","key":"10.1016\/j.engappai.2021.104456_b23","doi-asserted-by":"crossref","first-page":"2138","DOI":"10.1109\/TCSVT.2015.2473436","article-title":"Automatic detection of object-based forgery in advanced video","volume":"26","author":"Chen","year":"2015","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.engappai.2021.104456_b24","series-title":"2010 Fourth International Conference on Network and System Security","first-page":"606","article-title":"Digital video tamper detection based on multimodal fusion of residue features","author":"Chetty","year":"2010"},{"issue":"5","key":"10.1016\/j.engappai.2021.104456_b25","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/JSTSP.2020.2999185","article-title":"Recurrent convolutional structures for audio spoof and video deepfake detection","volume":"14","author":"Chintha","year":"2020","journal-title":"IEEE J. Sel. Top. Sign. Proces."},{"issue":"3","key":"10.1016\/j.engappai.2021.104456_b26","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1093\/lpr\/mgp016","article-title":"Forensics without uniqueness, conclusions without individualization: the new epistemology of forensic identification","volume":"8","author":"Cole","year":"2009","journal-title":"Law Probab. Risk"},{"issue":"1","key":"10.1016\/j.engappai.2021.104456_b27","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/TIFS.2011.2165843","article-title":"Exposing digital forgeries in ballistic motion","volume":"7","author":"Conotter","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.engappai.2021.104456_b28","series-title":"2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)","first-page":"1","article-title":"Video forgery detection and localization based on 3D patchmatch","author":"D\u2019Amiano","year":"2015"},{"key":"10.1016\/j.engappai.2021.104456_b29","series-title":"Proc. 2018 25th IEEE International Conference on Image Processing (ICIP)","first-page":"3723","article-title":"Part-based co-difference object tracking algorithm for infrared videos","author":"Demir","year":"2018"},{"key":"10.1016\/j.engappai.2021.104456_b30","doi-asserted-by":"crossref","unstructured":"Deng, J., Pan, Y., Yao, T., Zhou, W., Li, H., Mei, T., 2019. Relation distillation networks for video object detection. In: Proceedings of the IEEE International Conference on Computer Vision, Seoul, Korea (South), pp. 7023\u20137032.","DOI":"10.1109\/ICCV.2019.00712"},{"key":"10.1016\/j.engappai.2021.104456_b31","article-title":"Identification of malnutrition and prediction of BMI from facial images using real-time image processing and machine learning","author":"Dhanamjayulu","year":"2021","journal-title":"IET Image Process."},{"key":"10.1016\/j.engappai.2021.104456_b32","article-title":"Deep-learning-empowered digital forensics for edge consumer electronics in 5G HetNets","author":"Ding","year":"2020","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"2","key":"10.1016\/j.engappai.2021.104456_b33","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.diin.2012.07.002","article-title":"A MCEA based passive forensics scheme for detecting frame-based video tampering","volume":"9","author":"Dong","year":"2012","journal-title":"Digit. Investig."},{"key":"10.1016\/j.engappai.2021.104456_b34","first-page":"1","article-title":"Optimal deep learning based convolution neural network for digital forensics face sketch synthesis in internet of things (IoT)","author":"Elhoseny","year":"2020","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"10.1016\/j.engappai.2021.104456_b35","first-page":"1","article-title":"Exposing video inter-frame forgery via histogram of oriented gradients and motion energy image","author":"Fadl","year":"2020","journal-title":"Multidimens. Syst. Signal Process."