{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T23:42:59Z","timestamp":1776814979349,"version":"3.51.2"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This study proposes a hybrid deep learning framework for detecting face morphing and swapping attacks using texture descriptors and advanced CNN classifiers. The process begins with the Viola-Jones Haar cascade, a widely used face detection method that effectively identifies and isolates facial regions. Subsequently, Local Binary Patterns (LBP) and Gabor filters are applied to extract texture-based features from these facial regions. Finally, the classification stage employs Simple Convolutional Neural Networks (CNN), Custom CNN and ResNet-152 to effectively distinguish between authentic and tampered images. We integrate LBP and Gabor filters to extract robust texture features and classify them using a combination of Simple CNN, Custom CNN, and ResNet-152. Our approach achieves an ACER of 2.82% on the DEFACTO dataset, outperforming several state-of-the-art methods. Additionally, the paper presents ablation studies that confirm the complementary benefits of LBP and Gabor features in enhancing detection performance and benchmarking against five state-of-the-art methods, followed by a detailed analysis of model performance.<\/jats:p>","DOI":"10.1007\/s10791-025-09731-x","type":"journal-article","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T05:47:32Z","timestamp":1761803252000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid CNN-based detection of forged facial images using Gabor filters and local binary patterns"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4134-2942","authenticated-orcid":false,"given":"Shilpa","family":"Kaman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1005-5238","authenticated-orcid":false,"given":"Syeda Bibi","family":"Javeriya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1217-8415","authenticated-orcid":false,"given":"Aziz","family":"Makandar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,30]]},"reference":[{"key":"9731_CR1","doi-asserted-by":"crossref","unstructured":"Wen D, Han H, Jain AK. Face spoof detection with image distortion analysis, information forensics and security. IEEE Trans. 2015;10(4):746\u201361.","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"9731_CR2","doi-asserted-by":"publisher","unstructured":"Zhang Y, Zheng L, Thing VLL. Processing I 2. Automated face swapping and its detection, (ICSIP), Singapore, 2017, pp. 15\u201319. https:\/\/doi.org\/10.1109\/SIPROCESS.2017.8124497.","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"issue":"4","key":"9731_CR3","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen D, Han H, Jain AK. Face spoof detection with image distortion analysis[J]. IEEE Trans Inf Forensics Secur. 2015;10(4):746\u201361.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9731_CR4","unstructured":"Lian B. https:\/\/en.wikipedia.org\/wiki\/Bian_lian."},{"key":"9731_CR5","unstructured":"Face Swap Booth. photo faceswap & face changer. https:\/\/itunes.apple.com\/us\/app\/face-swap-booth-photo-faceswapface-changer\/id826921329?mt=8."},{"key":"9731_CR6","unstructured":"Auto F, Swap. https:\/\/www.microsoft.com\/en-us\/store\/p\/auto-faceswap\/9nblggh3m5nq."},{"key":"9731_CR7","unstructured":"Face S, Live. http:\/\/faceswaplive.com\/."},{"key":"9731_CR8","unstructured":"Merkle J, Rathgeb C, Scherhag U, Busch C, Breithaupt R. Face morphing detection: issues and challenges. In: Proceedings of the international conference on biometrics for borders (ICBB). 2019."},{"key":"9731_CR9","doi-asserted-by":"crossref","unstructured":"Ngan M, Grother P, Hanaoka K, Kuo J. Face recognition vendor test (FRVT) part 4: Morph-performance of automated face morph detection. Technical report, National Institute of Standards and Technology (NIST). 2020.","DOI":"10.6028\/NIST.IR.8292"},{"key":"9731_CR10","doi-asserted-by":"crossref","unstructured":"Raja K, Ferrara M, Franco A, Spreeuwers L, Batskos I, et al. Morphing attack detection- database, evaluation platform and benchmarking. IEEE Trans Inf Forensics Secu; 2020.","DOI":"10.1109\/TIFS.2020.3035252"},{"key":"9731_CR11","doi-asserted-by":"crossref","unstructured":"Raghavendra R, Raja KB, Busch C. Detecting morphed face images. In: Proceedings of the 8th international conference on biometrics theory, applications and systems (BTAS). IEEE. 2016.","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"9731_CR12","doi-asserted-by":"crossref","unstructured":"Schelhag U, Kunze J, Rathgeb C, Busch C. Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach. IET Biometrics. 