{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:38:39Z","timestamp":1778603919161,"version":"3.51.4"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T00:00:00Z","timestamp":1709856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,6,30]]},"abstract":"<jats:p>In the domain of general image forgery detection, a myriad of different classification solutions have been developed to distinguish a \u201ctampered\u201d image from a \u201cpristine\u201d image. In this work, we aim to develop a new method to tackle the problem of binary image forgery detection. Our approach builds upon the extensive training that state-of-the-art image classification models have undergone on regular images from the ImageNet dataset, and transfers that knowledge to the image forgery detection space. By leveraging transfer learning and fine tuning, we can fit state-of-the-art image classification models to the forgery detection task. We train the models on a diverse and evenly distributed image forgery dataset. With five models\u2014EfficientNetB0, VGG16, Xception, ResNet50V2, and NASNet-Large\u2014we transferred and adapted pre-trained knowledge from ImageNet to the forgery detection task. Each model was fitted, fine-tuned, and evaluated according to a set of performance metrics. Our evaluation demonstrated the efficacy of large-scale image classification models\u2014paired with transfer learning and fine tuning\u2014at detecting image forgeries. When pitted against a previously unseen dataset, the best-performing model of EfficientNetB0 could achieve an accuracy rate of nearly 89.7%.<\/jats:p>","DOI":"10.1145\/3633284","type":"journal-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T11:55:56Z","timestamp":1700135756000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8966-0617","authenticated-orcid":false,"given":"Simon","family":"Jonker","sequence":"first","affiliation":[{"name":"Technical University of Denmark, Lyngby, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2352-2066","authenticated-orcid":false,"given":"Malthe","family":"Jelstrup","sequence":"additional","affiliation":[{"name":"Technical University of Denmark, Lyngby, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4384-5786","authenticated-orcid":false,"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[{"name":"Technical University of Denmark, Lyngby, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6673-6163","authenticated-orcid":false,"given":"Brooke","family":"Lampe","sequence":"additional","affiliation":[{"name":"Technical University of Denmark, Lyngby, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,3,8]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Misinformation & Fake News. Retrieved from https:\/\/libguides.lib.cwu.edu\/c.php?g=625394&p=4391900"},{"key":"e_1_3_1_3_2","unstructured":"Latest News Photos Videos on Donald Trump Fake News. Retrieved from https:\/\/www.ndtv.com\/topic\/donald-trump-fake-news"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6887-6_13"},{"key":"e_1_3_1_5_2","volume-title":"Proceedings of the 2022 International Conference on Computing, Communication, Security and Intelligent Systems, 1\u20136,","author":"Baviskar M.","unstructured":"M. Baviskar, S. Rathod, and J. Lohokare. 2022. A comparative analysis of image forgery detection techniques. In Proceedings of the 2022 International Conference on Computing, Communication, Security and Intelligent Systems, 1\u20136, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9885600."},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5787"},{"key":"e_1_3_1_7_2","volume-title":"Proceedings of the 2022 IEEE 3rd Global Conference for Advancement in Technology, 1\u20136,","author":"Hebbar N.","unstructured":"N. Hebbar and A. Kunte. 2022. A deep learning framework with transfer learning approach for image forgery localization. In Proceedings of the 2022 IEEE 3rd Global Conference for Advancement in Technology, 1\u20136, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9971986"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-4687-5_51"},{"key":"e_1_3_1_9_2","volume-title":"Proceedings of the 2022 IEEE 19th India Council International Conference, 1\u20136,","author":"Das D.","unstructured":"D. Das and R. Naskar. 2022. Image splicing detection based on deep convolutional neural network and transfer learning. In Proceedings of the 2022 IEEE 19th India Council International Conference, 1\u20136, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/10039789"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2799421"},{"key":"e_1_3_1_11_2","volume-title":"Proceedings of the 2019 3rd International Conference on Electronics, Communication and Aerospace Technology, 959\u2013963","author":"Shailaja Rani P. B.","year":"2064","unstructured":"P. B. Shailaja Rani and A. Kumar. 