{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T03:18:39Z","timestamp":1776136719613,"version":"3.50.1"},"reference-count":159,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:00:00Z","timestamp":1769558400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100019409","name":"Fortum and Neste Foundation","doi-asserted-by":"publisher","award":["20250235"],"award-info":[{"award-number":["20250235"]}],"id":[{"id":"10.13039\/501100019409","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006196","name":"Oulun Yliopisto","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006196","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Research Council of Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.eswa.2026.131347","type":"journal-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:34:19Z","timestamp":1769560459000},"page":"131347","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Deployable image forgery detection and localization: A comprehensive review and practitioner\u00b4s guide"],"prefix":"10.1016","volume":"311","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9760-5374","authenticated-orcid":false,"given":"Maryam","family":"Munawar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4422-8723","authenticated-orcid":false,"given":"Mourad","family":"Oussalah","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2026.131347_bib0001","doi-asserted-by":"crossref","first-page":"37757","DOI":"10.1109\/ACCESS.2024.3370411","article-title":"Optimal semi-fragile watermarking based on maximum entropy random walk and swin transformer for tamper localization","volume":"12","author":"Aberna","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2026.131347_bib0002","series-title":"2025 8th international conference on information and computer technologies (ICICT)","first-page":"492","article-title":"Triple-stream SWIN transformer based encoder-decoder for image forgery localization","author":"Agarwal","year":"2025"},{"issue":"2","key":"10.1016\/j.eswa.2026.131347_bib0003","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.fcij.2018.03.001","article-title":"A fast SIFT based method for copy move forgery detection","volume":"3","author":"Alberry","year":"2018","journal-title":"Future Computing and Informatics Journal"},{"issue":"9","key":"10.1016\/j.eswa.2026.131347_bib0004","doi-asserted-by":"crossref","first-page":"12681","DOI":"10.1007\/s11042-022-12374-5","article-title":"A passive image forensic scheme based on an adaptive and hybrid techniques","volume":"81","author":"Alhaidery","year":"2022","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0005","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.jksuci.2022.12.014","article-title":"A robust detection and localization technique for copy-move forgery in digital images","volume":"35","author":"Alhaidery","year":"2023","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"3","key":"10.1016\/j.eswa.2026.131347_bib0006","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","article-title":"A sift-based forensic method for copy-move attack detection and transformation recovery","volume":"6","author":"Amerini","year":"2011","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0007","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/09747338.2014.921415","article-title":"Pixel-based image forgery detection: A review","volume":"55","author":"Ansari","year":"2014","journal-title":"IETE Journal of Education"},{"key":"10.1016\/j.eswa.2026.131347_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112068","article-title":"Image forgery detection by combining visual transformer with variational autoencoder network","volume":"165","author":"Atak","year":"2024","journal-title":"Applied Soft Computing"},{"issue":"2","key":"10.1016\/j.eswa.2026.131347_bib0009","doi-asserted-by":"crossref","first-page":"42","DOI":"10.3390\/jimaging10020042","article-title":"Image inpainting forgery detection: A review","volume":"10","author":"Barglazan","year":"2024","journal-title":"Journal of Imaging"},{"key":"10.1016\/j.eswa.2026.131347_bib0010","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1109\/TIFS.2020.3045903","article-title":"Copy move source-target disambiguation through multi-branch CNNs","volume":"16","author":"Barni","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2026.131347_bib0011","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.patcog.2018.03.028","article-title":"Fast copy-move forgery detection using local bidirectional coherency error refinement","volume":"81","author":"Bi","year":"2018","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0012","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","first-page":"1","article-title":"Rru-net: The ringed residual u-net for image splicing forgery detection","author":"Bi","year":"2019"},{"issue":"3","key":"10.1016\/j.eswa.2026.131347_bib0013","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1128\/mBio.00809-16","article-title":"The prevalence of inappropriate image duplication in biomedical research publications","volume":"7","author":"Bik","year":"2016","journal-title":"MBio"},{"key":"10.1016\/j.eswa.2026.131347_bib0014","series-title":"2017 IEEE Conference on computer vision and pattern recognition workshops (CVPRW)","first-page":"1855","article-title":"Tampering detection and localization through clustering of camera-based CNN features","author":"Bondi","year":"2017"},{"key":"10.1016\/j.eswa.2026.131347_bib0015","unstructured":"Cai, L., Wang, H., Ji, J., ZhouMen, Y., Ma, Y., Sun, X., Cao, L., & Ji, R. (2025). Zooming in on fakes: A novel dataset for localized AI-generated image detection with forgery amplification approach. arXiv: 2504.11922."