{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:47:35Z","timestamp":1754156855587,"version":"3.41.2"},"reference-count":45,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T00:00:00Z","timestamp":1629072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DTA"],"published-print":{"date-parts":[[2022,1,18]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>With the advancements in photo editing software, it is possible to generate fake images, degrading the trust in digital images. Forged images, which appear like authentic images, can be created without leaving any visual clues about the alteration in the image. Image forensic field has introduced several forgery detection techniques, which effectively distinguish fake images from the original ones, to restore the trust in digital images. Among several forgery images, spliced images involving human faces are more unsafe. Hence, there is a need for a forgery detection approach to detect the spliced images.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This paper proposes a Taylor-rider optimization algorithm-based deep convolutional neural network (Taylor-ROA-based DeepCNN) for detecting spliced images. Initially, the human faces in the spliced images are detected using the Viola\u2013Jones algorithm, from which the 3-dimensional (3D) shape of the face is established using landmark-based 3D morphable model (L3DMM), which estimates the light coefficients. Then, the distance measures, such as Bhattacharya, Seuclidean, Euclidean, Hamming, Chebyshev and correlation coefficients are determined from the light coefficients of the faces. These form the feature vector to the proposed Taylor-ROA-based DeepCNN, which determines the spliced images.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Experimental analysis using DSO-1, DSI-1, real dataset and hybrid dataset reveal that the proposed approach acquired the maximal accuracy, true positive rate (TPR) and true negative rate (TNR) of 99%, 98.88% and 96.03%, respectively, for DSO-1 dataset. The proposed method reached the performance improvement of 24.49%, 8.92%, 6.72%, 4.17%, 0.25%, 0.13%, 0.06%, and 0.06% in comparison to the existing methods, such as Kee and Farid's, shape from shading (SFS), random guess, Bo Peng <jats:italic>et al.<\/jats:italic>, neural network, FOA-SVNN, CNN-based MBK, and Manoj Kumar <jats:italic>et al.<\/jats:italic>, respectively, in terms of accuracy.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The Taylor-ROA is developed by integrating the Taylor series in rider optimization algorithm (ROA) for optimally tuning the DeepCNN.<\/jats:p><\/jats:sec>","DOI":"10.1108\/dta-10-2020-0234","type":"journal-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T03:37:24Z","timestamp":1628825844000},"page":"103-131","source":"Crossref","is-referenced-by-count":4,"title":["Taylor-rider-based deep convolutional neural network for image forgery detection in 3D lighting environment"],"prefix":"10.1108","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9708-1884","authenticated-orcid":false,"given":"V.","family":"Vinolin","sequence":"first","affiliation":[]},{"given":"M.","family":"Sucharitha","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,8,16]]},"reference":[{"issue":"4","key":"key2022011708183126000_ref001","doi-asserted-by":"publisher","DOI":"10.1108\/SASBE-07-2019-0083","article-title":"A robust method to authenticate car license plates using segmentation and ROI based approach","volume":"9","year":"2019","journal-title":"Smart and Sustainable Built Environ"},{"key":"key2022011708183126000_ref002","doi-asserted-by":"crossref","first-page":"4343","DOI":"10.1002\/sec.1365","article-title":"Image forgery detection in contourlet transformdomain based on new chaotic cellular automat","volume":"8","year":"2015","journal-title":"Security and Communication Networks"},{"key":"key2022011708183126000_ref003","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ijleo.2019.04.074","article-title":"A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map","volume":"187","year":"2019","journal-title":"Optik"},{"issue":"1","key":"key2022011708183126000_ref004","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TIM.2018.2836058","article-title":"RideNN: a new rider optimization algorithm-based neural network for fault diagnosis in analog circuits","volume":"68","year":"2019","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"first-page":"187","article-title":"A morphable model for the synthesis of 3d faces","year":"1999","key":"key2022011708183126000_ref005"},{"issue":"4","key":"key2022011708183126000_ref006","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TIFS.2015.2506548","article-title":"Illuminant-based transformed spaces for image