Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (13)

Search Parameters:
Keywords = image-splicing tamper detection

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
34 pages, 14603 KB  
Article
A Benchmark for Image Forgery Detection and Localization on Social Media Images
by Md. Mehedi Rahman Rana, Md. Anisur Rahman, Kamrul Hasan Talukder, Syed Md. Galib and Nazmul Siddique
J. Sens. Actuator Netw. 2026, 15(3), 40; https://doi.org/10.3390/jsan15030040 - 19 May 2026
Viewed by 10
Abstract
The widespread manipulation of digital images on social media has significantly undermined public trust in visual content and created major challenges for automated forgery detection. These challenges are further intensified by platform-induced degradations such as compression, resizing, and filtering, which often obscure forensic [...] Read more.
The widespread manipulation of digital images on social media has significantly undermined public trust in visual content and created major challenges for automated forgery detection. These challenges are further intensified by platform-induced degradations such as compression, resizing, and filtering, which often obscure forensic traces. This work develops FIDD-6000, a large-scale benchmark dataset for image forgery detection and localization, containing 6000 social media images, including 1000 authentic and 5000 manipulated samples, with pixel-level ground-truth masks annotated across three forgery categories, splicing, copy-move, and retouching, all created under realistic post-processing conditions. Each manipulated image is accompanied by a pixel-level ground-truth mask indicating the tampered regions. To assess the challenges posed by social media-based image manipulation, we evaluate 15 state-of-the-art image forgery localization methods on FIDD-6000, including approaches based on JPEG compression artifacts, sensor-noise analysis, and error level analysis. Experimental results show that these methods perform poorly on the proposed dataset, revealing their limited effectiveness in detecting forged images that have undergone social media-specific compression and transformation. This performance gap highlights the need for more robust and advanced machine learning and deep learning approaches capable of handling the complexity of modern image manipulations. Therefore, FIDD-6000 provides a valuable resource for researchers by offering a rigorous benchmark for developing, evaluating, and comparing next-generation forgery detection and localization methods. Full article
(This article belongs to the Section Big Data, Computing and Artificial Intelligence)
Show Figures

Figure 1

26 pages, 4097 KB  
Article
Integrating Convolutional Neural Networks with a Firefly Algorithm for Enhanced Digital Image Forensics
by Abed Al Raoof Bsoul and Yazan Alshboul
AI 2025, 6(12), 321; https://doi.org/10.3390/ai6120321 - 8 Dec 2025
Cited by 1 | Viewed by 1116
Abstract
Digital images play an increasingly central role in journalism, legal investigations, and cybersecurity. However, modern editing tools make image manipulation difficult to detect with traditional forensic methods. This research addresses the challenge of improving the accuracy and stability of deep-learning-based forgery detection by [...] Read more.
Digital images play an increasingly central role in journalism, legal investigations, and cybersecurity. However, modern editing tools make image manipulation difficult to detect with traditional forensic methods. This research addresses the challenge of improving the accuracy and stability of deep-learning-based forgery detection by developing a convolutional neural network enhanced through automated hyperparameter optimisation. The framework integrates a Firefly-based search strategy to optimise key network settings such as learning rate, filter size, depth, dropout, and batch configuration, reducing reliance on manual tuning and the risk of suboptimal model performance. The model is trained and evaluated on a large raster dataset of tampered and authentic images, as well as a custom vector-based dataset containing manipulations involving geometric distortion, object removal, and gradient editing. The Firefly-optimised model achieves higher accuracy, faster convergence, and improved robustness than baseline networks and traditional machine-learning classifiers. Cross-domain evaluation demonstrates that these gains extend across both raster and vector image types, even when vector files are rasterised for deep-learning analysis. The findings highlight the value of metaheuristic optimisation for enhancing the reliability of deep forensic systems and underscore the potential of combining deep learning with nature-inspired search methods to support more trustworthy image authentication in real-world environments. Full article
Show Figures

