{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:02:21Z","timestamp":1775066541991,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030578046","type":"print"},{"value":"9783030578053","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_19","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"197-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Detection of Artificial Images and Changes in Real Images Using Convolutional Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9651-9525","authenticated-orcid":false,"given":"Mariusz","family":"Kubanek","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5213-2836","authenticated-orcid":false,"given":"Kamila","family":"Bart\u0142omiejczyk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3345-604X","authenticated-orcid":false,"given":"Janusz","family":"Bobulski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"issue":"3","key":"19_CR1","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1080\/00450618.2016.1153711","volume":"49","author":"K Asghar","year":"2017","unstructured":"Asghar, K., Habib, Z., Hussain, M.: Copy-move and splicing image forgery detection and localization techniques: a review. Australian J. Foren. Sci. 49(3), 281\u2013307 (2017)","journal-title":"Australian J. Foren. Sci."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5\u201310. ACM (2016)","DOI":"10.1145\/2909827.2930786"},{"key":"19_CR3","unstructured":"Bobulski, J., Kubanek, M.: Cnn use for plastic garbage classification method. In: 25th ACM SIGKDD Conference on Knowledge Discovery and Mining (2019)"},{"issue":"3","key":"19_CR4","first-page":"02908","volume":"63","author":"B Chen","year":"2017","unstructured":"Chen, B., Li, H., Luo, W.: Image processing operations identification via convolutional neural network. Inf. Sci. 63(3), 02908 (2017)","journal-title":"Inf. Sci."},{"issue":"12","key":"19_CR5","doi-asserted-by":"publisher","first-page":"4699","DOI":"10.1109\/TIP.2013.2277814","volume":"22","author":"C Chen","year":"2013","unstructured":"Chen, C., Ni, J., Huang, J.: Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans. Image Process. 22(12), 4699\u20134710 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"11","key":"19_CR6","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Signal Process. Lett. 22(11), 1849\u20131853 (2015)","journal-title":"IEEE Signal Process. Lett."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Choras, M., Gielczyk, A., Demestichas, K.P., Puchalski, D., Kozik, R.: Pattern recognition solutions for fake news detection. In: Computer Information Systems and Industrial Management 2018, LNCS, vol. 11127, pp. 130\u2013139 (2018)","DOI":"10.1007\/978-3-319-99954-8_12"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 159\u2013164. ACM (2017)","DOI":"10.1145\/3082031.3083247"},{"key":"19_CR9","first-page":"539","volume":"2","author":"P Deshpande","year":"2012","unstructured":"Deshpande, P.: Pixel based digital image forgery detection techniques. IJERA 2, 539\u2013543 (2012)","journal-title":"IJERA"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-length and edge statistics based approach for image splicing detection. In: Digital Water-marking, IWDW 2008, LNCS, vol. 5450, pp. 76\u201387 (2008)","DOI":"10.1007\/978-3-642-04438-0_7"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s10044-014-0396-4","volume":"18","author":"ES El-Alfy","year":"2015","unstructured":"El-Alfy, E.S., Qureshi, M.A.: Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal. Appl. 18, 713\u2013723 (2015)","journal-title":"Pattern Anal. Appl."},{"key":"19_CR12","unstructured":"Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Digital Forensic Research Workshop (2003)"},{"issue":"1","key":"19_CR13","first-page":"84","volume":"38","author":"A Gelfert","year":"2018","unstructured":"Gelfert, A.: Fake news: a definition. Informal Logic, Special Issue Reason Rhetoric Time Alternat. Facts 38(1), 84\u2013117 (2018)","journal-title":"Informal Logic, Special Issue Reason Rhetoric Time Alternat. Facts"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.patcog.2017.10.013","volume":"77","author":"J Gua","year":"2018","unstructured":"Gua, J., Wangb, Z., Kuenb, J., Mab, L., Shahroudyb, A., Shuaib, B., Liub, T., Wangb, X., Wangb, L., Wangb, G., Caic, J., Chenc, T.: Recent advances in convolutional neural networks. Pattern Recogn. 77, 354\u2013377 (2018)","journal-title":"Pattern Recogn."},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"370","DOI":"10.3390\/app10010370","volume":"10","author":"C Hsu","year":"2020","unstructured":"Hsu, C., Zhuang, Y.X., Lee, C.Y.: Deep fake image detection based on pairwise learning. Appl. Sci. 10(1), 370 (2020)","journal-title":"Appl. Sci."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Huang, H., Ciou, A.: Copy-move forgery detection for image forensics using the super-pixel segmentation and the Helmert transformation. EURASIP J. Image Video Process. 