{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:47Z","timestamp":1776926327477,"version":"3.51.2"},"reference-count":112,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066202","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T03:54:28Z","timestamp":1751601268000},"page":"4195-4221","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["A Survey of Image Forensics: Exploring Forgery Detection in Image Colorization"],"prefix":"10.32604","volume":"84","author":[{"given":"Saurabh","family":"Agarwal","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Nancy","family":"Girdhar","sequence":"additional","affiliation":[]},{"given":"Cheonshik","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ki-Hyun","family":"Jung","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.image.2010.05.003","article-title":"A bibliography on blind methods for identifying image forgery","volume":"25","author":"Mahdian","year":"2010","journal-title":"Sig Process Image Commun"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Commun ACM"},{"key":"ref3","series-title":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC); 2018 Nov 12\u201315; Honolulu, HI, USA","first-page":"733","article-title":"Fake colorized image detection with channel-wise convolution based deep-learning framework","author":"Zhuo"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"27583","DOI":"10.1007\/s11042-020-09299-2","article-title":"Color vision deficiency datasets & recoloring evaluation using GANs [Internet]","volume":"79","author":"Li","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"ref5","series-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2017 Jul 21\u201326; Honolulu, HI, USA","first-page":"5967","article-title":"Image-to-image translation with conditional adversarial networks [Internet]","author":"Isola"},{"key":"ref6","series-title":"IEEE International Conference on Computer Vision (ICCV); 2017 Oct 22\u201329; Venice, Italy","first-page":"2242","article-title":"Unpaired image-to-image translation using cycle-consistent adversarial networks [Internet]","author":"Zhu"},{"key":"ref7","series-title":"31st Conference on Neural Information Processing Systems (NIPS 2017); 2017 Dec 4\u20139; Long Beach, CA, USA","article-title":"Toward multimodal image-to-image translation","author":"Zhu"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","article-title":"A comprehensive survey on robust image watermarking","volume":"488","author":"Wan","year":"2022","journal-title":"Neurocomputing"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"110","DOI":"10.3390\/info11020110","article-title":"Digital image watermarking techniques: a review","volume":"11","author":"Begum","year":"2020","journal-title":"Information"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.eng.2018.02.008","article-title":"Recent advances in passive digital image security forensics: a brief review","volume":"4","author":"Lin","year":"2018","journal-title":"Engineering"},{"key":"ref11","series-title":"Proceedings of the International Conference on Engineering, Technology and Social Science (ICONETOS 2020); 2020 Oct 31; Malang, Indonesia","article-title":"Effectiveness of deep learning architecture for pixel-based image forgery detection","author":"Fahmi"},{"key":"ref12","first-page":"4747","article-title":"An evaluation of digital image forgery detection approaches","volume":"12","author":"Kashyap","year":"2017","journal-title":"Int J Appl Eng Res"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2350050","DOI":"10.1142\/S021946782350050X","article-title":"Fake colorized image detection approaches: a review","volume":"23","author":"Salman","year":"2023","journal-title":"Int J Image Grap"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"117709","DOI":"10.1016\/j.eswa.2022.117709","article-title":"Image encryption scheme based on blind signature and an improved Lorenz system","volume":"205","author":"Ye","year":"2022","journal-title":"Expert Syst Appl"},{"key":"ref15","first-page":"1","author":"Farid","year":"2009","journal-title":"Advances in computers"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"486","DOI":"10.19139\/soic.v7i2.542","article-title":"An analysis of image forgery detection techniques","volume":"7","author":"Kaur","year":"2019","journal-title":"Stat, Optim Inf Comput"},{"key":"ref17","first-page":"163","author":"Meena","year":"2019","journal-title":"Data, engineering and applications"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/s11042-016-4289-y","article-title":"A copy-move forgery detection method based on CMFD-SIFT","volume":"77","author":"Yang","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"5419","DOI":"10.1007\/s11042-018-6266-0","article-title":"2-Levels