2022
DOI: 10.3390/app12062851
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning-Based Digital Image Forgery Detection System

Abstract: The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated. Splicing is one of the most common techniques used for digital image tampering; a selected area copied from the same or another image is pasted in an image. Image forgery detection is considered a reliable way to verify the authenticity of digital images. In thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(15 citation statements)
references
References 29 publications
0
15
0
Order By: Relevance
“…For splicing, [18] presented multiple image-splicing forgeries using Mask R-CNN and MobileNet-V1 backbone. A novel approach utilizing ResNet50v2 was introduced in [19], that considered image batches as an input and used YOLO CNN weights with ResNet50v2 architecture.…”
Section: B Pretrained Network-based Image Forgery Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…For splicing, [18] presented multiple image-splicing forgeries using Mask R-CNN and MobileNet-V1 backbone. A novel approach utilizing ResNet50v2 was introduced in [19], that considered image batches as an input and used YOLO CNN weights with ResNet50v2 architecture.…”
Section: B Pretrained Network-based Image Forgery Detection Techniquesmentioning
confidence: 99%
“…Tampered images in CASIA v2 were created by combining two different authentic images or using the same authentic image. Cropped parts underwent some processing including distortion, rotation, and scaling, to create an image that seems to be real, involving blurring the spliced region's edge [19].…”
Section: A Experimental Setupmentioning
confidence: 99%
“…There are some other model which exploits the deep learning based approach such as DLFM-CMDFC [139], deep learning by recompression [140], copy-move image forgery [141], CNN by using the architecture of ResNet50v2 [142].…”
Section: % (Tiff)mentioning
confidence: 99%
“…The paper [2] proposes a system architecture based on ResNet50v2 as basic convolutional model with five stages initialised with YOLO CNN weights for the purpose of object detection and transfer learning. In this paper, it first performs batch normalisation and then it applies activation function to update and optimise the weights.…”
Section: Related Workmentioning
confidence: 99%
“…Three of the most common manipulations in literature are: (1) Copy-move forgery, in which a specific region from the image is copy pasted within the same image. (2) Removal, in which an image region is removed and the removed part is then in-painted. (3) Splicing, in which a region from an authentic image is copied into a different image.…”
Section: Introductionmentioning
confidence: 99%