},{"key":"10.1016\/j.engappai.2021.104456_b36","first-page":"1","article-title":"Frame duplication and shuffling forgery detection technique in surveillance videos based on temporal average and gray level co-occurrence matrix","author":"Fadl","year":"2020","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.engappai.2021.104456_b37","doi-asserted-by":"crossref","unstructured":"Gautam, A., Singh, S., 2019. Trends in video object tracking in surveillance: A survey. In: Proc. 2019 Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, pp. 729\u2013733.","DOI":"10.1109\/I-SMAC47947.2019.9032529"},{"key":"10.1016\/j.engappai.2021.104456_b38","series-title":"2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","article-title":"A video forensic technique for detecting frame deletion and insertion","author":"Gironi","year":"2014"},{"key":"10.1016\/j.engappai.2021.104456_b39","series-title":"2011 International Conference on Digital Image Computing: Techniques and Applications","first-page":"608","article-title":"Blind video tamper detection based on fusion of source features","author":"Goodwin","year":"2011"},{"key":"10.1016\/j.engappai.2021.104456_b40","doi-asserted-by":"crossref","unstructured":"Guarnera, L., Giudice, O., Battiato, S., 2020. DeepFake detection by analyzing convolutional traces. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, Seattle, WA, USA, pp. 666\u2013667.","DOI":"10.1109\/CVPRW50498.2020.00341"},{"key":"10.1016\/j.engappai.2021.104456_b41","doi-asserted-by":"crossref","first-page":"98398","DOI":"10.1109\/ACCESS.2021.3095730","article-title":"Sefaced: Semantic-based forensic analysis and classification of E-mail data using deep learning","volume":"9","author":"Hina","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2021.104456_b42","unstructured":"Hong, K., Shim, J., Kang, B., Jung, I., 2012. Proc. of Homographic tracking algorithm of moving objects for multiple video surveillance system (ICCAS 2012). In: 2012 12th International Conference on Control, Automation and Systems, Jeju, Korea (South), pp. 462\u2013465."},{"issue":"6","key":"10.1016\/j.engappai.2021.104456_b43","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.scijus.2018.04.001","article-title":"\u201cI couldn\u2019t find it your honour, it mustn\u2019t be there!\u201d\u2013Tool errors, tool limitations and user error in digital forensics","volume":"58","author":"Horsman","year":"2018","journal-title":"Sci. Justice"},{"key":"10.1016\/j.engappai.2021.104456_b44","series-title":"2008 IEEE 10th Workshop on Multimedia Signal Processing","first-page":"170","article-title":"Video forgery detection using correlation of noise residue","author":"Hsu","year":"2008"},{"key":"10.1016\/j.engappai.2021.104456_b45","doi-asserted-by":"crossref","unstructured":"Huang, C.C., Zhang, Y., Thing, V.L.L., 2017. Inter-frame video forgery detection based on multi-level subtraction approach for realistic video forensic applications. In: Proc. 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP), Singapore, pp. 20\u201324.","DOI":"10.1109\/SIPROCESS.2017.8124498"},{"issue":"3","key":"10.1016\/j.engappai.2021.104456_b46","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1111\/1556-4029.14259","article-title":"Implementation of a blind quality control program in a forensic laboratory","volume":"65","author":"Hundl","year":"2020","journal-title":"J. Forensic Sci."},{"key":"10.1016\/j.engappai.2021.104456_b47","series-title":"The Era of Interactive Media","first-page":"25","article-title":"Forgery detection for surveillance video","author":"Hyun","year":"2012"},{"key":"10.1016\/j.engappai.2021.104456_b48","doi-asserted-by":"crossref","first-page":"844","DOI":"10.1016\/j.future.2020.10.008","article-title":"DeepAMD: Detection and identification of android malware using high-efficient deep artificial neural network","volume":"115","author":"Imtiaz","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"10.1016\/j.engappai.2021.104456_b49","doi-asserted-by":"crossref","first-page":"584","DOI":"10.3390\/fi6030584","article-title":"Digital forensics to intelligent forensics","volume":"6","author":"Irons","year":"2014","journal-title":"Future Internet"},{"key":"10.1016\/j.engappai.2021.104456_b50","doi-asserted-by":"crossref","first-page":"72650","DOI":"10.1109\/ACCESS.2020.2988160","article-title":"Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks","volume":"8","author":"Iwendi","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2021.104456_b51","series-title":"IEEE Access ( Vol. 7)","first-page":"55432","article-title":"Video-based evidence analysis and extraction in digital forensic investigation","author":"J.