2019. Digital image forgery detection techniques: A comprehensive review. In Proceedings of the 2019 3rd International Conference on Electronics, Communication and Aerospace Technology, 959\u2013963, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/8822064"},{"key":"e_1_3_1_12_2","volume-title":"Proceedings of the International Conference on Learning Representations, 1\u201310","author":"Lin M.","unstructured":"M. Lin, Q. Chen, and S. Yan. 2014. Network in network. In Proceedings of the International Conference on Learning Representations, 1\u201310."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3152126"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8080040"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2423261"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2302078"},{"issue":"2023","key":"e_1_3_1_17_2","first-page":"103155","article-title":"ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep learning networks for digital image forgery detection","volume":"128","author":"Nirmalapriya G.","year":"2013","unstructured":"G. Nirmalapriya, B. Maram, R. Lakshmanan, and M. Navaneethakrishnan. 2013. ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep learning networks for digital image forgery detection. Computers and Security 128 (2023), 103155.","journal-title":"Computers and Security"},{"key":"e_1_3_1_18_2","volume-title":"2021 International Conference on Information Systems and Advanced Technologies, 1\u20137,","author":"Benhamza H.","unstructured":"H. Benhamza, A. Djeffal, and A. Cheddad. 2021. Image forgery detection review. 2021 International Conference on Information Systems and Advanced Technologies, 1\u20137, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9678207"},{"key":"e_1_3_1_19_2","volume-title":"Proceedings of the 2022 2nd International Conference on Innovative Practices in Technology and Management, 697\u2013702","author":"Pradhan S.","unstructured":"S. Pradhan, U. Chauhan, and S. Chauhan. 2022. A review on digital image forgery detection. In Proceedings of the 2022 2nd International Conference on Innovative Practices in Technology and Management, 697\u2013702, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9754125"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3241837"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3451215"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2876837"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102631"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3139052"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.12.006"},{"key":"e_1_3_1_26_2","volume-title":"Proceedings of the2020 International Conference on Computer Communication and Informatics, 1\u20136,","author":"Shah T. J.","unstructured":"T. J. Shah and M. Tariq Banday. 2020. A comparative study of block-based copy-move forgery detection techniques. In Proceedings of the2020 International Conference on Computer Communication and Informatics, 1\u20136, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9104074"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00462-x"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2664893"},{"key":"e_1_3_1_29_2","volume-title":"Proceedings of the 2021 6th International Conference on Image Information Processing, 533\u2013538","author":"Rani R.","unstructured":"R. Rani, A. Kumar, and A. Rai. 2021. A brief review on existing techniques for detecting digital image forgery. 2021. In Proceedings of the 2021 6th International Conference on Image Information Processing, 533\u2013538, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9702688"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118423"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2935913"},{"key":"e_1_3_1_32_2","volume-title":"Proceedings of the 2011 6th International Conference on IT Security Incident Management and IT Forensics, 48\u201361","author":"Poisel R.","unstructured":"R. Poisel and S. Tjoa. 2011. Forensics investigations of multimedia data: A review of the state-of-the-art. In Proceedings of the 2011 6th International Conference on IT Security Incident Management and IT Forensics, 48\u201361, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/5931112"},{"key":"e_1_3_1_33_2","volume-title":"Proceedings of the 2022 6th International Conference on Informatics and Computational Sciences, 134\u2013139","author":"Ernawati M.","unstructured":"M. Ernawati, F. Ernawan, Y. Abbker, M. Fakhreldin, and P. W. Adi. 2022. Image splicing forgery approaches: A review and future direction. In Proceedings of the 2022 6th International Conference on Informatics and Computational Sciences, 134\u2013139, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9930543"},{"key":"e_1_3_1_34_2","volume-title":"Proceedings of the 2018 International Conference on Circuits and Systems in Digital Enterprise Technology, 1\u20135,","author":"Wilscy R. R. K.","unstructured":"R. R. K. and M. Wilscy. 