{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:02:16Z","timestamp":1763348536101,"version":"3.41.2"},"reference-count":22,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Comp. Intel. Appl."],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:p> Nowadays, images have become one of the most popular forms of communication as image editing tools have evolved. Image manipulation, particularly image colorization, has become easier, making it harder to differentiate between fake colorized images and actual images. Furthermore, the RGB space is no longer considered to be the best option for color-based detection techniques due to the high correlation between channels and its blending of luminance and chrominance information. This paper proposes a new approach for fake colorized image detection based on a novel image representation created by combining color information from three separate color spaces (HSV, Lab, and Ycbcr) and selecting the most different channels from each color space to reconstruct the image. Features from the proposed image representation are extracted based on transfer learning using the pre-trained CNNs ResNet50 model. The Support Vector Machine (SVM) approach has been used for classification purposes due to its high ability for generalization. Our experiments indicate that our proposed models outperform other state-of-the-art fake colorized image detection methods in several aspects. <\/jats:p>","DOI":"10.1142\/s1469026823500189","type":"journal-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T12:22:52Z","timestamp":1680524572000},"source":"Crossref","is-referenced-by-count":2,"title":["Fake Colorized Image Detection Based on Special Image Representation and Transfer Learning"],"prefix":"10.1142","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6877-1085","authenticated-orcid":false,"given":"Khalid A.","family":"Salman","sequence":"first","affiliation":[{"name":"College of Computer Sciences and Information Technology, University of Anbar, Iraq"}]},{"given":"Khalid","family":"Shaker","sequence":"additional","affiliation":[{"name":"College of Computer Sciences and Information Technology, University of Anbar, Iraq"}]},{"given":"Sufyan","family":"Al-Janabi","sequence":"additional","affiliation":[{"name":"College of Computer Sciences and Information Technology, University of Anbar, Iraq"}]}],"member":"219","published-online":{"date-parts":[[2023,4,1]]},"reference":[{"key":"S1469026823500189BIB001","doi-asserted-by":"crossref","first-page":"476","DOI":"10.3390\/app11020476","volume":"11","author":"Ulloa C.","year":"2021","journal-title":"Appl. Sci."},{"issue":"3","key":"S1469026823500189BIB002","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1145\/1015706.1015780","volume":"23","author":"Levin A.","year":"2004","journal-title":"ACM Trans. Graph."},{"key":"S1469026823500189BIB004","first-page":"1","volume":"6013","author":"Guo Y.","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"first-page":"126","volume-title":"Computer Vision\u2013ECCV 2008: 10th European Conf. Computer Vision","author":"Charpiat G.","key":"S1469026823500189BIB005"},{"issue":"4","key":"S1469026823500189BIB006","doi-asserted-by":"crossref","first-page":"1688","DOI":"10.1109\/TIP.2016.2523429","volume":"25","author":"Chen X.","year":"2016","journal-title":"IEEE Trans. Image Process."},{"key":"S1469026823500189BIB007","first-page":"577","volume-title":"Proc. Fourteenth European Conf. Computer Vision","author":"Larsson G.","year":"2016"},{"key":"S1469026823500189BIB008","first-page":"649","volume-title":"Proc. Fourteenth European Conf. Computer Vision","author":"Zhang R.","year":"2016"},{"issue":"4","key":"S1469026823500189BIB009","doi-asserted-by":"crossref","DOI":"10.1145\/2897824.2925974","volume":"35","author":"Iizuka S.","year":"2016","journal-title":"ACM Trans. Graph."},{"issue":"2","key":"S1469026823500189BIB011","first-page":"255","volume":"6","author":"Pillai N.","year":"2019","journal-title":"IJRAR - Int. J. Res. Anal. Rev."},{"key":"S1469026823500189BIB012","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-030-28752-8_11","volume-title":"Advances in Digital Forensics XV, IFIP AICT 569","author":"Li Y.","year":"2019"},{"key":"S1469026823500189BIB013","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/Confluence47617.2020.9057922","volume-title":"2020 10th Int. Conf. Cloud Computing, Data Science & Engineering (Confluence)","author":"Agarwal S.","year":"2020"},{"key":"S1469026823500189BIB014","doi-asserted-by":"crossref","first-page":"103295","DOI":"10.1016\/j.jvcir.2021.103295","volume":"80","author":"Yu Y.","year":"2021","journal-title":"J. Vis. Commun. Image Represent."},{"key":"S1469026823500189BIB015","first-page":"733","volume-title":"APSIPA Annual Summit and Conf. 2018","author":"Zhuo L.","year":"2018"},{"key":"S1469026823500189BIB016","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TIFS.2018.2834155","volume":"14","author":"Yan Y.","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secure."},{"volume-title":"2020 Fifth Int. Conf. Research in Computational Intelligence and Communication Networks (ICRCICN)","author":"Jijina T.","key":"S1469026823500189BIB017"},{"issue":"2","key":"S1469026823500189BIB019","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.ifacol.2018.03.076","volume":"51","author":"Wetzer E.","year":"2018","journal-title":"IFAC-PapersOnLine"},{"key":"S1469026823500189BIB020","doi-asserted-by":"crossref","first-page":"35","DOI":"10.17485\/ijst\/2015\/v8i1\/51281","volume":"8","author":"Ganesan P.","year":"2015","journal-title":"Indian J. Sci. Technol."},{"issue":"5","key":"S1469026823500189BIB021","first-page":"1592","volume":"4","author":"Hassan M. A.","year":"2015","journal-title":"Int. J. Eng. Res. Technol."},{"key":"S1469026823500189BIB022","first-page":"248","volume-title":"Proc. IEEE Conf. Computer Vision and Pattern Recognition","author":"Deng J.","year":"2009"},{"volume-title":"IEEE 2016 IEEE Conf. Computer Vision and Pattern Recognition (CVPR)","year":"2016","author":"Kaiming He.","key":"S1469026823500189BIB024"},{"key":"S1469026823500189BIB027","volume-title":"Advances in Computers","volume":"8","author":"Gove R.","year":"2012"},{"issue":"4","key":"S1469026823500189BIB029","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/informatics8040079","volume":"8","author":"Elgeldawi E.","year":"2021","journal-title":"Informatics"}],"container-title":["International Journal of Computational Intelligence and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S1469026823500189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T12:53:42Z","timestamp":1696942422000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S1469026823500189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":22,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10.1142\/S1469026823500189"],"URL":"https:\/\/doi.org\/10.1142\/s1469026823500189","relation":{},"ISSN":["1469-0268","1757-5885"],"issn-type":[{"type":"print","value":"1469-0268"},{"type":"electronic","value":"1757-5885"}],"subject":[],"published":{"date-parts":[[2023,4,1]]},"article-number":"2350018"}}