{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T15:28:27Z","timestamp":1770046107030,"version":"3.49.0"},"reference-count":42,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T00:00:00Z","timestamp":1616457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2021,11,17]]},"abstract":"<jats:p>Forged portraits of people are widely used for creating deceitful propaganda of individuals or events in social media, and even for cooking up fake pieces of evidence in court proceedings. Hence, it is very important to find the authenticity of the images, and image forgery detection is a significant research area now. This work proposes an ensemble learning technique by combining predictions of different Convolutional Neural Networks (CNNs) for detecting forged portrait photographs. In the proposed method seven different pretrained CNN architectures such as AlexNet, VGG-16, GoogLeNet, Res-Net-18, ResNet-101, Inception-v3, and Inception-ResNet-v2 are utilized. As an initial step, we fine-tune the seven pretrained networks for portrait forgery detection with illuminant maps of images as input, and then uses a majority voting ensemble scheme to combine predictions from the fine-tuned networks. Ensemble methods had been found out to be good for improving the generalization capability of classification models. Experimental analysis is conducted using two publicly available portrait splicing datasets (DSO-1 and DSI-1). The results show that the proposed method outperforms the state-of-the-art methods using traditional machine learning techniques as well as the methods using single CNN classification models.<\/jats:p>","DOI":"10.3233\/jifs-189857","type":"journal-article","created":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T13:39:46Z","timestamp":1616765986000},"page":"5347-5357","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["Portrait photography splicing detection using ensemble of convolutional neural networks"],"prefix":"10.1177","volume":"41","author":[{"given":"K.","family":"Remya Revi","sequence":"first","affiliation":[{"name":"SAINTGITS College of Engineering, APJ Abdul Kalam Technological University, Kerala, India"}]},{"given":"M.","family":"Wilscy","sequence":"additional","affiliation":[{"name":"SAINTGITS College of Engineering, APJ Abdul Kalam Technological University, Kerala, India"}]},{"given":"Rahul","family":"Antony","sequence":"additional","affiliation":[{"name":"SAINTGITS College of Engineering, APJ Abdul Kalam Technological University, Kerala, India"}]}],"member":"179","published-online":{"date-parts":[[2021,3,23]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04401-0"},{"key":"e_1_3_1_3_2","unstructured":"Ali SharifR. HosseinA. JosephineS. and StefanC. CNN Features off-the-shelf: an Astounding Baseline for Recognition Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (2014) 512\u2013519."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3285-0"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506548"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2265677"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2017.1120"},{"key":"e_1_3_1_8_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-020-57866-2","article-title":"Structural Analysis and Optimization of Convolutional Neural Networks with a Small Sample Size","volume":"10","author":"D\u2019souza R.N.","year":"2020","unstructured":"D\u2019souzaR.N., HuangP.Y. and YehF.C., Structural Analysis and Optimization of Convolutional Neural Networks with a Small Sample Size, Scientific Reports10 (2020), 1\u201313.","journal-title":"Scientific Reports"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-019-00203-0"},{"key":"e_1_3_1_10_2","doi-asserted-by":"crossref","unstructured":"DietterichT.G. Ensemble Methods in Machine Learning Multiple Classifier Systems. MCS 2000. Lecture Notes in Computer Science Springer Berlin Heidelberg (2000) 1\u201315.","DOI":"10.1007\/3-540-45014-9_1"},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","unstructured":"DongJ. WangW. and TanT. CASIA image tampering detection evaluation database Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing IEEE Beijing China (2013) 422\u2013426.","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"e_1_3_1_12_2","unstructured":"EvonD. President Obama Awarded the Presidential Medal of Freedom to Weinstein Weiner Clinton and Cosby? Snopes Media Group Inc. https:\/\/www.snopes.com\/fact-check\/obama-medal-of-freedom-weinstein-clinton-cosby-weiner\/."},{"key":"e_1_3_1_13_2","unstructured":"FridrichJ. SoukalD. and Luk\u00e1\u0161J. Detection of Copy-Move Forgery in Digital Images Proceedings of Digital Forensic Research Workshop (2003)."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(01)00045-2"},{"key":"e_1_3_1_15_2","unstructured":"GompertzW. Harvey Weinstein timeline: How the scandal unfolded - BBC News https:\/\/www.bbc.co.uk\/news\/entertainment-arts-41594672."},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","unstructured":"HeK. ZhangX. RenS. and SunJ. Deep Residual Learning for Image Recognition Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016) 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","unstructured":"HsuY.-F. and ChangS.-F. Detecting Image Splicing Using Geometry Invariants and Camera Characteristics Consistency Proceedings of the IEEE International Conference. Multimedia and Expo (2006) 549\u2013552.","DOI":"10.1109\/ICME.2006.262447"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5189-5"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1080\/02664763.2018.1441383"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08621-2"},{"key":"e_1_3_1_21_2","unstructured":"KingmaD.P. and BaJ.L. Adam: A method for stochastic optimization Proceedings of the third International Conference on Learning Representations (2015) 1\u201315."