\u00a0Xiao","year":"2019"},{"key":"10.1016\/j.engappai.2021.104456_b52","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.procs.2015.03.140","article-title":"Video summarization using higher order color moments (VSUHCM)","volume":"45","author":"Jadhav","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.engappai.2021.104456_b53","series-title":"2020 11th International Conference on Information and Communication Systems (ICICS)","first-page":"053","article-title":"Forensics and analysis of deepfake videos","author":"Jafar","year":"2020"},{"key":"10.1016\/j.engappai.2021.104456_b54","first-page":"1","article-title":"AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes","author":"Javed","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"10.1016\/j.engappai.2021.104456_b55","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2020.102572","article-title":"Automated cognitive health assessment in smart homes using machine learning","volume":"65","author":"Javed","year":"2021","journal-title":"Sustainable Cities Soc."},{"key":"10.1016\/j.engappai.2021.104456_b56","series-title":"Proc. 2020 International Conference on Cyber Warfare and Security (ICCWS)","first-page":"1","article-title":"Byte-level object identification for forensic investigation of digital images","author":"Javed","year":"2020"},{"issue":"1","key":"10.1016\/j.engappai.2021.104456_b57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-020-00245-7","article-title":"A collaborative healthcare framework for shared healthcare plan with ambient intelligence","volume":"10","author":"Javed","year":"2020","journal-title":"Hum. Cent. Comput. Inf. Sci."},{"key":"10.1016\/j.engappai.2021.104456_b58","article-title":"Anomaly detection in automated vehicles using multistage attention-based convolutional neural network","author":"Javed","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"10.1016\/j.engappai.2021.104456_b59","doi-asserted-by":"crossref","first-page":"3981","DOI":"10.1007\/s11042-020-09749-x","article-title":"Real time object detection and trackingsystem for video surveillance system","volume":"80","author":"Jha","year":"2021","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.engappai.2021.104456_b60","doi-asserted-by":"crossref","first-page":"25323","DOI":"10.1109\/ACCESS.2018.2819624","article-title":"Coarse-to-fine copy-move forgery detection for video forensics","volume":"6","author":"Jia","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2021.104456_b61","first-page":"439","article-title":"Efficient computation offloading in mobile cloud computing for video streaming over 5G","volume":"61","author":"Jo","year":"2019","journal-title":"Comput. Mater. Contin"},{"issue":"4","key":"10.1016\/j.engappai.2021.104456_b62","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1111\/1556-4029.12809","article-title":"Taxonomy of challenges for digital forensics","volume":"60","author":"Karie","year":"2015","journal-title":"J. Forensic Sciences"},{"key":"10.1016\/j.engappai.2021.104456_b63","first-page":"1","article-title":"Deep convolutional neural network for graphics forgery detection in video","author":"Kaur","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.engappai.2021.104456_b64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11277-020-07102-x","article-title":"Image and video forensics: A critical survey","volume":"112","author":"Kaur","year":"2020","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"10.1016\/j.engappai.2021.104456_b65","first-page":"148","article-title":"Evaluation of different block matching algorithms to motion estimation","volume":"3","author":"Khammar","year":"2012","journal-title":"Int. J. VLSI Embed. Syst. (IJVES)"},{"key":"10.1016\/j.engappai.2021.104456_b66","series-title":"Proc. Pattern Recognition. ICPR International Workshops and Challenges: Virtual Event, January 10\u201315, 2021, Proceedings, Part IV","first-page":"269","article-title":"Fake review classification using supervised machine learning","author":"Khan","year":"2021"},{"key":"10.1016\/j.engappai.2021.104456_b67","first-page":"1","article-title":"A novel category detection of social media reviews in the restaurant industry","author":"Khan","year":"2020","journal-title":"Multimedia Syst."