},{"issue":"4","key":"10.1016\/j.eswa.2026.131347_bib0016","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3390\/jimaging7040069","article-title":"A comprehensive review of deep-learning-based methods for image forensics","volume":"7","author":"Castillo Camacho","year":"2021","journal-title":"Journal of Imaging"},{"key":"10.1016\/j.eswa.2026.131347_bib0017","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"5087","article-title":"Image splicing detection via camera response function analysis","author":"Chen","year":"2017"},{"issue":"2","key":"10.1016\/j.eswa.2026.131347_bib0018","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/s00530-021-00801-w","article-title":"Hybrid features and semantic reinforcement network for image forgery detection","volume":"28","author":"Chen","year":"2022","journal-title":"Multimedia Systems"},{"issue":"4","key":"10.1016\/j.eswa.2026.131347_bib0019","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","article-title":"Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs","volume":"40","author":"Chen","year":"2017","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.eswa.2026.131347_bib0020","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"14185","article-title":"Image manipulation detection by multi-view multi-scale supervision","author":"Chen","year":"2021"},{"key":"10.1016\/j.eswa.2026.131347_bib0021","article-title":"Image splicing forgery detection using simplified generalized noise model","volume":"107","author":"Chen","year":"2022","journal-title":"Signal Processing: Image Communication"},{"key":"10.1016\/j.eswa.2026.131347_bib0022","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1016\/j.procs.2024.04.070","article-title":"Image forgery detection system using VGG16 UNET model","volume":"235","author":"Choudhary","year":"2024","journal-title":"Procedia Computer Science"},{"issue":"6","key":"10.1016\/j.eswa.2026.131347_bib0023","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","article-title":"An evaluation of popular copy-move forgery detection approaches","volume":"7","author":"Christlein","year":"2012","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"10.1016\/j.eswa.2026.131347_bib0024","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","article-title":"Efficient dense-field copy-move forgery detection","volume":"10","author":"Cozzolino","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"19","key":"10.1016\/j.eswa.2026.131347_bib0025","doi-asserted-by":"crossref","first-page":"3919","DOI":"10.3390\/electronics13193919","article-title":"Cecl-net: Contrastive learning and edge-reconstruction-driven complementary learning network for image forgery localization","volume":"13","author":"Dai","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2026.131347_bib0026","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"81","article-title":"Gca-net: Utilizing gated context attention for improving image forgery localization and detection","author":"Das","year":"2022"},{"issue":"7","key":"10.1016\/j.eswa.2026.131347_bib0027","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","article-title":"Exposing digital image forgeries by illumination color classification","volume":"8","author":"De Carvalho","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2026.131347_bib0028","unstructured":"Dehghani, A., & Saberi, H. (2025). Generating and detecting various types of fake image and audio content: A review of modern deep learning technologies and tools. arXiv: 2501.06227."},{"key":"10.1016\/j.eswa.2026.131347_bib0029","doi-asserted-by":"crossref","first-page":"43809","DOI":"10.1109\/ACCESS.2024.3380460","article-title":"Cnn-keypoint based two-stage hybrid approach for copy-move forgery detection","volume":"12","author":"Diwan","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2026.131347_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115282","article-title":"A fast technique to detect copy-move image forgery with reflection and non-affine transformation attacks","volume":"182","author":"Dixit","year":"2021","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"10.1016\/j.eswa.2026.131347_bib0031","doi-asserted-by":"crossref","first-page":"29","DOI":"10.5815\/ijigsp.2016.06.04","article-title":"Copy-move image forgery detection a review","volume":"8","author":"Dixit","year":"2016","journal-title":"International Journal of Image, Graphics and Signal Processing (IJIGSP)"},{"key":"10.1016\/j.eswa.2026.131347_bib0032","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., & Ferrer, C. C. (2020). The deepfake detection challenge (dfdc) dataset. arXiv: 2006.07397."},{"key":"10.1016\/j.eswa.2026.131347_bib0033","series-title":"2013 IEEE China summit and international conference on signal and information processing","first-page":"422","article-title":"Casia image tampering detection evaluation database","author":"Dong","year":"2013"},{"issue":"19","key":"10.1016\/j.eswa.2026.131347_bib0034","first-page":"20721","article-title":"A systematic literature review on image splicing detection and localization using emerging technologies","volume":"84","author":"Dutta","year":"2025","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2026.131347_bib0035","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3477257","article-title":"A review of deepfake techniques: Architecture, detection and datasets","author":"Edwards","year":"2024","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.eswa.2026.131347_bib0036","first-page":"4385","article-title":"Deep learning based algorithm (convLSTM) for copy move forgery detection","volume":"40","author":"Elaskily","year":"2021","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"28","key":"10.1016\/j.eswa.2026.131347_bib0037","doi-asserted-by":"crossref","first-page":"70603","DOI":"10.1007\/s11042-024-18399-2","article-title":"Copy-move forgery detection in digital image forensics: A survey","volume":"83","author":"Farhan","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2026.131347_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2020.106685","article-title":"A