},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"KrizhevskyA. SutskeverI. and HintonG.E. ImageNet classification with deep convolutional neural networks Magazine Communications of the ACM (2017) 84\u201390.","DOI":"10.1145\/3065386"},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","unstructured":"KunchevaL.I. Combining pattern classifiers: methods and algorithms 2nd ed. Wiley (2014).","DOI":"10.1002\/9781118914564"},{"key":"e_1_3_1_24_2","unstructured":"NgT.-T. and ChangS.-F. A model for image splicing Proceedings of the International Conference on Image Processing (ICIP) IEEE Singapore (2004) 1169\u20131172."},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","unstructured":"OquabM. BottouL. LaptevI. and SivicJ. Learning and transferring mid-level image representations using convolutional neural networks Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2014) 1717\u20131724.","DOI":"10.1109\/CVPR.2014.222"},{"key":"e_1_3_1_26_2","first-page":"1","article-title":"A high-accuracy model average ensemble of convolutional neural networks for classification of cloud image patches on small datasets","volume":"9","author":"Phung V.H.","year":"2019","unstructured":"PhungV.H. and RheeE.J., A high-accuracy model average ensemble of convolutional neural networks for classification of cloud image patches on small datasets, Applied Sciences (Switzerland)9 (2019), 1\u201316.","journal-title":"Applied Sciences (Switzerland)"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-179720"},{"key":"e_1_3_1_28_2","doi-asserted-by":"crossref","unstructured":"RiessC. and AngelopoulouE. Scene Illumination as an Indicator of Image Manipulation Proceedings of the InternationalWorkshop on Information Hiding Springer Berlin Heidelberg (2010) 66\u201380.","DOI":"10.1007\/978-3-642-16435-4_6"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"e_1_3_1_30_2","doi-asserted-by":"crossref","unstructured":"RotaP. SanginetoE. ConotterV. and PramerdorferC. Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? Proceedings of the 23rd International Conference on Pattern Recognition (ICPR) IEEE Cancun Mexico (2017) 2503\u20132508.","DOI":"10.1109\/ICPR.2016.7900012"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-179722"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1249"},{"key":"e_1_3_1_33_2","unstructured":"SimonyanK. and ZissermanA. Very Deep Convolutional Networks for Large-Scale Image Recognition arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_1_34_2","doi-asserted-by":"crossref","unstructured":"SzegedyC. IoffeS. VanhouckeV. and AlemiA.A. Inception-v4 Inception-ResNet and the Impact of Residual Connections on Learning Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17) San Francisco California USA. (2017) 4278\u20134284.","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"e_1_3_1_35_2","doi-asserted-by":"crossref","unstructured":"SzegedyC. LiuW. JiaY. SermanetP. ReedS. AnguelovD. ErhanD. VanhouckeV. and RabinovichA. Going deeper with convolutions Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2015) 1\u20139.","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_1_36_2","doi-asserted-by":"crossref","unstructured":"SzegedyC. VanhouckeV. IoffeS. ShlensJ. and WojnaZ. Rethinking the InceptionArchitecture for Computer Vision Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2016) 2818\u20132826.","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_1_37_2","first-page":"323","article-title":"Color constancy through inverse-intensity chromaticity space","volume":"21","author":"Tan R.T.","year":"2004","unstructured":"TanR.T., NishinoK. and IkeuchiK., Color constancy through inverse-intensity chromaticity space, Journal of the Optical Society of America21 (2004), 323\u2013351.","journal-title":"Journal of the Optical Society of America"},{"key":"e_1_3_1_38_2","first-page":"1","article-title":"Digital images authentication technique based on DWT, DCT and local binary patterns","volume":"18","author":"Vega E.A.A.","year":"2018","unstructured":"VegaE.A.A., OrozcoA.L.S., VillalbaL.J.G. and Hernandez-CastroJ., Digital images authentication technique based on DWT, DCT and local binary patterns, Sensors (Switzerland)18 (2018), 1\u201318.","journal-title":"Sensors (Switzerland)"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169261"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.038"},{"key":"e_1_3_1_41_2","unstructured":"YosinskiJ. CluneJ. BengioY. and LipsonH. How transferable are features in deep neural networks? Proceedings of the 27th International Conference on Neural Information Processing Systems MIT Press (2014) 3320\u20133328."},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903550"},{"key":"e_1_3_1_43_2","doi-asserted-by":"crossref","unstructured":"ZhouJ. NiJ. and RaoY. Block-Based Convolutional Neural Network for Image Forgery Detection Digital Forensics and Watermarking. IWDW 2017. Lecture Notes in Computer Science Springer Cham (2017) 65\u201376.","DOI":"10.1007\/978-3-319-64185-0_6"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189857","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-189857","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T03:53:44Z","timestamp":1770004424000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-189857"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,23]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,11,17]]}},"alternative-id":["10.3233\/JIFS-189857"],"URL":"https:\/\/doi.org\/10.3233\/jifs-189857","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,23]]}}}