},{"key":"10.1016\/j.engappai.2021.104456_b68","doi-asserted-by":"crossref","first-page":"23461","DOI":"10.1007\/s11042-020-09016-z","article-title":"CCTV-RFID Enabled multifactor authentication model for secure differential level video access control","volume":"79","author":"Kim","year":"2020","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.engappai.2021.104456_b69","series-title":"Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)","first-page":"381","article-title":"Passive video forgery detection considering spatio-temporal consistency","author":"Kono","year":"2019"},{"key":"10.1016\/j.engappai.2021.104456_b70","doi-asserted-by":"crossref","first-page":"61764","DOI":"10.1109\/ACCESS.2019.2916717","article-title":"Forensics and deep learning mechanisms for botnets in internet of things: A survey of challenges and solutions","volume":"7","author":"Koroniotis","year":"2019","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.engappai.2021.104456_b71","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.1016\/j.jvcir.2013.08.003","article-title":"Video key frame extraction through dynamic delaunay clustering with a structural constraint","volume":"24","author":"Kuanar","year":"2013","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.engappai.2021.104456_b72","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jpdc.2021.02.022","article-title":"A secured distributed detection system based on IPFS and blockchain for industrial image and video data security","volume":"152","author":"Kumar","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.engappai.2021.104456_b73","series-title":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)","first-page":"1","article-title":"In ictu oculi: Exposing ai created fake videos by detecting eye blinking","author":"Li","year":"2018"},{"key":"10.1016\/j.engappai.2021.104456_b74","doi-asserted-by":"crossref","first-page":"122281","DOI":"10.1109\/ACCESS.2020.3007150","article-title":"Multi-sensor integration for key-frame extraction from first-person videos","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2021.104456_b75","doi-asserted-by":"crossref","unstructured":"Li, X., Lang, Y., Chen, Y., Mao, X., He, Y., Wang, S., Xue, H., Lu, Q., 2020. Sharp multiple instance learning for deepfake video detection. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 1864\u20131872.","DOI":"10.1145\/3394171.3414034"},{"key":"10.1016\/j.engappai.2021.104456_b76","series-title":"Exposing deepfake videos by detecting face warping artifacts","author":"Li","year":"2018"},{"key":"10.1016\/j.engappai.2021.104456_b77","doi-asserted-by":"crossref","unstructured":"Li, X., Yu, K., Ji, S., Wang, Y., Wu, C., Xue, H., 2020. Fighting against deepfake: Patch&pair convolutional neural networks (PPCNN). In: Companion Proceedings of the Web Conference 2020, Taipei Taiwan, pp. 88\u201389.","DOI":"10.1145\/3366424.3382711"},{"issue":"07","key":"10.1016\/j.engappai.2021.104456_b78","doi-asserted-by":"crossref","DOI":"10.1142\/S0218001412500176","article-title":"Detection of frame duplication forgery in videos based on spatial and temporal analysis","volume":"26","author":"Lin","year":"2013","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"10.1016\/j.engappai.2021.104456_b79","series-title":"2011 6th International Conference on Computer Science & Education (ICCSE)","first-page":"1396","article-title":"Detecting frame duplication based on spatial and temporal analyses","author":"Lin","year":"2011"},{"key":"10.1016\/j.engappai.2021.104456_b80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2020.05.027","article-title":"Video object detection for autonomous driving: Motion-aid feature calibration","volume":"409","author":"Liu","year":"2020","journal-title":"Neurocomputing"},{"key":"10.1016\/j.engappai.2021.104456_b81","doi-asserted-by":"crossref","unstructured":"Lu, Y., Lu, C., Tang, C.-K., 2017. Online video object detection using association LSTM. In: Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, pp. 2344\u20132352.","DOI":"10.1109\/ICCV.2017.257"},{"issue":"5","key":"10.1016\/j.engappai.2021.104456_b82","doi-asserted-by":"crossref","first-page":"1686","DOI":"10.1109\/JBHI.2020.3019198","article-title":"Keyframe extraction from laparoscopic videos via diverse and weighted dictionary selection","volume":"25","author":"Ma","year":"2020","journal-title":"IEEE J. Biomed. Health Inf."