review of digital image forensics","volume":"85","author":"Ferreira","year":"2020","journal-title":"Computers & Electrical Engineering"},{"key":"10.1016\/j.eswa.2026.131347_bib0039","series-title":"25th Irish machine vision and image processing conference - Galway, Ireland","first-page":"128","article-title":"Df2023: The digital forensics 2023 dataset for image forgery detection","author":"Fischinger","year":"2023"},{"issue":"3","key":"10.1016\/j.eswa.2026.131347_bib0040","doi-asserted-by":"crossref","first-page":"278","DOI":"10.26555\/ijain.v6i3.548","article-title":"Detection and localization enhancement for satellite images with small forgeries using modified GAN-based CNN structure","volume":"6","author":"Fouad","year":"2020","journal-title":"International Journal of Advances in Intelligent Informatics"},{"key":"10.1016\/j.eswa.2026.131347_bib0041","series-title":"2019 IEEE Winter applications of computer vision workshops (WACVW)","first-page":"63","article-title":"Mfc datasets: Large-scale benchmark datasets for media forensic challenge evaluation","author":"Guan","year":"2019"},{"key":"10.1016\/j.eswa.2026.131347_bib0042","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","first-page":"20606","article-title":"Trufor: Leveraging all-round clues for trustworthy image forgery detection and localization","author":"Guillaro","year":"2023"},{"key":"10.1016\/j.eswa.2026.131347_bib0043","series-title":"ICASSP 2024-2024 IEEE international conference on acoustics, speech and signal processing (icassp)","first-page":"4895","article-title":"Effective image tampering localization via enhanced transformer and co-attention fusion","author":"Guo","year":"2024"},{"key":"10.1016\/j.eswa.2026.131347_bib0044","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"3155","article-title":"Hierarchical fine-grained image forgery detection and localization","author":"Guo","year":"2023"},{"key":"10.1016\/j.eswa.2026.131347_bib0045","article-title":"Clanet: A contrastive learning based attention network for image forgery detection","author":"Guo","year":"2024","journal-title":"Available at SSRN 4686031"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0046","doi-asserted-by":"crossref","first-page":"95","DOI":"10.3390\/electronics13010095","article-title":"A comprehensive review of deepfake detection using advanced machine learning and fusion methods","volume":"13","author":"Gupta","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2026.131347_bib0047","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"15055","article-title":"Transforensics: Image forgery localization with dense self-attention","author":"Hao","year":"2021"},{"issue":"12","key":"10.1016\/j.eswa.2026.131347_bib0048","doi-asserted-by":"crossref","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","article-title":"Digital image splicing detection based on markov features in DCT and DWT domain","volume":"45","author":"He","year":"2012","journal-title":"Pattern Recognition"},{"issue":"2","key":"10.1016\/j.eswa.2026.131347_bib0049","article-title":"Deepfake detection using deep learning methods: A systematic and comprehensive review","volume":"14","author":"Heidari","year":"2024","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"10.1016\/j.eswa.2026.131347_bib0050","unstructured":"Heller, S., Rossetto, L., & Schuldt, H. (2018). The ps-battles dataset-an image collection for image manipulation detection. arXiv: 1804.04866."},{"key":"10.1016\/j.eswa.2026.131347_bib0051","series-title":"2006 IEEE International conference on multimedia and expo","first-page":"549","article-title":"Detecting image splicing using geometry invariants and camera characteristics consistency","author":"Hsu","year":"2006"},{"key":"10.1016\/j.eswa.2026.131347_bib0052","doi-asserted-by":"crossref","first-page":"2657","DOI":"10.1109\/TIFS.2022.3141262","article-title":"Fakelocator: Robust localization of gan-based face manipulations","volume":"17","author":"Huang","year":"2022","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2026.131347_bib0053","series-title":"Proceedings of the European conference on computer vision (ECCV)","first-page":"101","article-title":"Fighting fake news: Image splice detection via learned self-consistency","author":"Huh","year":"2018"},{"key":"10.1016\/j.eswa.2026.131347_bib0054","unstructured":"Ishrak, G. H., Mahmud, Z., Farabe, M. D., Tinni, T. K., Reza, T., & Parvez, M. Z. (2024). Explainable deepfake video detection using convolutional neural network and capsulenet. arXiv: 2404.12841."},{"key":"10.1016\/j.eswa.2026.131347_bib0055","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"4676","article-title":"Doa-gan: Dual-order attentive generative adversarial network for image copy-move forgery detection and localization","author":"Islam","year":"2020"},{"key":"10.1016\/j.eswa.2026.131347_bib0056","series-title":"Proceedings of the IEEE\/CVF winter conference on applications of computer vision","first-page":"4655","article-title":"Improving fairness in deepfake detection","author":"Ju","year":"2024"},{"issue":"10","key":"10.1016\/j.eswa.2026.131347_bib0057","doi-asserted-by":"crossref","first-page":"102","DOI":"10.3390\/data6100102","article-title":"Multiple image splicing dataset (MISD): A dataset for multiple splicing","volume":"6","author":"Kadam","year":"2021","journal-title":"Data"},{"key":"10.1016\/j.eswa.2026.131347_bib0058","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"4345","article-title":"Fusion transformer with object mask guidance for image forgery analysis","author":"Karageorgiou","year":"2024"},{"issue":"2","key":"10.1016\/j.eswa.2026.131347_bib0059","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1007\/s10462-022-10211-7","article-title":"Image forgery techniques: A review","volume":"56","author":"Kaur","year":"2023","journal-title":"Artificial Intelligence Review"},{"issue":"27","key":"10.1016\/j.eswa.2026.131347_bib0060","doi-asserted-by":"crossref","first-page":"38817","DOI":"10.1007\/s11042-022-13105-6","article-title":"An improved approach for single and multiple copy-move forgery detection and localization in digital images","volume":"81","author":"Kaur","year":"2022","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"10.1016\/j.eswa.2026.131347_bib0061","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1007\/s11277-024-10959-x","article-title":"Passive image forgery detection techniques: A review, challenges, and future directions","volume":"134","author":"Kaur","year":"2024","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0062","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/s10791-025-09550-0","article-title":"A survey on multimedia-enabled deepfake detection: state-of-the-art tools and techniques, emerging trends, current challenges & limitations, and future directions","volume":"28","author":"Khan","year":"2025","journal-title":"Discover Computing"},{"key":"10.1016\/j.eswa.2026.131347_bib0063","article-title":"The point where reality meets fantasy: Mixed adversarial generators for image splice detection","volume":"32","author":"Kniaz","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"4","key":"10.1016\/j.eswa.2026.131347_bib0064","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1109\/TIFS.2016.2636089","article-title":"Multi-scale analysis strategies in PRNU-based tampering localization","volume":"12","author":"Korus","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"10.1016\/j.eswa.2026.131347_bib0065","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1109\/TIFS.2016.2636089","article-title":"Multi-scale analysis strategies in PRNU-based tampering localization","volume":"12","author":"Korus","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"10.1016\/j.eswa.2026.131347_bib0066","doi-asserted-by":"crossref","first-page":"4163","DOI":"10.1007\/s11042-024-18801-z","article-title":"Image splicing forgery detection: A review","volume":"84","author":"Kumari","year":"2025","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2026.131347_bib0067","series-title":"Proceedings of the IEEE\/CVF winter conference on applications of computer vision","first-page":"375","article-title":"Cat-net: Compression artifact tracing network for detection and localization of image splicing","author":"Kwon","year":"2021"},{"key":"10.1016\/j.eswa.2026.131347_bib0068","series-title":"Proceedings of the IEEE\/CVF winter conference on applications of computer vision","first-page":"375","article-title":"Cat-net: Compression artifact tracing network for detection and localization of image splicing","author":"Kwon","year":"2021"},{"key":"10.1016\/j.eswa.2026.131347_bib0069","series-title":"European conference on computer vision","first-page":"18","article-title":"Noise-assisted prompt learning for image forgery detection and localization","author":"Li","year":"2024"},{"key":"10.1016\/j.eswa.2026.131347_bib0070","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"8222","article-title":"Edge-aware regional message passing controller for image forgery localization","author":"Li","year":"2023"},{"key":"10.1016\/j.eswa.2026.131347_bib0071","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2025.111622","article-title":"Deepfake detection with domain generalization and mask-guided supervision","volume":"165","author":"Li","year":"2025","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0072","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"12523","article-title":"Unionformer: Unified-learning transformer with multi-view representation for image manipulation detection and localization","author":"Li","year":"2024"},{"key":"10.1016\/j.eswa.2026.131347_bib0073","series-title":"2018 IEEE International workshop on information forensics and security (WIFS)","first-page":"1","article-title":"In ictu oculi: Exposing ai created fake videos by detecting eye blinking","author":"Li","year":"2018"},{"key":"10.1016\/j.eswa.2026.131347_bib0074","series-title":"European conference on computer vision","first-page":"477","article-title":"Adaifl: Adaptive image forgery localization via a dynamic and importance-aware transformer network","author":"Li","year":"2024"},{"issue":"5","key":"10.1016\/j.eswa.2026.131347_bib0075","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","article-title":"Fast and effective image copy-move forgery detection via hierarchical feature point matching","volume":"14","author":"Li","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"10.1016\/j.eswa.2026.131347_bib0076","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.13729","article-title":"Mtfdn: An image copy-move forgery detection method based on multi-task learning","volume":"42","author":"Liang","year":"2025","journal-title":"Expert Systems"},{"key":"10.1016\/j.eswa.2026.131347_bib0077","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.109026","article-title":"Image manipulation detection by multiple tampering traces and edge artifact enhancement","volume":"133","author":"Lin","year":"2023","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0078","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.neucom.2019.12.105","article-title":"Locating splicing forgery by adaptive-SVD noise estimation and vicinity noise descriptor","volume":"387","author":"Liu","year":"2020","journal-title":"Neurocomputing"},{"key":"10.1016\/j.eswa.2026.131347_bib0079","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"10770","article-title":"Forgery-aware adaptive transformer for generalizable synthetic image detection","author":"Liu","year":"2024"},{"key":"10.1016\/j.eswa.2026.131347_bib0080","series-title":"Proceedings