of clustering strategy to detect and locate copy-move forgery in digital images","volume":"79","author":"Abdel-Basset","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.jvcir.2018.03.015","volume":"53","author":"Mahmood","year":"2018","journal-title":"J Vis Commun Image Represent"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"59783","DOI":"10.1007\/s11042-023-17964-5","article-title":"Enhancing copy-move forgery detection through a novel CNN architecture and comprehensive dataset analysis [Internet]","volume":"83","author":"Kuznetsov","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"103685","DOI":"10.1016\/j.ipm.2024.103685","article-title":"Strong robust copy-move forgery detection network based on layer-by-layer decoupling refinement [Internet]","volume":"61","author":"Wang","year":"2024","journal-title":"Inf Process Manag"},{"key":"ref23","series-title":"2013 IEEE China Summit and International Conference on Signal and Information Processing; 2013 Jul 6\u201310; Beijing, China","first-page":"422","article-title":"CASIA image tampering detection evaluation database","author":"Dong"},{"key":"ref24","series-title":"Proceedings ELMAR\u2014International Symposium Electronics in Marine; 2013 Sep 25\u201327; Zadar, Croatia","article-title":"CoMoFoD\u2014new database for copy-move forgery detection","author":"Tralic"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TIP.2024.3482191","article-title":"Image copy-move forgery detection via deep PatchMatch and pairwise ranking learning [Internet]","volume":"34","author":"Li","year":"2025","journal-title":"IEEE Trans Image Process"},{"key":"ref26","series-title":"2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI); 2023 May 25\u201326; Chennai, India","first-page":"1","article-title":"Multiple image tampering detection using deep learning algorithm [Internet]","author":"Gadiparthi"},{"key":"ref27","series-title":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT); 2017 Jul 3\u20135; Delhi, India","first-page":"1","article-title":"A review paper on digital image forgery detection techniques","author":"Gill"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14569\/IJACSA.2016.070301","article-title":"A robust algorithm of forgery detection in copy-move and spliced images","volume":"7","author":"Huynh-Kha","year":"2016","journal-title":"IJACSA"},{"key":"ref29","series-title":"2015 IEEE International Conference on Image Processing (ICIP); 2015 Sep 27\u201330; Quebec City, QC, Canada","first-page":"2940","article-title":"Image splicing detection with local illumination estimation","author":"Fan"},{"key":"ref30","first-page":"7","article-title":"Image-splicing forgery detection based on improved LBP and K-nearest neighbors algorithm","volume":"3","author":"Hariri","year":"2015","journal-title":"Electron Inf Plan"},{"key":"ref31","series-title":"2013 IEEE Global Conference on Signal and Information Processing; 2013 Dec 3\u20135; Austin, TX, USA","first-page":"253","article-title":"Splicing image forgery detection based on DCT and local binary pattern","author":"Alahmadi"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"8301","DOI":"10.1007\/s00521-024-09511-6","article-title":"A dual-channel augmented attentive dense-convolutional network for power image splicing tamper detection","volume":"36","author":"Xing","year":"2024","journal-title":"Neural Comput Appl"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"110727","DOI":"10.1016\/j.patcog.2024.110727","article-title":"D-Net: a dual-encoder network for image splicing forgery detection and localization","volume":"155","author":"Yang","year":"2024","journal-title":"Pattern Recognit"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"124975","DOI":"10.1016\/j.eswa.2024.124975","article-title":"Multi-scale noise-guided progressive network for image splicing detection and localization","volume":"257","author":"Zhang","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-3-031-71481-8_9","author":"Singh","year":"2025","journal-title":"Computation of artificial intelligence and machine learning"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"17521","DOI":"10.1007\/s11042-022-13797-w","article-title":"Image forgery detection: a survey of recent deep-learning approaches [Internet]","volume":"82","author":"Zanardelli","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"4163","DOI":"10.1007\/s11042-024-18801-z","article-title":"Image splicing forgery detection: a review","volume":"84","author":"Kumari","year":"2025","journal-title":"Multimed Tools Appl"},{"key":"ref38","series-title":"2009 WRI International Conference on Communications and