},{"issue":"3","key":"10.1016\/j.engappai.2021.104456_b83","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1177\/1365712718807226","article-title":"Determining authenticity of video evidence in the age of artificial intelligence and in the wake of deepfake videos","volume":"23","author":"Maras","year":"2018","journal-title":"Int. J. Evid. Proof"},{"key":"10.1016\/j.engappai.2021.104456_b84","series-title":"2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)","first-page":"149","article-title":"Video forgery detection and localization using normalized cross-correlation of moment features","author":"Mathai","year":"2016"},{"key":"10.1016\/j.engappai.2021.104456_b85","series-title":"Detecting GAN-generated imagery using color cues","author":"McCloskey","year":"2018"},{"key":"10.1016\/j.engappai.2021.104456_b86","series-title":"Multimed Tools Appl, Vol. 77","first-page":"20415","article-title":"Video scene analysis: an overview and challenges on deep learning algorithms","author":"M.E.A.","year":"2018"},{"issue":"2","key":"10.1016\/j.engappai.2021.104456_b87","article-title":"Blockchain-based video forensics and integrity verification framework for wireless internet-of-things devices","volume":"4","author":"Mercan","year":"2021","journal-title":"Secur. Priv."},{"key":"10.1016\/j.engappai.2021.104456_b88","doi-asserted-by":"crossref","DOI":"10.1017\/ATSIP.2012.2","article-title":"An overview on video forensics","volume":"1","author":"Milani","year":"2012","journal-title":"APSIPA Trans. Signal Inf. Process."},{"key":"10.1016\/j.engappai.2021.104456_b89","series-title":"Proceedings of the Third International Conference on Computational Intelligence and Informatics","first-page":"237","article-title":"A survey on digital forensics phases, tools and challenges","author":"Mohammmed","year":"2020"},{"key":"10.1016\/j.engappai.2021.104456_b90","series-title":"Proc. 2020 International Conference on Cyber Warfare and Security (ICCWS)","first-page":"1","article-title":"Robust early stage botnet detection using machine learning","author":"Muhammad","year":"2020"},{"key":"10.1016\/j.engappai.2021.104456_b91","first-page":"11","article-title":"Image copy move forgery detection: A review","volume":"11","author":"Mushtaq","year":"2018","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"10.1016\/j.engappai.2021.104456_b92","article-title":"Shot based keyframe extraction using edge-LBP approach","author":"Nandini","year":"2020","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"10.1016\/j.engappai.2021.104456_b93","doi-asserted-by":"crossref","unstructured":"Nazib, A., Oh, C., Lee, C., 2013. Object detection and tracking in night time video surveillance. In: 2013 10th International Conference on Ubiquitous Robots and Ambient Intelligence (URAI), Jeju, Korea (South), pp. 629\u2013632.","DOI":"10.1109\/URAI.2013.6677410"},{"key":"10.1016\/j.engappai.2021.104456_b94","series-title":"Proc. ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"2307","article-title":"Capsule-forensics: Using capsule networks to detect forged images and videos","author":"Nguyen","year":"2019"},{"key":"10.1016\/j.engappai.2021.104456_b95","article-title":"DeepFake Detection based on discrepancies between faces and their context","author":"Nirkin","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.engappai.2021.104456_b96","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.future.2020.04.041","article-title":"A machine learning forensics technique to detect post-processing in digital videos","volume":"111","author":"Orozco","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.engappai.2021.104456_b97","first-page":"1","article-title":"Deep learning in multi-object detection and tracking: state of the art","author":"Pal","year":"2021","journal-title":"Appl. Intell."},{"key":"10.1016\/j.engappai.2021.104456_b98","series-title":"Critical Concepts, Standards, and Techniques in Cyber Forensics","first-page":"31","article-title":"Current challenges of digital forensics in cyber security","author":"Pandey","year":"2020"},{"issue":"2","key":"10.1016\/j.engappai.2021.104456_b99","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s11280-018-0582-1","article-title":"Deep learning approaches for video-based anomalous activity detection","volume":"22","author":"Pawar","year":"2019","journal-title":"World Wide Web"},{"key":"10.1016\/j.engappai.2021.104456_b100","series-title":"International Conference on Computer Animation and Social Agents","first-page":"73","article-title":"A cascaded approach for keyframes extraction from