of the Asian conference on computer vision","first-page":"1858","article-title":"Multi-scale wavelet transformer for face forgery detection","author":"Liu","year":"2022"},{"key":"10.1016\/j.eswa.2026.131347_bib0081","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.110658","article-title":"Dh-gan: Image manipulation localization via a dual homology-aware generative adversarial network","volume":"155","author":"Liu","year":"2024","journal-title":"Pattern Recognition"},{"issue":"11","key":"10.1016\/j.eswa.2026.131347_bib0082","doi-asserted-by":"crossref","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","article-title":"Pscc-net: Progressive spatio-channel correlation network for image manipulation detection and localization","volume":"32","author":"Liu","year":"2022","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.eswa.2026.131347_bib0083","unstructured":"Liu, X., Yang, Y., Ying, Q., Qian, Z., Zhang, X., & Li, S. (2024c). Prompt-iml: Image manipulation localization with pre-trained foundation models through prompt tuning. arXiv: 2401.00653."},{"key":"10.1016\/j.eswa.2026.131347_bib0084","series-title":"2024 3rd international conference on image processing and media computing (ICIPMC)","first-page":"51","article-title":"Da-hfnet: Progressive fine-grained forgery image detection and localization based on dual attention","author":"Liu","year":"2024"},{"issue":"9","key":"10.1016\/j.eswa.2026.131347_bib0085","doi-asserted-by":"crossref","first-page":"119","DOI":"10.3390\/bdcc8090119","article-title":"Hierarchical progressive image forgery detection and localization method based on UNet","volume":"8","author":"Liu","year":"2024","journal-title":"Big Data and Cognitive Computing"},{"key":"10.1016\/j.eswa.2026.131347_bib0086","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/LSP.2023.3279018","article-title":"Tbformer: two-branch transformer for image forgery localization","volume":"30","author":"Liu","year":"2023","journal-title":"IEEE Signal Processing Letters"},{"key":"10.1016\/j.eswa.2026.131347_bib0087","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TIP.2021.3132828","article-title":"Two-stage copy-move forgery detection with self deep matching and proposal superglue","volume":"31","author":"Liu","year":"2021","journal-title":"IEEE Transactions on Image Processing"},{"issue":"26","key":"10.1016\/j.eswa.2026.131347_bib0088","doi-asserted-by":"crossref","first-page":"37847","DOI":"10.1007\/s11042-022-12755-w","article-title":"Copy-move image forgery detection based on evolving circular domains coverage","volume":"81","author":"Lu","year":"2022","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2026.131347_bib0089","unstructured":"Ma, X., Du, B., Jiang, Z., Hammadi, A. Y. A., & Zhou, J. (2023). Iml-vit: Benchmarking image manipulation localization by vision transformer. arXiv: 2307.14863."},{"key":"10.1016\/j.eswa.2026.131347_bib0090","series-title":"2019 27th European signal processing conference (EUSIPCO)","first-page":"1","article-title":"Defacto: Image and face manipulation dataset","author":"Mahfoudi","year":"2019"},{"key":"10.1016\/j.eswa.2026.131347_bib0091","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2023.109778","article-title":"A survey on deep learning-based image forgery detection","volume":"144","author":"Mehrjardi","year":"2023","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0092","series-title":"Media watermarking, security, and forensics 2018, electronic imaging","article-title":"Boosting image forgery detection using resampling features and copy-move analysis","author":"Mohammed","year":"2018"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0093","doi-asserted-by":"crossref","DOI":"10.1049\/rsn2.70064","article-title":"Explainable dual-stream attention network for image forgery detection and localisation using contrastive learning","volume":"19","author":"Munawar","year":"2025","journal-title":"IET Radar, Sonar & Navigation"},{"key":"10.1016\/j.eswa.2026.131347_bib0094","series-title":"2024 4th international conference on ubiquitous computing and intelligent information systems (ICUIS)","first-page":"141","article-title":"A comparative review of AI-generated vs real images and classification techniques","author":"Muthaiah","year":"2024"},{"key":"10.1016\/j.eswa.2026.131347_bib0095","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision (ICCV)","first-page":"15927","article-title":"M2SFormer: Multi-spectral and multi-scale attention with edge-aware difficulty guidance for image forgery localization","author":"Nam","year":"2025"},{"key":"10.1016\/j.eswa.2026.131347_bib0096","article-title":"A data set of authentic and spliced image blocks","volume":"4","author":"Ng","year":"2004","journal-title":"Columbia University, ADVENT Technical Report"},{"key":"10.1016\/j.eswa.2026.131347_bib0097","series-title":"Proceedings of the IEEE\/CVF winter conference on applications of computer vision","first-page":"4642","article-title":"Cfl-net: Image forgery localization using contrastive learning","author":"Niloy","year":"2023"},{"key":"10.1016\/j.eswa.2026.131347_bib0098","series-title":"Proceedings of the IEEE\/CVF winter conference on applications of computer vision workshops","first-page":"71","article-title":"Imd2020: A large-scale annotated dataset tailored for detecting manipulated images","author":"Novozamsky","year":"2020"},{"key":"10.1016\/j.eswa.2026.131347_bib0099","series-title":"2022 International conference on computing, communication, and intelligent systems (ICCCIS)","first-page":"890","article-title":"A review on deep learning techniques for image forgery detection","author":"Pandey","year":"2023"},{"issue":"8","key":"10.1016\/j.eswa.2026.131347_bib0100","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.13570","article-title":"A review of deep learning-based approaches for