68 (2019)","DOI":"10.1186\/s13640-019-0469-9"},{"key":"19_CR17","unstructured":"Huaxiao, M., Chen, B., Luo, W.: Fake faces identification via convolutional neural network. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 43\u201347. ACM (2018)"},{"key":"19_CR18","unstructured":"kaggle, January 2020. \nhttps:\/\/www.kaggle.com\/ciplab\/real-and-fake-face-detection\n\n. Accessed 07 Jan 2020"},{"key":"19_CR19","unstructured":"Karras, T., Nvidia, January 2020. \nhttps:\/\/generated.photos\/faces\n\n. Accessed 12 Jan 2020"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Ksieniewicz, P., Choras, M., Kozik, R., Wozniak, M.: Machine learning methods for fake news classification. In: Intelligent Data Engineering and Automated Learning - IDEAL 2019, LNCS, vol. 11872, pp. 332\u2013339 (2019)","DOI":"10.1007\/978-3-030-33617-2_34"},{"issue":"9","key":"19_CR21","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.3390\/sym11091185","volume":"11","author":"M Kubanek","year":"2019","unstructured":"Kubanek, M., Bobulski, J., Kulawik, J.: A method of speech coding for speech recognition using a convolutional neural network. Symmetry 11(9), 1185 (2019)","journal-title":"Symmetry"},{"key":"19_CR22","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2015.03.009","volume":"321","author":"JC Lee","year":"2015","unstructured":"Lee, J.C., Chang, C.P., Chen, W.K.: Detection of copy-move image forgery using histogram of orientated gradients. Inf. Sci. 321, 250\u2013262 (2015)","journal-title":"Inf. Sci."},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Li, W., Yu, N.: Rotation robust detection of copy-move forgery. In: IEEE International Conference on Image Processing, pp. 2113\u20132116 (2010)","DOI":"10.1109\/ICIP.2010.5652519"},{"issue":"2","key":"19_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TMM.2003.811621","volume":"5","author":"C Lu","year":"2003","unstructured":"Lu, C., Liao, H.M., Member, S.: Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimedia 5(2), 161\u2013173 (2003)","journal-title":"IEEE Trans. Multimedia"},{"key":"19_CR25","unstructured":"MathWorks, April 2020. \nhttps:\/\/www.mathworks.com\/help\/deeplearning\n\n. Accessed 26 Apr 2020"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Meena, K.B., Tyagi, V.: Image forgery detection: Survey and future directions. In: Data, Engineering and Applications (2019)","DOI":"10.1007\/978-981-13-6351-1_14"},{"key":"19_CR27","unstructured":"Ng, T., Chang, S., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE International Symposium on Circuits Systems, pp. 7\u201310 (2004)"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Park, T.H., Han, J.G., Moon, Y.H., Eom, I.K.: Image splicing detection based on inter-scale 2d joint characteristics functions moments in wavelet domain. EURASIP J. Image Video Process. 30 (2016)","DOI":"10.1186\/s13640-016-0136-3"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics, vol. 9409 (2015)","DOI":"10.1117\/12.2083479"},{"issue":"8","key":"19_CR30","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TIFS.2013.2272377","volume":"8","author":"SJ Ryu","year":"2013","unstructured":"Ryu, S.J., Kirchner, M., Lee, M.J., Lee, H.K.: Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans. Inf. Forensics Secur. 8(8), 1355\u20131370 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of 9th Workshop Multimedia Security, pp. 51\u201362 (2007)","DOI":"10.1145\/1288869.1288878"},{"issue":"9","key":"19_CR32","first-page":"165","volume":"2","author":"P Singh","year":"2013","unstructured":"Singh, P., Chadha, R.S.: A survey of digital watermarking techniques, applications and attacks. Int. J. Eng. Innovat. Technol. 2(9), 165\u2013175 (2013)","journal-title":"Int. J. Eng. Innovat. Technol."},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Wang, L., Ouyang, W., Wang, X., Lu, H.: Visual tracking with fully convolutional networks. In: Proceedings of International Conference on Computer Vision (ICCV), pp. 3119\u20133127 (2015)","DOI":"10.1109\/ICCV.2015.357"},{"key":"19_CR34","unstructured":"Wikipedia, April 2020. \nhttps:\/\/en.wikipedia.org\/wiki\/Deepfake\n\n. Accessed 25 Apr 2020"},{"issue":"2","key":"19_CR35","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TCSVT.2014.2347513","volume":"25","author":"X Zhao","year":"2015","unstructured":"Zhao, X., Wang, S., Li, S., Li, J.: Passive image-splicing detection by a 2-d noncausal Markov model. IEEE Trans. Circuits Syst. Video Technol. 25(2), 185\u2013199 (2015)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR36","doi-asserted-by":"publisher","first-page":"3212","DOI":"10.1109\/TNNLS.2018.2876865","volume":"30","author":"Z Zhong-Qiu","year":"2019","unstructured":"Zhong-Qiu, Z., Peng, Z., Shou-tao, X., Xindong, W.: Object detection with deep learning: a review. IEEE Trans. Neural Networks Learn. Syst. 30, 3212\u20133232 (2019)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:10:54Z","timestamp":1599477054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_19","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}