forensics","volume":"11","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"key2022011708183126000_ref007","doi-asserted-by":"crossref","first-page":"36863","DOI":"10.1109\/ACCESS.2020.2974804","article-title":"Copy-move forgery detection based on keypoint clustering and similar neighborhood search algorithm","volume":"8","year":"2020","journal-title":"IEEE Access"},{"volume-title":"Digital Watermarking","year":"2002","key":"key2022011708183126000_ref008"},{"issue":"8","key":"key2022011708183126000_ref009","doi-asserted-by":"crossref","first-page":"1439","DOI":"10.1049\/iet-ipr.2017.1120","article-title":"Illumination-based texture descriptor and fruitfly support vector neural network for image forgery detection in face images","volume":"12","year":"2018","journal-title":"IET Image Processing"},{"issue":"7","key":"key2022011708183126000_ref010","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","article-title":"Exposing digital image forgeries by illumination color classification","volume":"8","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"year":"2013","key":"key2022011708183126000_ref011","article-title":"CASIA image tampering detection evaluation database"},{"key":"key2022011708183126000_ref012","unstructured":"DSO-1, DSI-1 dataset (2013), available at: https:\/\/recodbr.wordpress.com\/code-n-data\/#dso1_dsi1."},{"year":"2012","key":"key2022011708183126000_ref013","article-title":"3D lighting-based image forgery detection using shape-from-shading"},{"issue":"2","key":"key2022011708183126000_ref014","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.931079","article-title":"Image forgery detection a survey","volume":"26","year":"2009","journal-title":"IEEE Signal Processing Magzine"},{"first-page":"1163","article-title":"Detection of copy-move forgery in digital images","year":"2016","key":"key2022011708183126000_ref015"},{"first-page":"1","article-title":"Exposing digital forgeries by detecting inconsistencies in lighting","year":"2005","key":"key2022011708183126000_ref016"},{"issue":"15","key":"key2022011708183126000_ref017","first-page":"4747","article-title":"An evaluation of digital image forgery detection approaches","volume":"12","year":"2017","journal-title":"International Journal of Applied Engineering Research"},{"volume-title":"Information Techniques for Steganography and Digital Watermarking","year":"2000","key":"key2022011708183126000_ref018"},{"year":"2010","key":"key2022011708183126000_ref019","article-title":"Exposing digital forgeries from 3-D lighting environments"},{"issue":"4","key":"key2022011708183126000_ref020","first-page":"1","article-title":"Exposing photo manipulation with inconsistent shadows","volume":"32","year":"2013","journal-title":"ACM Transactions and Graphics"},{"issue":"5","key":"key2022011708183126000_ref021","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2629646","article-title":"Exposing photo manipulation from shading and shadows","volume":"33","year":"2014","journal-title":"ACM Transactions and Graphics"},{"issue":"2","key":"key2022011708183126000_ref022","first-page":"119","article-title":"Image forgery detection based on physics and pixels: a study","volume":"51","year":"2017","journal-title":"Australian Journal of Forensic Sciences"},{"issue":"9","key":"key2022011708183126000_ref023","first-page":"12451","article-title":"Image authentication by assessing manipulations using illumination","volume":"78","year":"2018","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"key2022011708183126000_ref024","first-page":"243","article-title":"Forgery detection using multiple light sources for synthetic images","volume":"51","year":"2017","journal-title":"Australian Journal of Forensic Sciences"},{"issue":"3","key":"key2022011708183126000_ref025","first-page":"195004:1","article-title":"Image forensics based on lighting estimation","volume":"19","year":"2019","journal-title":"International Journal of Image and Graphics"},{"first-page":"537","article-title":"CCD fingerprint method-identification of a video camera from videotaped images","year":"2002","key":"key2022011708183126000_ref026"},{"issue":"3","key":"key2022011708183126000_ref027","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1109\/TIFS.2011.2139209","article-title":"Identifying image composites Through shadow matte consistency","volume":"6","year":"2011","journal-title":"IEEE Transactions on Information Forensics and Security"},{"first-page":"217","article-title":"A novel method for detecting cropped and recompressed image block","year":"2007","key":"key2022011708183126000_ref028"},{"issue":"1","key":"key2022011708183126000_ref029","doi-asserted-by":"crossref","first-page":"41","DOI":"10.5120\/15470-4112","article-title":"Taylor series prediction of Time Series data with error propagated by artificial neural