deepfake content detection","volume":"41","author":"Passos","year":"2024","journal-title":"Expert Systems"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0101","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13735-025-00358-8","article-title":"Image forgery classification and localization through vision transformers","volume":"14","author":"Pawar","year":"2025","journal-title":"International Journal of Multimedia Information Retrieval"},{"issue":"21","key":"10.1016\/j.eswa.2026.131347_bib0102","doi-asserted-by":"crossref","DOI":"10.3390\/app132112053","article-title":"Gp-net: Image manipulation detection and localization via long-range modeling and transformers","volume":"13","author":"Peng","year":"2023","journal-title":"Applied Sciences"},{"issue":"7855","key":"10.1016\/j.eswa.2026.131347_bib0103","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1038\/s41586-021-03344-2","article-title":"Shifting attention to accuracy can reduce misinformation online","volume":"592","author":"Pennycook","year":"2021","journal-title":"Nature"},{"key":"10.1016\/j.eswa.2026.131347_bib0104","series-title":"2016 IEEE International conference on recent trends in electronics, information & communication technology (RTEICT)","first-page":"706","article-title":"Passive copy-move forgery detection using SIFT, HOG and SURF features","author":"Prasad","year":"2016"},{"key":"10.1016\/j.eswa.2026.131347_bib0105","series-title":"2019 3rd international conference on electronics, communication and aerospace technology (ICECA)","first-page":"959","article-title":"Digital image forgery detection techniques: A comprehensive review","author":"Rani","year":"2019"},{"key":"10.1016\/j.eswa.2026.131347_bib0106","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108051","article-title":"Multi-semantic CRF-based attention model for image forgery detection and localization","volume":"183","author":"Rao","year":"2021","journal-title":"Signal Processing"},{"key":"10.1016\/j.eswa.2026.131347_bib0107","doi-asserted-by":"crossref","DOI":"10.1016\/j.iswa.2025.200524","article-title":"Gan-vit-cmfd: A novel framework integrating generative adversarial networks and vision transformers for enhanced copy-move forgery detection and classification with spectral clustering","volume":"26","author":"Ravula","year":"2025","journal-title":"Intelligent Systems with Applications"},{"issue":"4","key":"10.1016\/j.eswa.2026.131347_bib0108","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1207\/s15327957pspr0804_3","article-title":"Processing fluency and aesthetic pleasure: Is beauty in the perceiver\u2019s processing experience?","volume":"8","author":"Reber","year":"2004","journal-title":"Personality and Social Psychology Review"},{"key":"10.1016\/j.eswa.2026.131347_bib0109","first-page":"1","article-title":"Guide for conducting risk assessments","author":"Ross","year":"2012","journal-title":"National Institute of Standards and Technology. U.S. Department of Commerce."},{"key":"10.1016\/j.eswa.2026.131347_bib0110","series-title":"International conference on computer vision (ICCV)","first-page":"1","article-title":"Faceforensics++: Learning to detect manipulated facial images","author":"R\u00f6ssler","year":"2019"},{"key":"10.1016\/j.eswa.2026.131347_bib0111","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"1","article-title":"Faceforensics++: Learning to detect manipulated facial images","author":"Rossler","year":"2019"},{"issue":"11","key":"10.1016\/j.eswa.2026.131347_bib0112","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2020.0111164","article-title":"Object based image splicing localization using block artificial grids","volume":"11","author":"Sekhar","year":"2020","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"10.1016\/j.eswa.2026.131347_bib0113","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2021.107950","article-title":"Prrnet: Pixel-region relation network for face forgery detection","volume":"116","author":"Shang","year":"2021","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0114","series-title":"NeurIPS 2017 workshop on machine learning for the developing world","first-page":"1","article-title":"No classification without representation: Assessing geodiversity issues in open data sets for the developing world","author":"Shankar","year":"2017"},{"key":"10.1016\/j.eswa.2026.131347_bib0115","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.111230","article-title":"Exploring multi-scale forgery clues for stereo super-resolution image forgery localization","volume":"161","author":"Sheng","year":"2025","journal-title":"Pattern Recognition"},{"issue":"14","key":"10.1016\/j.eswa.2026.131347_bib0116","doi-asserted-by":"crossref","first-page":"3134","DOI":"10.3390\/math11143134","article-title":"Review of image forensic techniques based on deep learning","volume":"11","author":"Shi","year":"2023","journal-title":"Mathematics"},{"key":"10.1016\/j.eswa.2026.131347_bib0117","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2025.111565","article-title":"Robustifying vision transformer for image forgery localization with multi-exit architectures","volume":"164","author":"Shi","year":"2025","journal-title":"Pattern Recognition"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0118","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s43926-025-00154-0","article-title":"Advancements in detecting deepfakes: AI algorithms and future prospects- a review","volume":"5","author":"Singh","year":"2025","journal-title":"Discover Internet of Things"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0119","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1007\/s42001-024-00265-8","article-title":"Image forgery detection: Comprehensive review of digital forensics approaches","volume":"7","author":"Singh","year":"2024","journal-title":"Journal of Computational Social