Mobile Computing; 2009 Jan 6\u20138; Kunming, China","first-page":"626","article-title":"An image inpainting technique based on 8-neighborhood fast sweeping method","author":"Xu"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1080\/00450618.2017.1356868","article-title":"Image forgery detection based on physics and pixels: a study","volume":"51","author":"Kumar","year":"2019","journal-title":"Aust J Forensic Sci"},{"key":"ref40","series-title":"Proceedings of the First ACM Workshop on Multimedia in Forensics; 2009 Oct 23; Beijing, China","first-page":"43","article-title":"A new approach for JPEG resize and image splicing detection","author":"Liu"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2115","DOI":"10.1109\/TIFS.2017.2699638","article-title":"A random matrix approach to the forensic analysis of upscaled images","volume":"12","author":"V\u00e1zquez-Pad\u00edn","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"11097","DOI":"10.1007\/s11042-024-19376-5","article-title":"Robust primary quantization step estimation on resized and double JPEG compressed images","volume":"84","author":"Zhang","year":"2025","journal-title":"Multimed Tools Appl"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"107614","DOI":"10.1016\/j.engappai.2023.107614","article-title":"An exhaustive measurement of re-sampling detection in lossy compressed images using deep learning approach","volume":"129","author":"Kadha","year":"2024","journal-title":"Eng Appl Artif Intell"},{"key":"ref44","series-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2019 Jun 15-20; Long Beach, CA, USA","first-page":"9535","author":"Wu"},{"key":"ref45","series-title":"IEEE International Conference on Image Processing (ICIP); 2016 Sep 25-18; Phoenix, AZ, USA","first-page":"161","article-title":"COVERAGE\u2014a novel database for copy-move forgery detection [Internet]","author":"Wen"},{"key":"ref46","series-title":"2010 International Conference on Multimedia Information Networking and Security; 2010 Nov 4\u20136; Nanjing, China","first-page":"889","article-title":"Image copy-move forgery detection based on SURF","author":"Bo"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1080\/15567281.2010.531500","article-title":"The Dresden image database for benchmarking digital image forensics","volume":"3","author":"Gloe","year":"2010","journal-title":"J Digit Forensic Pract"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","article-title":"Copy-move forgery detection based on convolutional kernel network","volume":"77","author":"Liu","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"ref49","series-title":"IEEE International Conference on Computer Vision (ICCV); 2015 Dec 7\u201313; Santiago, Chile","first-page":"91","article-title":"Local convolutional features with unsupervised training for image retrieval [Internet]","author":"Paulin"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","article-title":"Hybrid LSTM and encoder-decoder architecture for detection of image forgeries","volume":"28","author":"Bappy","year":"2019","journal-title":"IEEE Trans Image Process"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"858","DOI":"10.3390\/electronics9050858","article-title":"A detection approach using LSTM-CNN for object removal caused by exemplar-based image inpainting","volume":"9","author":"Lu","year":"2020","journal-title":"Electronics"},{"key":"ref52","first-page":"472","author":"Schaefer","year":"2004","journal-title":"Storage and retrieval methods and applications for multimedia"},{"key":"ref53","first-page":"170","author":"Wu","year":"2018","journal-title":"Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.image.2018.05.015","article-title":"A deep learning approach to patch-based image inpainting forensics","volume":"67","author":"Zhu","year":"2018","journal-title":"Signal Process Image Commun"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"102720","DOI":"10.1016\/j.inffus.2024.102720","article-title":"Image colorization: a survey and dataset","volume":"114","author":"Anwar","year":"2025","journal-title":"Inf Fusion"},{"key":"ref56","series-title":"2017 30th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI); 2017 Oct 17\u201320; Niteroi, Brazil","first-page":"71","article-title":"Detecting computer generated images with deep convolutional neural networks","author":"de Rezende"},{"key":"ref57","series-title":"2017 IEEE International Conference on Image Processing (ICIP); 2017 Sep 17\u201320; Beijing, China","first-page":"4093","article-title":"Identifying photorealistic computer graphics using convolutional neural networks","author":"Yu"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"2772","DOI":"10.1109\/TIFS.2018.2834147","article-title":"Distinguishing