Figure 1

32 pages, 3306 KB  
Article
AMSEANet: An Edge-Guided Adaptive Multi-Scale Network for Image Splicing Detection and Localization
by Yuankun Yang, Yueshun He, Xiaohui Ma, Wei Lv, Jie Chen and Hongling Wang
Sensors 2025, 25(20), 6494; https://doi.org/10.3390/s25206494 - 21 Oct 2025
Viewed by 1257
Abstract
In image splicing tamper detection, forgery operations simultaneously introduce macroscopic semantic inconsistencies and microscopic tampering artifacts. Conventional methods often treat semantic understanding and low-level artifact perception as separate tasks, which impedes their effective synergy. Meanwhile, frequency-domain information, a crucial clue for identifying traces [...] Read more.
In image splicing tamper detection, forgery operations simultaneously introduce macroscopic semantic inconsistencies and microscopic tampering artifacts. Conventional methods often treat semantic understanding and low-level artifact perception as separate tasks, which impedes their effective synergy. Meanwhile, frequency-domain information, a crucial clue for identifying traces of tampering, is frequently overlooked. However, a simplistic fusion of frequency-domain and spatial features can lead to feature conflicts and information redundancy. To resolve these challenges, this paper proposes an Adaptive Multi-Scale Edge-Aware Network (AMSEANet). This network employs a synergistic enhancement cascade architecture, recasting semantic understanding and artifact perception as a single, frequency-aware process guided by deep semantics. It leverages data-driven adaptive filters to precisely isolate and focus on edge artifacts that signify tampering. Concurrently, the dense fusion and enhancement of cross-scale features effectively preserve minute tampering clues and boundary details. Extensive experiments demonstrate that our proposed method achieves superior performance on several public datasets and exhibits excellent robustness against common attacks, such as noise and JPEG compression. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

21 pages, 3077 KB  
Article
AISMSNet: Advanced Image Splicing Manipulation Identification Based on Siamese Networks
by Ana Elena Ramirez-Rodriguez, Rodrigo Eduardo Arevalo-Ancona, Hector Perez-Meana, Manuel Cedillo-Hernandez and Mariko Nakano-Miyatake
Appl. Sci. 2024, 14(13), 5545; https://doi.org/10.3390/app14135545 - 26 Jun 2024
Cited by 10 | Viewed by 2753
Abstract
The exponential surge in specialized image editing software has intensified visual forgery, with splicing attacks emerging as a popular forgery technique. In this context, Siamese neural networks are a remarkable tool in pattern identification for detecting image manipulations. This paper introduces a deep [...] Read more.
The exponential surge in specialized image editing software has intensified visual forgery, with splicing attacks emerging as a popular forgery technique. In this context, Siamese neural networks are a remarkable tool in pattern identification for detecting image manipulations. This paper introduces a deep learning approach for splicing detection based on a Siamese neural network tailored to identifying manipulated image regions. The Siamese neural network learns unique features of specific image areas and detects tampered regions through feature comparison. This architecture employs two identical branches with shared weights and image features to compare image blocks and identify tampered areas. Subsequently, a K-means algorithm is applied to identify similar centroids and determine the precise localization of duplicated regions in the image. The experimental results encompass various splicing attacks to assess effectiveness, demonstrating a high accuracy of 98.6% and a precision of 97.5% for splicing manipulation detection. This study presents an advanced splicing image forgery detection and localization algorithm, showcasing its efficacy through comprehensive experiments. Full article
Show Figures

Figure 1

13 pages, 2849 KB  
Article
Multitask Image Splicing Tampering Detection Based on Attention Mechanism
by Pingping Zeng, Lianhui Tong, Yaru Liang, Nanrun Zhou and Jianhua Wu
Mathematics 2022, 10(20), 3852; https://doi.org/10.3390/math10203852 - 17 Oct 2022
Cited by 18 | Viewed by 3505
Abstract
In today’s modern communication society, the authenticity of digital media has never been of such importance as it is now. In this aspect, the reliability of digital images is of paramount importance because images can be easily manipulated by means of sophisticated software, [...] Read more.
In today’s modern communication society, the authenticity of digital media has never been of such importance as it is now. In this aspect, the reliability of digital images is of paramount importance because images can be easily manipulated by means of sophisticated software, such as Photoshop. Splicing tampering is a commonly used photographic manipulation for modifying images. Detecting splicing tampering remains a challenging task in the area of image forensics. A new multitask model based on attention mechanism, densely connected network, Atrous Spatial Pyramid Pooling (ASPP) and U-Net for locating splicing tampering in an image, AttDAU-Net, was proposed. The proposed AttDAU-Net is basically a U-Net that incorporates the spatial rich model filtering, an attention mechanism, an ASPP module and a multitask learning framework, in order to capture more multi-scale information while enlarging the receptive field and improving the detection precision of image splicing tampering. The experimental results on the datasets of CASIA1 and CASIA2 showed promising performance metrics for the proposed model (F1-scores of 0.7736 and 0.6937, respectively), which were better than other state-of-the-art methods for comparison, demonstrating the feasibility and effectiveness of the proposed AttDAU-Net in locating image splicing tampering. Full article
(This article belongs to the Special Issue Mathematical Methods for Computer Science)
Show Figures

