Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Face Forgery Detection via Multi-Scale Dual-Modality Mutual Enhancement Network

    Yuanqing Ding1,2, Hanming Zhai1, Qiming Ma1, Liang Zhang1, Lei Shao2, Fanliang Bu1,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 905-923, 2025, DOI:10.32604/cmc.2025.066307 - 29 August 2025

    Abstract As the use of deepfake facial videos proliferate, the associated threats to social security and integrity cannot be overstated. Effective methods for detecting forged facial videos are thus urgently needed. While many deep learning-based facial forgery detection approaches show promise, they often fail to delve deeply into the complex relationships between image features and forgery indicators, limiting their effectiveness to specific forgery techniques. To address this challenge, we propose a dual-branch collaborative deepfake detection network. The network processes video frame images as input, where a specialized noise extraction module initially extracts the noise feature maps.… More >

  • Open Access

    REVIEW

    A Survey of Image Forensics: Exploring Forgery Detection in Image Colorization

    Saurabh Agarwal1, Deepak Sharma2, Nancy Girdhar3, Cheonshik Kim4, Ki-Hyun Jung5,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4195-4221, 2025, DOI:10.32604/cmc.2025.066202 - 30 July 2025

    Abstract In today’s digital era, the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation. Unfortunately, this progress has also given rise to the misuse of manipulated images across various domains. One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images. This paper offers a comprehensive survey of existing methodologies for detecting image tampering, shedding light on the diverse approaches employed in the field of contemporary image forensics. The methods used to identify image forgery can be broadly classified into… More >

  • Open Access

    ARTICLE

    Deepfake Detection Using Adversarial Neural Network

    Priyadharsini Selvaraj1,*, Senthil Kumar Jagatheesaperumal2, Karthiga Marimuthu1, Oviya Saravanan1, Bader Fahad Alkhamees3, Mohammad Mehedi Hassan3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 1575-1594, 2025, DOI:10.32604/cmes.2025.064138 - 30 May 2025

    Abstract With expeditious advancements in AI-driven facial manipulation techniques, particularly deepfake technology, there is growing concern over its potential misuse. Deepfakes pose a significant threat to society, particularly by infringing on individuals’ privacy. Amid significant endeavors to fabricate systems for identifying deepfake fabrications, existing methodologies often face hurdles in adjusting to innovative forgery techniques and demonstrate increased vulnerability to image and video clarity variations, thereby hindering their broad applicability to images and videos produced by unfamiliar technologies. In this manuscript, we endorse resilient training tactics to amplify generalization capabilities. In adversarial training, models are trained using More >

  • Open Access

    ARTICLE

    Image Copy-Move Forgery Detection and Localization Method Based on Sequence-to-Sequence Transformer Structure

    Gang Hao, Peng Liang*, Ziyuan Li, Huimin Zhao, Hong Zhang

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5221-5238, 2025, DOI:10.32604/cmc.2025.055739 - 06 March 2025

    Abstract In recent years, the detection of image copy-move forgery (CMFD) has become a critical challenge in verifying the authenticity of digital images, particularly as image manipulation techniques evolve rapidly. While deep convolutional neural networks (DCNNs) have been widely employed for CMFD tasks, they are often hindered by a notable limitation: the progressive reduction in spatial resolution during the encoding process, which leads to the loss of critical image details. These details are essential for the accurate detection and localization of image copy-move forgery. To overcome the limitations of existing methods, this paper proposes a Transformer-based… More >

  • Open Access

    ARTICLE

    IMTNet: Improved Multi-Task Copy-Move Forgery Detection Network with Feature Decoupling and Multi-Feature Pyramid

    Huan Wang1, Hong Wang1, Zhongyuan Jiang2,*, Qing Qian1, Yong Long1

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4603-4620, 2024, DOI:10.32604/cmc.2024.053740 - 12 September 2024