between natural and computer-generated images using convolutional neural networks","volume":"13","author":"Quan","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref59","series-title":"IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops; 2019 Jun 15\u201320; Long Beach, CA, USA","first-page":"146","article-title":"Classification of computer generated and natural images based on efficient deep convolutional recurrent attention model","author":"Tariang"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1007\/s11390-020-0216-9","article-title":"Distinguishing computer-generated images from natural images using channel and pixel correlation","volume":"35","author":"Zhang","year":"2020","journal-title":"J Comput Sci Technol"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"4743","DOI":"10.3390\/s20174743","article-title":"Detection of computer graphics using attention-based dual-branch convolutional neural network from fused color components","volume":"20","author":"He","year":"2020","journal-title":"Sensors"},{"key":"ref62","first-page":"301023","article-title":"Learn with diversity and from harder samples: improving the generalization of CNN-based detection of computer-generated images","volume":"35","author":"Quan","year":"2020","journal-title":"Forensic Sci Int Digit Investig"},{"key":"ref63","author":"Ng","year":"2004","journal-title":"Columbia photographic images and photorealistic computer graphics dataset ADVENT"},{"key":"ref64","series-title":"2009 IEEE Conference on Computer Vision and Pattern Recognition; 2009 Jun 20\u201325; Miami, FL, USA","first-page":"248","article-title":"ImageNet: a large-scale hierarchical image database","author":"Deng"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"164","DOI":"10.3390\/forensicsci4010010","article-title":"Simple methods for improving the forensic classification between computer-graphics images and natural images","volume":"4","author":"Bouhamidi","year":"2024","journal-title":"Forensic Sci"},{"key":"ref66","series-title":"2017 IEEE Workshop on Information Forensics and Security (WIFS); 2017 Dec 4\u20137; Rennes","first-page":"1","article-title":"Distinguishing computer graphics from natural images using convolution neural networks","author":"Rahmouni"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/LSP.2018.2855566","article-title":"Computer graphics identification combining convolutional and recurrent neural networks","volume":"25","author":"He","year":"2018","journal-title":"IEEE Signal Process Lett"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1186\/s13635-017-0067-2","article-title":"VISION: a video and image dataset for source identification","volume":"2017","author":"Shullani","year":"2017","journal-title":"EURASIP J Inf Secur"},{"key":"ref69","series-title":"Encyclopedia of computer graphics and games","first-page":"62","article-title":"3D-rendered images and their application in the interior design [Internet]","author":"Budakov","year":"2024"},{"key":"ref70","series-title":"2nd International Conference on Computer Graphics and Image Processing (CGIP); 2024 Jan 12\u201315; Kyoto, Japan","first-page":"91","article-title":"Computer graphics 3D and rendering practice design research [Internet]","author":"Qian"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1016\/j.jvcir.2013.08.009","volume":"24","author":"Tokuda","year":"2013","journal-title":"J Vis Commun Image Represent"},{"key":"ref72","series-title":"Proceedings of the 6th ACM Multimedia Systems Conference; 2015 Mar 18\u201320; Portland, OR, USA","first-page":"219","article-title":"RAISE: a raw images dataset for digital image forensics","author":"Dang-Nguyen"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1109\/LSP.2016.2641006","article-title":"First steps toward camera model identification with convolutional neural networks","volume":"24","author":"Bondi","year":"2017","journal-title":"IEEE Signal Process Lett"},{"key":"ref74","series-title":"2016 IEEE International Workshop on Information Forensics and Security (WIFS); 2016 Dec 4\u20137; Abu Dhabi, United Arab Emirates","first-page":"1","article-title":"Camera model identification with the use of deep convolutional neural networks","author":"Tuama"},{"key":"ref75","series-title":"IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2018 Apr 15\u201320; Calgary, AB, Canada","first-page":"2007","article-title":"Towards open set camera model identification using a deep learning framework","author":"Bayar"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","article-title":"Noiseprint: a CNN-based camera model