Figure 1

14 pages, 5907 KB  
Article
A Multiscale Fusion Lightweight Image-Splicing Tamper-Detection Model
by Dan Zhao and Xuedong Tian
Electronics 2022, 11(16), 2621; https://doi.org/10.3390/electronics11162621 - 21 Aug 2022
Cited by 15 | Viewed by 3226
Abstract
The easy availability and usability of photo-editing tools have increased the number of forgery attacks, primarily splicing attacks, thereby increasing cybercrimes. Because of an existing image-splicing tamper-detection algorithm based on deep learning with high model complexity and weak robustness, a multiscale fusion lightweight [...] Read more.
The easy availability and usability of photo-editing tools have increased the number of forgery attacks, primarily splicing attacks, thereby increasing cybercrimes. Because of an existing image-splicing tamper-detection algorithm based on deep learning with high model complexity and weak robustness, a multiscale fusion lightweight model for image-splicing tamper detection is proposed. For the above problems and to improve MobileNetV2, the structural block of the classification part of the original network structure was removed, the stride of the sixth largest structural block of the network was changed to 1, the dilated convolution was used instead of downsampling, and the features extracted from the second and third large structural blocks in the network were downsampled with maximal pooling; then, the constraint on the backbone network was increased by jumping connections. Combined with the pyramid pooling module, the acquired feature layers were divided into regions of different sizes for average pooling; then, all feature layers were fused. The experimental results show that it had a low number of parameters and required a small amount of computation, achieving 91.0% and 96.4% precision on CASIA and COLUMB, respectively, and 83.2% and 88.1% F-measure on CASIA and COLUMB, respectively. Full article
(This article belongs to the Topic Cyber Security and Critical Infrastructures)
Show Figures

Figure 1

10 pages, 1562 KB  
Article
A Novel Deep Learning Architecture with Multi-Scale Guided Learning for Image Splicing Localization
by Zhongwang Li, Qi You and Jun Sun
Electronics 2022, 11(10), 1607; https://doi.org/10.3390/electronics11101607 - 18 May 2022
Cited by 9 | Viewed by 2495
Abstract
The goal of image splicing localization is to detect the tampered area in an input image. Deep learning models have shown good performance in such a task, but are generally unable to detect the boundaries of the tampered area well. In this paper, [...] Read more.
The goal of image splicing localization is to detect the tampered area in an input image. Deep learning models have shown good performance in such a task, but are generally unable to detect the boundaries of the tampered area well. In this paper, we propose a novel deep learning model for image splicing localization that not only considers local image features, but also extracts global information of images by using a multi-scale guided learning strategy. In addition, the model integrates spatial and channel self-attention mechanisms to focus on extracting important features instead of restraining unimportant or noisy features. The proposed model is trained on the CASIA v2.0 dataset, and its performance is tested on the CASIA v1.0, Columbia Uncompressed, and DSO-1 datasets. Experimental results show that, with the help of the multi-scale guided learning strategy and self-attention mechanisms, the proposed model can locate the tampered area more effectively than the state-of-the-art models. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

17 pages, 3861 KB  
Article
Deep Learning-Based Digital Image Forgery Detection System
by Emad Ul Haq Qazi, Tanveer Zia and Abdulrazaq Almorjan
Appl. Sci. 2022, 12(6), 2851; https://doi.org/10.3390/app12062851 - 10 Mar 2022
Cited by 82 | Viewed by 15980
Abstract
The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated. Splicing is one of [...] Read more.
The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated. Splicing is one of the most common techniques used for digital image tampering; a selected area copied from the same or another image is pasted in an image. Image forgery detection is considered a reliable way to verify the authenticity of digital images. In this study, we proposed an approach based on the state-of-the-art deep learning architecture of ResNet50v2. The proposed model takes image batches as input and utilizes the weights of a YOLO convolutional neural network (CNN) by using the architecture of ResNet50v2. In this study, we used the CASIA_v1 and CASIA_v2 benchmark datasets, which contain two distinct categories, original and forgery, to detect image splicing. We used 80% of the data for the training and the remaining 20% for testing purposes. We also performed a comparative analysis between existing approaches and our proposed system. We evaluated the performance of our technique with the CASIA_v1 and CASIA_v2 datasets. Since the CASIA_v2 dataset is more comprehensive compared to the CASIA_v1 dataset, we obtained 99.3% accuracy for the fine-tuned model using transfer learning and 81% accuracy without transfer learning with the CASIA_v2 dataset. The results show the superiority of the proposed system. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