videos","author":"Pei","year":"2020"},{"key":"10.1016\/j.engappai.2021.104456_b101","doi-asserted-by":"crossref","first-page":"46167","DOI":"10.1109\/ACCESS.2018.2864790","article-title":"CASH: Content-and network-context-aware streaming over 5G HetNets","volume":"6","author":"Piran","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2021.104456_b102","article-title":"Multimedia communication over cognitive radio networks from QoS\/QoE perspective: A comprehensive survey","volume":"172","author":"Piran","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.engappai.2021.104456_b103","article-title":"Granulated RCNN and multi-class deep sort for multi-object detection and tracking","author":"Pramanik","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"10.1016\/j.engappai.2021.104456_b104","series-title":"2014 IEEE International Conference on Image Processing (ICIP)","first-page":"5352","article-title":"Compression noise based video forgery detection","author":"Ravi","year":"2014"},{"key":"10.1016\/j.engappai.2021.104456_b105","article-title":"Ensemble adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles","author":"Rehman\u00a0Javed","year":"2020","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"10.1016\/j.engappai.2021.104456_b106","article-title":"An effective feature engineering for DNN using hybrid PCA-gwo for intrusion detection in IoMT architecture","author":"RM","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.engappai.2021.104456_b107","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1016\/j.future.2017.11.013","article-title":"Raspberry pi assisted face recognition framework for enhanced law-enforcement services in smart cities","volume":"108","author":"Sajjad","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.engappai.2021.104456_b108","doi-asserted-by":"crossref","first-page":"8820","DOI":"10.1109\/ACCESS.2021.3049564","article-title":"Enhancing security of health information using modular encryption standard in mobile cloud computing","volume":"9","author":"Shabbir","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2021.104456_b109","series-title":"A comprehensive survey on 6G networks: Applications, core services, enabling technologies, and future challenges","author":"Shahraki","year":"2021"},{"issue":"1","key":"10.1016\/j.engappai.2021.104456_b110","article-title":"Survey: Video forensic tools","volume":"47","author":"Shahraki","year":"2013","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"10.1016\/j.engappai.2021.104456_b111","series-title":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","first-page":"1","article-title":"A review of passive forensic techniques for detection of copy-move attacks on digital videos","volume":"1","author":"Sharma","year":"2016"},{"key":"10.1016\/j.engappai.2021.104456_b112","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/1231794","article-title":"A fast and robust key frame extraction method for video copyright protection","volume":"2017","author":"Shi","year":"2017","journal-title":"J. Electr. Comput. Eng."},{"key":"10.1016\/j.engappai.2021.104456_b113","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.neucom.2015.07.131","article-title":"Event-based large scale surveillance video summarization","volume":"187","author":"Song","year":"2016","journal-title":"Neurocomputing"},{"issue":"2","key":"10.1016\/j.engappai.2021.104456_b114","first-page":"17","article-title":"A survey on video forgery detection","volume":"9","author":"Sowmya","year":"2015","journal-title":"Int. J. Comput. Eng. Appl."},{"key":"10.1016\/j.engappai.2021.104456_b115","series-title":"A survey on video forgery detection","author":"SowmyaK.","year":"2015"},{"key":"10.1016\/j.engappai.2021.104456_b116","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1016\/j.procs.2016.06.065","article-title":"An improved algorithm for video summarization\u2013a rank based approach","volume":"89","author":"Srinivas","year":"2016","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"10.1016\/j.engappai.2021.104456_b117","doi-asserted-by":"crossref","first-page":"1315","DOI":"10.1109\/TIFS.2012.2205568","article-title":"Temporal forensics and anti-forensics for motion compensated video","volume":"7","author":"Stamm","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.engappai.2021.104456_b118","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1109\/TMM.2017.2760098","article-title":"A fast forgery detection algorithm based on exponential-Fourier moments for video region duplication","volume":"20","author":"Su","year":"2018","journal-title":"IEEE Trans. Multimed."