fingerprint","volume":"15","author":"Cozzolino","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"28079","DOI":"10.1007\/s11042-020-09106-y","article-title":"Deep Siamese network for limited labels classification in source camera identification","volume":"79","author":"Sameer","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"ref78","series-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2015 Jun 7\u201312; Boston, MA, USA","first-page":"427","article-title":"Deep neural networks are easily fooled: high confidence predictions for unrecognizable images","author":"Nguyen"},{"key":"ref79","series-title":"2nd International Conference on Learning Representations, ICLR 2014\u2014Conference Track Proceedings; 2014 Apr 14\u201316; Banff, AB, Canada","article-title":"Intriguing properties of neural networks","author":"Szegedy"},{"key":"ref80","series-title":"25th IEEE International Conference on Image Processing (ICIP); 2018 Oct 7\u201310; Athens, Greece","first-page":"535","article-title":"Mislgan: an anti-forensic camera model falsification framework using a generative adversarial network","author":"Chen"},{"key":"ref81","first-page":"99","article-title":"Generative adversarial attacks against deep-learning-based camera model identification","author":"Chen","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"4923","DOI":"10.3934\/mbe.2019248","article-title":"An anti-forensic scheme on computer graphic images and natural images using generative adversarial networks","volume":"16","author":"Cui","year":"2019","journal-title":"Math Biosci Eng"},{"key":"ref83","series-title":"ICASSP 2019\u20142019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2019 May 12\u201317; Brighton, UK","first-page":"8286","article-title":"On the transferability of adversarial examples against CNN-based image forensics","author":"Barni"},{"key":"ref84","series-title":"2015 IEEE International Conference on Computer Vision (ICCV); 2015 Dec 7\u201313; Santiago, Chile","first-page":"3730","article-title":"Deep learning face attributes in the wild","author":"Liu"},{"key":"ref85","series-title":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI); 2019 Oct 19\u201321; Suzhou, China","first-page":"1","article-title":"Semi-auto sketch colorization based on conditional generative adversarial networks","author":"Cheng"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"113326","DOI":"10.1109\/ACCESS.2021.3104515","article-title":"Grayscale image colorization methods: overview and evaluation","volume":"9","author":"\u017deger","year":"2021","journal-title":"IEEE Access"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/566654.566576","article-title":"Transferring color to greyscale images","volume":"21","author":"Welsh","year":"2002","journal-title":"ACM Trans Graph"},{"key":"ref88","author":"Weitz","year":"2020","journal-title":"The basics of hand-coloring black-and-white prints"},{"key":"ref89","unstructured":"Gable G. Scanning around with gene: the miracle of photochrom, CreativePro network 2009. [cited 2024 Mar 18]. Available from: https:\/\/creativepro.com\/scanning-around-gene-miracle-photochrom\/."},{"key":"ref90","unstructured":"ODSC-Open Data Science. Wonders in image processing with machine learning. San Francisco, CA, USA: Medium; 2019 [cited 2025 Jan 10]. Available from: https:\/\/odsc.medium.com\/wonders-in-image-processing-with-machine-learning-9c6f2e070e99."},{"key":"ref91","doi-asserted-by":"crossref","first-page":"1932","DOI":"10.1109\/TIFS.2018.2806926","article-title":"Fake colorized image detection","volume":"13","author":"Guo","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref92","series-title":"Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence); 2020 Jan 29\u201331; Noida, India","first-page":"507","article-title":"Forensic analysis of colorized grayscale images using local binary pattern","author":"Agarwal"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"103295","DOI":"10.1016\/j.jvcir.2021.103295","volume":"80","author":"Yu","year":"2021","journal-title":"J Vis Commun Image Represent"},{"key":"ref94","first-page":"1","article-title":"Detection of recolored image by texture features in chrominance components","volume":"19","author":"Zhang","year":"2023","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"41683","DOI":"10.1007\/s11042-023-16675-1","article-title":"Forensic analysis and detection using polycolor model binary pattern for colorized images [Internet]","volume":"83","author":"Agarwal","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref96","series-title":"IEEE International Conference on Image Processing (ICIP); 2020 Oct 25\u201328; Abu Dhabi, United Arab Emirates","first-page":"1256","article-title":"Fake generated painting