network","volume":"89","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"key2022011708183126000_ref030","doi-asserted-by":"crossref","first-page":"133488","DOI":"10.1109\/ACCESS.2020.3009877","article-title":"A full-image full-resolution end-to-end-trainable CNN framework for image forgery detection","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"key2022011708183126000_ref031","first-page":"1303","article-title":"Gradient-based illumination description for image forgery detection","volume":"15","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"first-page":"1","article-title":"Improved 3D lighting environment estimation for image forgery detection","year":"2015","key":"key2022011708183126000_ref032"},{"issue":"2","key":"key2022011708183126000_ref033","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/TIFS.2016.2623589","article-title":"Optimized 3D lighting environment estimation for image forgery detection","volume":"12","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"first-page":"128","article-title":"Statistical tools for digital forensics","year":"2004","key":"key2022011708183126000_ref034"},{"issue":"1","key":"key2022011708183126000_ref035","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","article-title":"Digital image forensics: a booklet for beginners","volume":"51","year":"2011","journal-title":"Multimedia Tools and Applications"},{"key":"key2022011708183126000_ref036","doi-asserted-by":"crossref","first-page":"103374","DOI":"10.1109\/ACCESS.2020.2999308","article-title":"Detection of spliced image forensics using Texture analysis of median filter residual","volume":"8","year":"2020","journal-title":"IEEE Access"},{"issue":"23","key":"key2022011708183126000_ref037","doi-asserted-by":"crossref","first-page":"11601","DOI":"10.1109\/JSEN.2019.2928480","article-title":"Image forgery detection based on motion blur estimated using convolutional neural network","volume":"19","year":"2019","journal-title":"IEEE Sensors Journal"},{"issue":"12","key":"key2022011708183126000_ref038","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1016\/j.optlaseng.2011.06.014","article-title":"Holographic watermarking for authentication of cut images","volume":"49","year":"2011","journal-title":"Optics and Lasers in Engineering"},{"issue":"8","key":"key2022011708183126000_ref039","doi-asserted-by":"crossref","first-page":"2220","DOI":"10.1109\/TVLSI.2017.2688340","article-title":"Deep convolutional neural network architecture with reconfigurable computation patterns","volume":"25","year":"2017","journal-title":"IEEE Transactions on Very Large Scale Integration System"},{"key":"key2022011708183126000_ref040","doi-asserted-by":"crossref","first-page":"11815","DOI":"10.1109\/ACCESS.2020.2964516","article-title":"Passive image forgery detection based on the demosaicing algorithm and JPEG compression","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"key2022011708183126000_ref041","doi-asserted-by":"crossref","unstructured":"Vinolin, V. and Sucharitha, M. (2020), \u201cSpliced image detection in 3D lighting environments using neural networks\u201d, in Intel System Design, Springer, Singapore, pp. 143-152.","DOI":"10.1007\/978-981-15-5400-1_15"},{"key":"key2022011708183126000_ref042","first-page":"511","article-title":"Rapid object detection using a boosted cascade of simple features","year":"2001","journal-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition"},{"key":"key2022011708183126000_ref043","first-page":"197","article-title":"Detecting image forgeries using geometric cues","volume":"1","year":"2011","journal-title":"Computer Vision for Multimedia Applications"},{"first-page":"325","article-title":"An image forensic Technique based on 2D lighting estimation using spherical harmonic frames","year":"2015","key":"key2022011708183126000_ref044"},{"key":"key2022011708183126000_ref045","first-page":"2134","article-title":"An end-to-end dense-inception net for image copy-move forgery detection","volume":"15","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Data Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/DTA-10-2020-0234\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/DTA-10-2020-0234\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:15:25Z","timestamp":1753398925000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/dta\/article\/56\/1\/103-131\/1113813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,16]]},"references-count":45,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,8,16]]},"published-print":{"date-parts":[[2022,1,18]]}},"alternative-id":["10.1108\/DTA-10-2020-0234"],"URL":"https:\/\/doi.org\/10.1108\/dta-10-2020-0234","relation":{},"ISSN":["2514-9288"],"issn-type":[{"type":"print","value":"2514-9288"}],"subject":[],"published":{"date-parts":[[2021,8,16]]}}}