},{"key":"10.1016\/j.engappai.2021.104456_b119","series-title":"Proc. of 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing","article-title":"Video key frame extraction based on spatial-temporal color distribution","author":"Sun","year":"2008"},{"key":"10.1016\/j.engappai.2021.104456_b120","series-title":"Proc. 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)","first-page":"248","article-title":"Survey of copy-paste forgery detection in digital image forensic","author":"Tembe","year":"2017"},{"key":"10.1016\/j.engappai.2021.104456_b121","series-title":"2014 X International Symposium on Telecommunications (BIHTEL)","first-page":"1","article-title":"Video frame copy-move forgery detection based on cellular automata and local binary patterns","author":"Tralic","year":"2014"},{"issue":"2","key":"10.1016\/j.engappai.2021.104456_b122","doi-asserted-by":"crossref","first-page":"476","DOI":"10.3390\/app11020476","article-title":"Video forensics: identifying colorized images using deep learning","volume":"11","author":"Ulloa","year":"2021","journal-title":"Appl. Sci."},{"issue":"1","key":"10.1016\/j.engappai.2021.104456_b123","article-title":"Deepfakes and disinformation: Exploring the impact of synthetic political video on deception, uncertainty, and trust in news","volume":"6","author":"Vaccari","year":"2020","journal-title":"Soc. Media Soc."},{"issue":"5","key":"10.1016\/j.engappai.2021.104456_b124","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media forensics and deepfakes: an overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J. Sel. Top. Sign. Proces."},{"issue":"2","key":"10.1016\/j.engappai.2021.104456_b125","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1080\/15614263.2015.1128163","article-title":"Challenges in digital forensics","volume":"17","author":"Vincze","year":"2016","journal-title":"Police Pract. Res."},{"key":"10.1016\/j.engappai.2021.104456_b126","series-title":"2014 10th International Conference on Information Assurance and Security","first-page":"29","article-title":"Passive video forgery detection techniques: a survey","author":"Wahab","year":"2014"},{"key":"10.1016\/j.engappai.2021.104456_b127","article-title":"Edge computing enabled video segmentation for real-time traffic monitoring in internet of vehicles","author":"Wan","year":"2021","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.engappai.2021.104456_b128","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H., 2006. Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the 8th Workshop on Multimedia and Security, Geneva, Switzerland, pp. 37\u201347.","DOI":"10.1145\/1161366.1161375"},{"key":"10.1016\/j.engappai.2021.104456_b129","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H., 2007. Exposing digital forgeries in video by detecting duplication. In: Proceedings of the 9th Workshop on Multimedia & Security, Dallas Texas USA, pp. 35\u201342.","DOI":"10.1145\/1288869.1288876"},{"key":"10.1016\/j.engappai.2021.104456_b130","doi-asserted-by":"crossref","unstructured":"Wang, W., Farid, H., 2009. Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton New Jersey USA, pp. 39\u201348.","DOI":"10.1145\/1597817.1597826"},{"key":"10.1016\/j.engappai.2021.104456_b131","series-title":"Digital-Forensics and Watermarking","first-page":"244","article-title":"Identifying video forgery process using optical flow","author":"Wang","year":"2014"},{"key":"10.1016\/j.engappai.2021.104456_b132","doi-asserted-by":"crossref","unstructured":"Wang, R., Juefei-Xu, F., Ma, L., Xie, X., Huang, Y., Wang, J., Liu, Y., 2020. FakeSpotter: A simple yet robust baseline for spotting AI-synthesized fake faces. In: International Joint Conference on Artificial Intelligence (IJCAI).","DOI":"10.24963\/ijcai.2020\/476"},{"key":"10.1016\/j.engappai.2021.104456_b133","doi-asserted-by":"crossref","unstructured":"Wang, S., Zhou, Y., Yan, J., Deng, Z., 2018. Fully motion-aware network for video object detection. In: Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany, pp. 542\u2013557.","DOI":"10.1007\/978-3-030-01261-8_33"},{"key":"10.1016\/j.engappai.2021.104456_b134","series-title":"Proc. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","article-title":"Exposing video inter-frame forgery based on velocity field consistency","author":"Wu","year":"2014"},{"key":"10.1016\/j.engappai.2021.104456_b135","doi-asserted-by":"crossref","first-page":"55432","DOI":"10.1109\/ACCESS.2019.2913648","article-title":"Video-based evidence analysis and extraction in digital forensic investigation","volume":"7","author":"Xiao","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2021.104456_b136","series-title":"ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"8261","article-title":"Exposing deep fakes using inconsistent head poses","author":"Yang","year":"2019"},{"key":"10.1016\/j.engappai.2021.104456_b137","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2020.3045937","article-title":"Preventing deepfake attacks on speaker authentication by dynamic lip movement analysis","volume":"16","author":"Yang","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.engappai.2021.104456_b138","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/sym10010003","article-title":"Deep learning for detection of object-based forgery in advanced video","volume":"10","author":"Yao","year":"2017","journal-title":"Symmetry"},{"key":"10.1016\/j.engappai.2021.104456_b139","series-title":"Digital-Forensics and Watermarking","first-page":"94","article-title":"Inter-frame forgery detection for static-background video based on MVP consistency","author":"Zhang","year":"2016"},{"key":"10.1016\/j.engappai.2021.104456_b140","doi-asserted-by":"crossref","first-page":"3582","DOI":"10.1109\/TIP.2019.2963380","article-title":"Pwstablenet: Learning pixel-wise warping maps for video stabilization","volume":"29","author":"Zhao","year":"2020","journal-title":"IEEE Trans. Image Process."},{"issue":"19","key":"10.1016\/j.engappai.2021.104456_b141","doi-asserted-by":"crossref","first-page":"25389","DOI":"10.1007\/s11042-018-5791-1","article-title":"Inter-frame passive-blind forgery detection for video shot based on similarity analysis","volume":"77","author":"Zhao","year":"2018","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"10.1016\/j.engappai.2021.104456_b142","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TBIOM.2020.2973504","article-title":"An automatic system for unconstrained video-based face recognition","volume":"2","author":"Zheng","year":"2020","journal-title":"IEEE Trans.n Biom. Behav. Identity Sci."},{"key":"10.1016\/j.engappai.2021.104456_b143","series-title":"International Workshop on Digital Watermarking","first-page":"18","article-title":"Inter-frame video forgery detection based on block-wise brightness variance descriptor","author":"Zheng","year":"2014"},{"issue":"8","key":"10.1016\/j.engappai.2021.104456_b144","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0135694","article-title":"Parallel key frame extraction for surveillance video service in a smart city","volume":"10","author":"Zheng","year":"2015","journal-title":"Plos One"},{"key":"10.1016\/j.engappai.2021.104456_b145","doi-asserted-by":"crossref","first-page":"174424","DOI":"10.1109\/ACCESS.2020.3025774","article-title":"Key frame extraction algorithm of motion video based on priori","volume":"8","author":"Zhong","year":"2020","journal-title":"IEEE Access"},{"issue":"10","key":"10.1016\/j.engappai.2021.104456_b146","doi-asserted-by":"crossref","first-page":"6714","DOI":"10.1109\/TII.2020.2982705","article-title":"AR-Net: Adaptive attention and residual refinement network for copy-move forgery detection","volume":"16","author":"Zhu","year":"2020","journal-title":"IEEE Trans. Ind. Inf."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0952197621003043?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0952197621003043?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:20:30Z","timestamp":1760599230000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197621003043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":146,"alternative-id":["S0952197621003043"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.engappai.2021.104456","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.engappai.2021.104456","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 The Author(s). Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104456"}}