2018. Pretrained convolutional neural networks as feature extractor for image splicing detection. In Proceedings of the 2018 International Conference on Circuits and Systems in Digital Enterprise Technology, 1\u20135, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/8821242"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3144878"},{"key":"e_1_3_1_36_2","volume-title":"Proceedings of the 2019 IEEE International Conference on Image Processing, 116\u2013120","author":"Mazumdar A.","unstructured":"A. Mazumdar and P. K. Bora. 2019. Deep learning-based classification of illumination maps for exposing face splicing forgeries in images. In Proceedings of the 2019 IEEE International Conference on Image Processing, 116\u2013120, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/8802969"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2017.7965621"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz148"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3264014"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3561513"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051254"},{"key":"e_1_3_1_42_2","first-page":"443","volume-title":"Transactions on Information Forensics and Security 17","author":"Wu H.","year":"2022","unstructured":"H. Wu, J. Zhou, J. Tian, J. Liu, and Y. Qiao. 2022. Robust image forgery detection against transmission over online social networks. Transactions on Information Forensics and Security 17, (2022) 443-456."},{"key":"e_1_3_1_43_2","volume-title":"Proceedings of the 2018 5th International Conference on Networking, Systems and Security, 1\u20139,","author":"Majumder M. T. H.","unstructured":"M. T. H. Majumder and A. B. M. Alim Al Islam. 2018. A tale of a deep learning approach to image forgery detection. In Proceedings of the 2018 5th International Conference on Networking, Systems and Security, 1\u20139, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/8631389"},{"key":"e_1_3_1_44_2","volume-title":"Proceedings of the 19th International Conference on Networking and Services, 28\u201333","author":"Sharma K. R.","unstructured":"K. R. Sharma, W. Y. Chiu, and W. Meng. 2023. Security analysis on social media networks via STRIDE model. In Proceedings of the 19th International Conference on Networking and Services, 28\u201333."},{"key":"e_1_3_1_45_2","volume-title":"Proceedings of the 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things, 860\u2013865","author":"Kaushik M. S.","unstructured":"M. S. Kaushik and A. B. Kandali. 2023. Convolutional neural network based digital image forensics using random forest and SVM classifier. In Proceedings of the 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things, 860\u2013865, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/10053434"},{"key":"e_1_3_1_46_2","volume-title":"Proceedings of the 2022 IEEE Global Communications Conference, 2603\u20132608","author":"Sun X.","unstructured":"X. Sun, W. Meng, W. Y. Chiu, and B. Lampe. 2022. TDL-IDS: Towards a transfer deep learning based intrusion detection system. In Proceedings of the 2022 IEEE Global Communications Conference, 2603\u20132608."},{"key":"e_1_3_1_47_2","volume-title":"Proceedings of the 36th International Conference on Machine Learning, 6105\u20136114","author":"Tan M.","unstructured":"M. Tan and Q. V. Le. 2019. EfficientNet: Rethinking model scaling for convolutional neural networks. In Proceedings of the 36th International Conference on Machine Learning, 6105\u20136114."},{"key":"e_1_3_1_48_2","volume-title":"Proceedings of the 2020 International Signal Processing, Communications and Engineering Management Conference, 244\u2013249","author":"Le-Tien T.","unstructured":"T. Le-Tien, P. X. Hanh, N. Pham-Ng-Quynh, and D. Ho-Van. 2020. A combination of super-resolution and deep learning approaches applied to image forgery detection. In Proceedings of the 2020 International Signal Processing, Communications and Engineering Management Conference, 244\u2013249, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9480963"},{"key":"e_1_3_1_49_2","volume-title":"Proceedings of the 2022 13th International Conference on Computing Communication and Networking Technologies, 1\u20136,","author":"Joshi R.","unstructured":"R. Joshi, A. Gupta, N. Kanvinde, and P. Ghonge. 2022. Forged image detection using SOTA image classification deep learning methods for image forensics with error level analysis. In Proceedings of the 2022 13th International Conference on Computing Communication and Networking Technologies, 1\u20136, Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9984489"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3633284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3633284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:01Z","timestamp":1750287241000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3633284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,8]]},"references-count":48,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6,30]]}},"alternative-id":["10.1145\/3633284"],"URL":"https:\/\/doi.org\/10.1145\/3633284","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,8]]},"assertion":[{"value":"2023-05-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}