Science"},{"key":"10.1016\/j.eswa.2026.131347_bib0120","first-page":"1","article-title":"Detecting and localizing multiple forgeries with transGAN","author":"Singh","year":"2025","journal-title":"Iran Journal of Computer Science"},{"key":"10.1016\/j.eswa.2026.131347_bib0121","series-title":"2025 IEEE\/CVF Winter conference on applications of computer vision (WACV)","first-page":"149","article-title":"DeCLIP: Decoding CLIP representations for deepfake localization","author":"Smeu","year":"2025"},{"key":"10.1016\/j.eswa.2026.131347_bib0122","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"7024","article-title":"Can we get rid of handcrafted feature extractors? sparsevit: Nonsemantics-centered, parameter-efficient image manipulation localization through spare-coding transformer","volume":"vol. 39","author":"Su","year":"2025"},{"key":"10.1016\/j.eswa.2026.131347_bib0123","doi-asserted-by":"crossref","first-page":"1232","DOI":"10.1109\/LSP.2022.3172617","article-title":"Et: Edge-enhanced transformer for image splicing detection","volume":"29","author":"Sun","year":"2022","journal-title":"IEEE Signal Processing Letters"},{"issue":"1","key":"10.1016\/j.eswa.2026.131347_bib0124","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1007\/s11042-023-15475-x","article-title":"Enhanced blind image forgery detection using an accurate deep learning based hybrid DCCAE and ADFC","volume":"83","author":"Sushir","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2026.131347_bib0125","doi-asserted-by":"crossref","first-page":"40550","DOI":"10.1109\/ACCESS.2019.2907316","article-title":"Copy-move forgery detection: A state-of-the-art technical review and analysis","volume":"7","author":"Teerakanok","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2026.131347_bib0126","doi-asserted-by":"crossref","DOI":"10.1016\/j.forsciint.2020.110311","article-title":"Recent advances in digital image manipulation detection techniques: A brief review","volume":"312","author":"Thakur","year":"2020","journal-title":"Forensic science international"},{"issue":"11","key":"10.1016\/j.eswa.2026.131347_bib0127","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1007\/s11760-025-04407-x","article-title":"Mdlformer: Multi-modal global context-based swin transformer for image manipulation detection and localization","volume":"19","author":"Thakur","year":"2025","journal-title":"Signal, Image and Video Processing"},{"key":"10.1016\/j.eswa.2026.131347_bib0128","series-title":"CVPR 2011","first-page":"1521","article-title":"Unbiased look at dataset bias","author":"Torralba","year":"2011"},{"key":"10.1016\/j.eswa.2026.131347_bib0129","series-title":"Proceedings ELMAR-2013","first-page":"49","article-title":"Comofod\u2013new database for copy-move forgery detection","author":"Tralic","year":"2013"},{"key":"10.1016\/j.eswa.2026.131347_bib0130","series-title":"International conference on multimedia modeling","first-page":"198","article-title":"Exploring multi-modal fusion for image manipulation detection and localization","author":"Triaridis","year":"2024"},{"issue":"6380","key":"10.1016\/j.eswa.2026.131347_bib0131","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1126\/science.aap9559","article-title":"The spread of true and false news online","volume":"359","author":"Vosoughi","year":"2018","journal-title":"science"},{"key":"10.1016\/j.eswa.2026.131347_bib0132","doi-asserted-by":"crossref","first-page":"170032","DOI":"10.1109\/ACCESS.2019.2955308","article-title":"An image copy-move forgery detection method based on SURF and PCET","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2026.131347_bib0133","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"2364","article-title":"Objectformer for image manipulation detection and localization","author":"Wang","year":"2022"},{"key":"10.1016\/j.eswa.2026.131347_bib0134","series-title":"Proceedings of the 2022 international conference on multimedia retrieval","first-page":"615","article-title":"M2tr: Multi-modal multi-scale transformers for deepfake detection","author":"Wang","year":"2022"},{"key":"10.1016\/j.eswa.2026.131347_bib0135","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2021.108347","article-title":"Coarse-to-fine-grained method for image splicing region detection","volume":"122","author":"Wang","year":"2022","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0136","series-title":"2016 IEEE International conference on image processing (ICIP)","first-page":"161","article-title":"Coverage\u2013a novel database for copy-move forgery detection","author":"Wen","year":"2016"},{"key":"10.1016\/j.eswa.2026.131347_bib0137","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1177\/016146811912101102","article-title":"Lateral reading: Reading less and learning more when evaluating digital information","volume":"121","author":"Wineburg","year":"2019","journal-title":"Teachers College Record"},{"key":"10.1016\/j.eswa.2026.131347_bib0138","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"13440","article-title":"Robust image forgery detection over online social network shared images","author":"Wu","year":"2022"},{"key":"10.1016\/j.eswa.2026.131347_bib0139","series-title":"Proceedings of the european conference on computer vision (ECCV)","first-page":"168","article-title":"Busternet: Detecting copy-move image forgery with source\/target localization","author":"Wu","year":"2018"},{"key":"10.1016\/j.eswa.2026.131347_bib0140","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"9543","article-title":"Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features","author":"Wu","year":"2019"},{"key":"10.1016\/j.eswa.2026.131347_bib0141","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TMM.2023.3279993","article-title":"Mcs-gan: A different understanding for generalization of deep forgery