    Abstract Copy-Move Forgery Detection (CMFD) is a technique that is designed to identify image tampering and locate suspicious areas. However, the practicality of the CMFD is impeded by the scarcity of datasets, inadequate quality and quantity, and a narrow range of applicable tasks. These limitations significantly restrict the capacity and applicability of CMFD. To overcome the limitations of existing methods, a novel solution called IMTNet is proposed for CMFD by employing a feature decoupling approach. Firstly, this study formulates the objective task and network relationship as an optimization problem using transfer learning. Furthermore, it thoroughly discusses… More >

  • Open Access

    ARTICLE

    Image Splicing Forgery Detection Using Feature-Based of Sonine Functions and Deep Features

    Ala’a R. Al-Shamasneh1, Rabha W. Ibrahim2,3,4,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 795-810, 2024, DOI:10.32604/cmc.2023.042755 - 30 January 2024

    Abstract The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic. One of the most popular methods for manipulating digital images is image splicing, which involves copying a specific area from one image and pasting it into another. Attempts were made to mitigate the effects of image splicing, which continues to be a significant research challenge. This study proposes a new splicing detection model, combining Sonine functions-derived convex-based features and deep features. Two stages make up the proposed method. The first step entails feature extraction, then… More >

  • Open Access

    ARTICLE

    Weber Law Based Approach for Multi-Class Image Forgery Detection

    Arslan Akram1,3, Javed Rashid2,3,4, Arfan Jaffar1, Fahima Hajjej5, Waseem Iqbal6, Nadeem Sarwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 145-166, 2024, DOI:10.32604/cmc.2023.041074 - 30 January 2024

    Abstract Today’s forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy-Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy-Move and splicing images using texture information of images in the spatial domain. Firstly, More >

  • Open Access

    ARTICLE

    Deep Learning-Based Digital Image Forgery Detection Using Transfer Learning

    Emad Ul Haq Qazi1,*, Tanveer Zia1, Muhammad Imran2, Muhammad Hamza Faheem1

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 225-240, 2023, DOI:10.32604/iasc.2023.041181 - 27 February 2024

    Abstract Deep learning is considered one of the most efficient and reliable methods through which the legitimacy of a digital image can be verified. In the current cyber world where deepfakes have shaken the global community, confirming the legitimacy of a digital image is of great importance. With the advancements made in deep learning techniques, now we can efficiently train and develop state-of-the-art digital image forensic models. The most traditional and widely used method by researchers is convolution neural networks (CNN) for verification of image authenticity but it consumes a considerable number of resources and requires… More >

  • Open Access

    ARTICLE

    A New Method for Image Tamper Detection Based on an Improved U-Net

    Jie Zhang, Jianxun Zhang*, Bowen Li, Jie Cao, Yifan Guo

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2883-2895, 2023, DOI:10.32604/iasc.2023.039805 - 11 September 2023

    Abstract With the improvement of image editing technology, the threshold of image tampering technology decreases, which leads to a decrease in the authenticity of image content. This has also driven research on image forgery detection techniques. In this paper, a U-Net with multiple sensory field feature extraction (MSCU-Net) for image forgery detection is proposed. The proposed MSCU-Net is an end-to-end image essential attribute segmentation network that can perform image forgery detection without any pre-processing or post-processing. MSCU-Net replaces the single-scale convolution module in the original network with an improved multiple perceptual field convolution module so that More >

  • Open Access

    ARTICLE

    OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification

    M. Muzaffar Hameed1,2, Rodina Ahmad1,*, Laiha Mat Kiah1, Ghulam Murtaza3, Noman Mazhar1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1267-1289, 2023, DOI:10.32604/cmc.2023.035063 - 08 June 2023

    Abstract Offline signature verification (OfSV) is essential in preventing the falsification of documents. Deep learning (DL) based OfSVs require a high number of signature images to attain acceptable performance. However, a limited number of signature samples are available to train these models in a real-world scenario. Several researchers have proposed models to augment new signature images by applying various transformations. Others, on the other hand, have used human neuromotor and cognitive-inspired augmentation models to address the demand for more signature samples. Hence, augmenting a sufficient number of signatures with variations is still a challenging task. This… More >

Displaying 1-10 on page 1 of 22. Per Page