22 pages, 3563 KB  
Article
A Robust Forgery Detection Method for Copy–Move and Splicing Attacks in Images
by Mohammad Manzurul Islam, Gour Karmakar, Joarder Kamruzzaman and Manzur Murshed
Electronics 2020, 9(9), 1500; https://doi.org/10.3390/electronics9091500 - 12 Sep 2020
Cited by 30 | Viewed by 6174
Abstract
Internet of Things (IoT) image sensors, social media, and smartphones generate huge volumes of digital images every day. Easy availability and usability of photo editing tools have made forgery attacks, primarily splicing and copy–move attacks, effortless, causing cybercrimes to be on the rise. [...] Read more.
Internet of Things (IoT) image sensors, social media, and smartphones generate huge volumes of digital images every day. Easy availability and usability of photo editing tools have made forgery attacks, primarily splicing and copy–move attacks, effortless, causing cybercrimes to be on the rise. While several models have been proposed in the literature for detecting these attacks, the robustness of those models has not been investigated when (i) a low number of tampered images are available for model building or (ii) images from IoT sensors are distorted due to image rotation or scaling caused by unwanted or unexpected changes in sensors’ physical set-up. Moreover, further improvement in detection accuracy is needed for real-word security management systems. To address these limitations, in this paper, an innovative image forgery detection method has been proposed based on Discrete Cosine Transformation (DCT) and Local Binary Pattern (LBP) and a new feature extraction method using the mean operator. First, images are divided into non-overlapping fixed size blocks and 2D block DCT is applied to capture changes due to image forgery. Then LBP is applied to the magnitude of the DCT array to enhance forgery artifacts. Finally, the mean value of a particular cell across all LBP blocks is computed, which yields a fixed number of features and presents a more computationally efficient method. Using Support Vector Machine (SVM), the proposed method has been extensively tested on four well known publicly available gray scale and color image forgery datasets, and additionally on an IoT based image forgery dataset that we built. Experimental results reveal the superiority of our proposed method over recent state-of-the-art methods in terms of widely used performance metrics and computational time and demonstrate robustness against low availability of forged training samples. Full article
Show Figures

Figure 1

16 pages, 2281 KB  
Article
Improved Image Splicing Forgery Detection by Combination of Conformable Focus Measures and Focus Measure Operators Applied on Obtained Redundant Discrete Wavelet Transform Coefficients
by Thamarai Subramaniam, Hamid A. Jalab, Rabha W. Ibrahim and Nurul F. Mohd Noor
Symmetry 2019, 11(11), 1392; https://doi.org/10.3390/sym11111392 - 10 Nov 2019
Cited by 15 | Viewed by 4420
Abstract
The image is the best information carrier in the current digital era and the easiest to manipulate. Image manipulation causes the integrity of this information carrier to be ambiguous. The image splicing technique is commonly used to manipulate images by fusing different regions [...] Read more.
The image is the best information carrier in the current digital era and the easiest to manipulate. Image manipulation causes the integrity of this information carrier to be ambiguous. The image splicing technique is commonly used to manipulate images by fusing different regions in one image. Over the last decade, it has been confirmed that various structures in science and engineering can be demonstrated more precisely by fractional calculus using integrals or derivative operators. Many fractional-order-based techniques have been used in the image-processing field. Recently, a new specific fractional calculus, called conformable calculus, was delivered. Herein, we employ the combination of conformable focus measures (CFMs), and focus measure operators (FMOs) in obtaining redundant discrete wavelet transform (RDWT) coefficients for improving the image splicing forgery detection. The process of image splicing disorders the content of tampered image and causes abnormality in the image features. The spliced region’s boundaries are usually blurring to avoid detection. To make use of the blurred information, both CFMs and FMOs are used to calculate the degree of blurring of the tampered region’s boundaries for image splicing detection. The two public image datasets IFS-TC and CASIA TIDE V2 are used for evaluation of the proposed method. The obtained results of the proposed method achieved accuracy rate 98.30% for Cb channel on IFS-TC image dataset and 98.60% of the Cb channel on CASIA TIDE V2 with 24-D feature vector. The proposed method exhibited superior results compared with other image splicing detection methods. Full article
(This article belongs to the Special Issue Recent Advances in Discrete and Fractional Mathematics)
Show Figures