detection","volume":"26","author":"Xiao","year":"2023","journal-title":"IEEE Transactions on Multimedia"},{"key":"10.1016\/j.eswa.2026.131347_bib0142","doi-asserted-by":"crossref","first-page":"90511","DOI":"10.1109\/ACCESS.2024.3413709","article-title":"Dual-stream intermediate fusion network for image forgery localization","volume":"12","author":"Yan","year":"2024","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.eswa.2026.131347_bib0143","doi-asserted-by":"crossref","first-page":"535","DOI":"10.3390\/e27050535","article-title":"Dfst-unet: Dual-domain fusion swin transformer u-net for image forgery localization","volume":"27","author":"Yang","year":"2025","journal-title":"Entropy"},{"key":"10.1016\/j.eswa.2026.131347_bib0144","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.110727","article-title":"D-Net: A dual-encoder network for image splicing forgery detection and localization","volume":"155","author":"Yang","year":"2024","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0145","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.110727","article-title":"D-Net: A dual-encoder network for image splicing forgery detection and localization","volume":"155","author":"Yang","year":"2024","journal-title":"Pattern Recognition"},{"issue":"15","key":"10.1016\/j.eswa.2026.131347_bib0146","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.3390\/rs15153701","article-title":"Dssfn: A dual-stream self-attention fusion network for effective hyperspectral image classification","volume":"15","author":"Yang","year":"2023","journal-title":"Remote Sensing"},{"key":"10.1016\/j.eswa.2026.131347_bib0147","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.110526","article-title":"Uncertainty-aware hierarchical labeling for face forgery detection","volume":"153","author":"Yu","year":"2024","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0148","series-title":"2015 IEEE International conference on multimedia & expo workshops (ICMEW)","first-page":"1","article-title":"Detecting image splicing in the wild (web)","author":"Zampoglou","year":"2015"},{"issue":"4","key":"10.1016\/j.eswa.2026.131347_bib0149","doi-asserted-by":"crossref","first-page":"4801","DOI":"10.1007\/s11042-016-3795-2","article-title":"Large-scale evaluation of splicing localization algorithms for web images","volume":"76","author":"Zampoglou","year":"2017","journal-title":"Multimedia Tools and Applications"},{"issue":"12","key":"10.1016\/j.eswa.2026.131347_bib0150","doi-asserted-by":"crossref","first-page":"17521","DOI":"10.1007\/s11042-022-13797-w","article-title":"Image forgery detection: A survey of recent deep-learning approaches","volume":"82","author":"Zanardelli","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2026.131347_bib0151","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"6944","article-title":"Mgqformer: Mask-guided query-based transformer for image manipulation localization","volume":"vol. 38","author":"Zeng","year":"2024"},{"key":"10.1016\/j.eswa.2026.131347_bib0152","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.111253","article-title":"Distilled transformers with locally enhanced global representations for face forgery detection","volume":"161","author":"Zhang","year":"2025","journal-title":"Pattern Recognition"},{"issue":"2","key":"10.1016\/j.eswa.2026.131347_bib0153","first-page":"1","article-title":"Prnu-based image forgery localization with deep multi-scale fusion","volume":"19","author":"Zhang","year":"2023","journal-title":"ACM Transactions on Multimedia Computing, Communications and Applications"},{"issue":"22","key":"10.1016\/j.eswa.2026.131347_bib0154","doi-asserted-by":"crossref","first-page":"4311","DOI":"10.3390\/rs16224311","article-title":"Multi-scenario remote sensing image forgery detection based on transformer and model fusion","volume":"16","author":"Zhao","year":"2024","journal-title":"Remote Sensing"},{"key":"10.1016\/j.eswa.2026.131347_bib0155","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"1053","article-title":"Learning rich features for image manipulation detection","author":"Zhou","year":"2018"},{"key":"10.1016\/j.eswa.2026.131347_bib0156","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2023.110077","article-title":"Deepfake detection via inter-frame inconsistency recomposition and enhancement","volume":"147","author":"Zhu","year":"2024","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2026.131347_bib0157","unstructured":"Zhu, H., Cao, G., & Huang, X. (2023). Progressive feedback-enhanced transformer for image forgery localization. arXiv: 2311.08910."},{"key":"10.1016\/j.eswa.2026.131347_bib0158","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2023.103981","article-title":"Effective image tampering localization with multi-scale convnext feature fusion","volume":"98","author":"Zhu","year":"2024","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"10.1016\/j.eswa.2026.131347_bib0159","doi-asserted-by":"crossref","first-page":"5243","DOI":"10.1109\/TIFS.2023.3306181","article-title":"Reloc: A restoration-assisted framework for robust image tampering localization","volume":"18","author":"Zhuang","year":"2023","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417426002605?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417426002605?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T02:24:41Z","timestamp":1776133481000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417426002605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":159,"alternative-id":["S0957417426002605"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131347","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Deployable image forgery detection and localization: A comprehensive review and practitioner\u00b4s guide","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131347","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"131347"}}