detection via frequency analysis [Internet]","author":"Bai"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"104864","DOI":"10.1016\/j.dib.2019.104864","article-title":"A dataset of 1050-tampered color and grayscale images (CG-1050) [Internet]","volume":"28","author":"Castro","year":"2020","journal-title":"Data Brief"},{"key":"ref98","first-page":"167","article-title":"Image recolorization detection based on inter-channel correlation [Internet]","volume":"8","author":"Chen","year":"2022","journal-title":"Chin J Netw Inf Secur"},{"key":"ref99","first-page":"255","article-title":"Enriching fake colorized image detection","volume":"6","author":"Pillai","year":"2019","journal-title":"Int J Res Anal Rev"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"2350018","DOI":"10.1142\/S1469026823500189","article-title":"Fake colorized image detection based on special image representation and transfer learning","volume":"22","author":"Salman","year":"2023","journal-title":"Int J Comp Intel Appl"},{"key":"ref101","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-030-28752-8_11","author":"Li","year":"2019","journal-title":"Advances in digital forensics XV"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"7991","DOI":"10.1007\/s00521-022-06902-5","article-title":"Fake visual content detection using two-stream convolutional neural networks [Internet]","volume":"34","author":"Yousaf","year":"2022","journal-title":"Neural Comput Appl"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.patrec.2021.10.011","article-title":"A secure model on advanced fake image-feature network (AFIFN) based on deep learning for image forgery detection [Internet]","volume":"152","author":"Ananthi","year":"2021","journal-title":"Pattern Recognit Lett"},{"key":"ref104","series-title":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence); 2022 Jan 27\u201328; Noida, India","first-page":"285","article-title":"Fake image detection in twitter using flood fill algorithm and deep neural networks [Internet]","author":"Selva Birunda"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"476. [cited 2025 Jan 1]","DOI":"10.3390\/app11020476","article-title":"Video forensics: identifying colorized images using deep learning. applied sciences [Internet]","volume":"11","author":"Ulloa","year":"2021","journal-title":"Appl Sci"},{"key":"ref106","series-title":"2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC); 2020 Dec 13; Chongqing, China","first-page":"272","article-title":"Computer generated colorized image forgery detection using VLAD encoding and SVM [Internet]","author":"Yang"},{"key":"ref107","series-title":"2019 11th International Symposium on Image and Signal Processing and Analysis (ISPA); 2020 Sep 23\u201325; Dubrovnik, Croatia","first-page":"246","article-title":"Improving the generalization of colorized image detection with enhanced training of CNN [Internet]","author":"Quan"},{"key":"ref108","series-title":"IEEE\/WIC\/ACM International Conference on Web Intelligence\u2014Companion Volume; 2019 Oct 14\u201317; Thessaloniki, Greece","first-page":"127","article-title":"Impact of data preparation and CNN\u2019s first layer on performance of image forensics: a case study of detecting colorized images [Internet]","author":"Quan"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TIFS.2018.2834155","article-title":"Recolored image detection via a deep discriminative model","volume":"14","author":"Yan","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref110","series-title":"Proceedings of Third International Conference on Intelligent Computing, Information and Control Systems. Advances in Intelligent Systems and Computing","first-page":"275","article-title":"An efficient novel approach for detection of recolored image using deep learning for identifying the original images in public surveillance","author":"Swathi","year":"2022"},{"key":"ref111","unstructured":"Quan W, Yan DM, Wang K, Zhang X, Pellerin D. Detecting colorized images via convolutional neural networks: toward high accuracy and good generalization. arXiv:1902.06222. 2019."},{"key":"ref112","series-title":"2023 2nd International Conference for Innovation in Technology (INOCON); 2023 Mar 3\u20135; Bangalore, India","first-page":"1","article-title":"Ensemble deep learning fusion for detection of colorization based image forgeries","author":"Shashikala"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_66202\/TSP_CMC_66202.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:20Z","timestamp":1776923120000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":112,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066202","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}