Figure 1

9 pages, 1260 KB  
Article
New Texture Descriptor Based on Modified Fractional Entropy for Digital Image Splicing Forgery Detection
by Hamid A. Jalab, Thamarai Subramaniam, Rabha W. Ibrahim, Hasan Kahtan and Nurul F. Mohd Noor
Entropy 2019, 21(4), 371; https://doi.org/10.3390/e21040371 - 5 Apr 2019
Cited by 39 | Viewed by 6715
Abstract
Forgery in digital images is immensely affected by the improvement of image manipulation tools. Image forgery can be classified as image splicing or copy-move on the basis of the image manipulation type. Image splicing involves creating a new tampered image by merging the [...] Read more.
Forgery in digital images is immensely affected by the improvement of image manipulation tools. Image forgery can be classified as image splicing or copy-move on the basis of the image manipulation type. Image splicing involves creating a new tampered image by merging the components of one or more images. Moreover, image splicing disrupts the content and causes abnormality in the features of a tampered image. Most of the proposed algorithms are incapable of accurately classifying high-dimension feature vectors. Thus, the current study focuses on improving the accuracy of image splicing detection with low-dimension feature vectors. This study also proposes an approximated Machado fractional entropy (AMFE) of the discrete wavelet transform (DWT) to effectively capture splicing artifacts inside an image. AMFE is used as a new fractional texture descriptor, while DWT is applied to decompose the input image into a number of sub-images with different frequency bands. The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors. Full article
(This article belongs to the Special Issue The Fractional View of Complexity)
Show Figures

Figure 1

20 pages, 6667 KB  
Article
An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features
by Chengyou Wang, Zhi Zhang and Xiao Zhou
Symmetry 2018, 10(12), 706; https://doi.org/10.3390/sym10120706 - 3 Dec 2018
Cited by 44 | Viewed by 7655
Abstract
The popularity of image editing software has made it increasingly easy to alter the content of images. These alterations threaten the authenticity and integrity of images, causing misjudgments and possibly even affecting social stability. The copy-move technique is one of the most commonly [...] Read more.
The popularity of image editing software has made it increasingly easy to alter the content of images. These alterations threaten the authenticity and integrity of images, causing misjudgments and possibly even affecting social stability. The copy-move technique is one of the most commonly used approaches for manipulating images. As a defense, the image forensics technique has become popular for judging whether a picture has been tampered with via copy-move, splicing, or other forgery techniques. In this paper, a scheme based on accelerated-KAZE (A-KAZE) and speeded-up robust features (SURF) is proposed for image copy-move forgery detection (CMFD). It is difficult for most keypoint-based CMFD methods to obtain sufficient points in smooth regions. To remedy this defect, the response thresholds for the A-KAZE and SURF feature detection stages are set to small values in the proposed method. In addition, a new correlation coefficient map is presented, in which the duplicated regions are demarcated, combining filtering and mathematical morphology operations. Numerous experiments are conducted to demonstrate the effectiveness of the proposed method in searching for duplicated regions and its robustness against distortions and post-processing techniques, such as noise addition, rotation, scaling, image blurring, joint photographic expert group (JPEG) compression, and hybrid image manipulation. The experimental results demonstrate that the performance of the proposed scheme is superior to that of other tested CMFD methods. Full article
(This article belongs to the Special Issue Emerging Data Hiding Systems in Image Communications)
Show Figures

Figure 1

11 pages, 872 KB  
Article
Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection
by Rabha W. Ibrahim, Zahra Moghaddasi, Hamid A. Jalab and Rafidah Md Noor
Entropy 2015, 17(7), 4775-4785; https://doi.org/10.3390/e17074775 - 8 Jul 2015
Cited by 34 | Viewed by 6196
Abstract
Image splicing is a common operation in image forgery. Different techniques of image splicing detection have been utilized to regain people’s trust. This study introduces a texture enhancement technique involving the use of fractional differential masks based on the Machado entropy. The masks [...] Read more.
Image splicing is a common operation in image forgery. Different techniques of image splicing detection have been utilized to regain people’s trust. This study introduces a texture enhancement technique involving the use of fractional differential masks based on the Machado entropy. The masks slide over the tampered image, and each pixel of the tampered image is convolved with the fractional mask weight window on eight directions. Consequently, the fractional differential texture descriptors are extracted using the gray-level co-occurrence matrix for image splicing detection. The support vector machine is used as a classifier that distinguishes between authentic and spliced images. Results prove that the achieved improvements of the proposed algorithm are compatible with other splicing detection methods. Full article
(This article belongs to the Special Issue Complex and Fractional Dynamics)
Show Figures

Back to TopTop