2020;9(6):278\u201389.","DOI":"10.1049\/iet-bmt.2019.0206"},{"key":"9731_CR13","doi-asserted-by":"crossref","unstructured":"Scherhag U, Ramachandra R, Raja KB, Gomez-Barrero M, Rathgeb C, Busch C. On the vulnerability of face recognition systems towards morphed face attacks. In: Proceedings of the 5th international workshop on biometrics and forensics (IWBF). IEEE. 2017.","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"9731_CR14","doi-asserted-by":"crossref","unstructured":"Scherhag U, Debiasi L, Rathgeb C, Busch C, Uhl A. Detection of face morphing attacksbased on PRNU analysis. IEEE Trans Biom Behav Identity Sci (T-BIOM), 2019. pp 1\u201316.","DOI":"10.1109\/TBIOM.2019.2942395"},{"key":"9731_CR15","doi-asserted-by":"crossref","unstructured":"Zhang LB, Peng F, Long M. Face morphing detection using fourier spectrum of sensor pattern noise. In: Proceedings of the 2018 international conference on multimedia and expo (ICME). IEEE; 2018.","DOI":"10.1109\/ICME.2018.8486607"},{"key":"9731_CR16","doi-asserted-by":"crossref","unstructured":"Ferrara M, Franco A, Maltoni D. Face morphing detection in the presence of printing\/ scanning and heterogeneous image sources. IET-Biometrics, 2021. pp 1\u201313.","DOI":"10.1049\/bme2.12021"},{"key":"9731_CR17","doi-asserted-by":"crossref","unstructured":"Raghavendra R, Raja KB, Venkatesh S, Busch C. Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: Proceedings of the 2017 conference on computer vision and pattern recognition workshops (CVPRW). IEEE; 2017.","DOI":"10.1109\/CVPRW.2017.228"},{"key":"9731_CR18","doi-asserted-by":"publisher","unstructured":"Viola P, Jones M. Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE computer society conference on computer vision and pattern recognition, 2001;1: I-511\u2013I-518. https:\/\/doi.org\/10.1109\/CVPR.2001.990517.","DOI":"10.1109\/CVPR.2001.990517"},{"key":"9731_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-4035-3_9","volume-title":"Computational advancement in communication, circuits and systems","author":"M Ghosh","year":"2022","unstructured":"Ghosh M, Sarkar T, Chokhani D, Dey A. Face detection and extraction using Viola\u2013Jones algorithm. In: Mitra M, Nasipuri M, Kanjilal MR, editors. Computational advancement in communication, circuits and systems. Lecture Notes in Electrical Engineering. Volume 786. Singapore: Springer; 2022. https:\/\/doi.org\/10.1007\/978-981-16-4035-3_9."},{"key":"9731_CR20","doi-asserted-by":"crossref","unstructured":"Amani A, Alahmadi M, Hussain, HatimAboalsamh G, Muhammad G, Bebis. Splicing image forgery detection based on DCT and Local Binary Pattern in Global Conference on Signal and Information Processing (GlobalSIP), IEEE; 2013. pp. 253\u2013256.","DOI":"10.1109\/GlobalSIP.2013.6736863"},{"key":"9731_CR21","doi-asserted-by":"crossref","unstructured":"Ojala T, Pietikainen M, Maenpaa T. Multiresolution gray-scale and rotation invariant texture classification with local binary patternspattern analysis and machine intelligence. IEEE Trans. 2002;24(7):971\u201387.","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"9731_CR22","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1007\/s11277-018-5377-2","volume":"103","author":"YF Li","year":"2018","unstructured":"Li YF, Lu ZY, Li J, Deng Y. Improving deep learning feature with facial texture feature for face recognition. Wirel Pers Commun. 2018;103:1195\u2013206.","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"9731_CR23","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.3934\/mbe.2020082","volume":"17","author":"Q Zhang","year":"2020","unstructured":"Zhang Q, Li H, Li M, Ding L. Feature extraction of face image based on LBP and 2-D Gabor wavelet transform. Math Biosci Eng. 2020;17(2):1578\u201392. https:\/\/doi.org\/10.3934\/mbe.2020082.","journal-title":"Math Biosci Eng"},{"key":"9731_CR24","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.procs.2015.03.149","volume":"45","author":"TM Abhishree","year":"2015","unstructured":"Abhishree TM, Latha J, Manikantan K, Ramachandran S. Face recognition using Gabor filter based feature extraction with anisotropic diffusion as a Pre-processing technique. Procedia Comput Sci. 2015;45:312\u201321. https:\/\/doi.org\/10.1016\/j.procs.2015.03.149. ISSN 1877\u2009\u2013\u20090509.","journal-title":"Procedia Comput Sci"},{"key":"9731_CR25","doi-asserted-by":"publisher","unstructured":"LeCun Y, Bengio Y, Hinton G. Deep learning. Nature. 2015;521(7553):436\u201344. https:\/\/doi.org\/10.1038\/nature14539.","DOI":"10.1038\/nature14539"},{"key":"9731_CR26","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.cogsys.2018.04.002","volume":"50","author":"A Akula","year":"2018","unstructured":"Akula A, Shah AK, Ghosh R. Deep learning approach for human action recognition in infrared images. Cogn Sys Res. 2018;50:146\u201354.","journal-title":"Cogn Sys Res"},{"key":"9731_CR27","unstructured":"Farhadi F. Learning activation functions in deep neural networks. Ph.D. Thesis, \u00c9cole Polytechnique de Montr\u00e9al, Montr\u00e9al, QC, Canada, 2017."},{"key":"9731_CR28","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 2016, pp. 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90.","DOI":"10.1109\/CVPR.2016.90"},{"key":"9731_CR29","doi-asserted-by":"publisher","unstructured":"Mahfoudi G, Tajini B, Retraint F, Morain-nicolier F, Dugelay JL, Pic M, DEFACTO: image and face manipulation dataset, 2019 27th European Signal Processing Conference (EUSIPCO), Coruna A. Spain, 2019, pp. 1\u20135. https:\/\/doi.org\/10.23919\/EUSIPCO.2019.8903181.","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"issue":"2","key":"9731_CR30","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/S1007-0214(11)70032-3","volume":"16","author":"C Shu","year":"2011","unstructured":"Shu C, Ding X, Fang C. Histogram of the oriented gradient for face recognition. Tsinghua Sci Technol. 2011;16(2):216\u201324.","journal-title":"Tsinghua Sci Technol"},{"key":"9731_CR31","unstructured":"Kannala J, Rahtu E. BSIF: binarized statistical image features. In Proceedings of the ICPR, pp. 1363\u20131366, Tsukuba, Japan, 11\u201315, 2012."},{"key":"9731_CR32","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia YQ et al. Going deeper with convolutions. In Proceedings of the CVPR, pp. 1\u20139, Boston, MA, 7\u201312, 2015.","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"9731_CR33","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In Proceedings of the CVPR, pp. 770\u2013778, Las Vegas, NV, USA, 2016.","DOI":"10.1109\/CVPR.2016.90"},{"key":"9731_CR34","doi-asserted-by":"crossref","unstructured":"Sandler M, Howard AG, Zhu M, Zhmoginov A, Chen L. MobileNetV2: inverted residuals and linear bottlenecks, in Proceedings of the CVPR, pp. 4510\u20134520, Salt Lake City, UT, USA, 18\u201323, 2018.","DOI":"10.1109\/CVPR.2018.00474"},{"key":"9731_CR35","doi-asserted-by":"crossref","unstructured":"Li Y, Chang M-C, and Siwei Lyu. Exposing deep fakes using inconsistent head posesfacial landmarks. Proceedings of the IEEE\/CVF Conference on Computer VisionPattern Recognition Workshops. 2019.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"9731_CR36","doi-asserted-by":"crossref","unstructured":"Durall R, Keuper M, Keuper J. Watch your up-convolution: CNN based generative deep neural networks are failing to reproduce spectral distributions. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020.","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"9731_CR37","doi-asserted-by":"crossref","unstructured":"Wang S-Y, Wang O, Zhang R, Owens A, Efros AA. CNN-generated images are surprisingly easy to spot\u2026 for now. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020.","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"9731_CR38","unstructured":"Zhang J, Li D, Yang X. Detecting GAN-generated fake images using co-occurrence matrices. 2019 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2019."},{"key":"9731_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-84460-7_32","volume-title":"Advances in information and communication. FICC 2025. Lecture notes in networks and systems","author":"SAB Pacheco","year":"2025","unstructured":"Pacheco SAB, Estrada JE, Goyani MM. Robust face recognition under adversarial attack using SARGAN model and improved cross triple MobileNetV1. In: Arai K, editor. Advances in information and communication. FICC 2025. Lecture notes in networks and systems. Volume 1285. Cham: Springer; 2025. https:\/\/doi.org\/10.1007\/978-3-031-84460-7_32."}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09731-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09731-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09731-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T05:47:45Z","timestamp":1761803265000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09731-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,30]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9731"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09731-x","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,30]]},"assertion":[{"value":"21 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study does not involve any experiments on human participants or animals. The research was conducted using publicly available datasets that are intended for academic use. Therefore, ethical approval was not required.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable. The datasets used in this study are publicly available, and no identifiable personal data were published. All authors consent to the publication of this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"244"}}