{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:45:43Z","timestamp":1774719943189,"version":"3.50.1"},"reference-count":75,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T00:00:00Z","timestamp":1568592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The problem of forged images has become a global phenomenon that is spreading mainly through social media. New technologies have provided both the means and the support for this phenomenon, but they are also enabling a targeted response to overcome it. Deep convolution learning algorithms are one such solution. These have been shown to be highly effective in dealing with image forgery derived from generative adversarial networks (GANs). In this type of algorithm, the image is altered such that it appears identical to the original image and is nearly undetectable to the unaided human eye as a forgery. The present paper investigates copy-move forgery detection using a fusion processing model comprising a deep convolutional model and an adversarial model. Four datasets are used. Our results indicate a significantly high detection accuracy performance (~95%) exhibited by the deep learning CNN and discriminator forgery detectors. Consequently, an end-to-end trainable deep neural network approach to forgery detection appears to be the optimal strategy. The network is developed based on two-branch architecture and a fusion module. The two branches are used to localize and identify copy-move forgery regions through CNN and GAN.<\/jats:p>","DOI":"10.3390\/info10090286","type":"journal-article","created":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T03:31:46Z","timestamp":1568691106000},"page":"286","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Copy-Move Forgery Detection and Localization Using a Generative Adversarial Network and Convolutional Neural-Network"],"prefix":"10.3390","volume":"10","author":[{"given":"Younis","family":"Abdalla","sequence":"first","affiliation":[{"name":"Electrical Engineering&amp; Applied Science, Memorial University, St, John\u2019s, NL A1C 5S7 Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7056-4811","authenticated-orcid":false,"given":"M. Tariq","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Electrical Engineering&amp; Applied Science, Memorial University, St, John\u2019s, NL A1C 5S7 Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8464-8650","authenticated-orcid":false,"given":"Mohamed","family":"Shehata","sequence":"additional","affiliation":[{"name":"Electrical Engineering&amp; Applied Science, Memorial University, St, John\u2019s, NL A1C 5S7 Canada"},{"name":"Department of Computer Science, Math, Physics, and Statistics, University of British Columbia, Kelowna, BC V6T 1Z4, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2019,9,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1978802.1978805","article-title":"Vision of the unseen: Current trends and challenges in the digital image and video forensics","volume":"43","author":"Rocha","year":"2011","journal-title":"ACM Comput. Surv."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1155\/2013\/496701","article-title":"An overview on image forensics","volume":"2013","author":"Piva","year":"2013","journal-title":"ISRN Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","article-title":"Information forensics: An overview of the first decade","volume":"1","author":"Stamm","year":"2013","journal-title":"IEEE Access"},{"key":"ref_4","unstructured":"Fridrich, A.J., Soukal, B.D., and Luk\u00e1\u0161, A.J. (2003, January 6\u20138). Detection of copy-move forgery in digital images. Proceedings of the Digital Forensic Research Workshop, Cleveland, OH, USA."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Ke, Y., Sukthankar, R., and Huston, L. (2004, January 10\u201316). An efficient parts-based near-duplicate and sub-image retrieval system. In Proceeding of the 12th Annual ACM International Conference on Multimedia, New York, NY, USA.","DOI":"10.1145\/1027527.1027729"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., and Natarajan, P. (2018, January 8\u201314). BusterNet: Detection Copy-Move Image Forgery with Source\/Target Localization. Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany.","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TPAMI.2017.2747150","article-title":"Image Visual Realism: From Human Perception to Machine Computation","volume":"40","author":"Fan","year":"2017","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1109\/TSP.2004.839896","article-title":"How realistic is photorealistic?","volume":"53","author":"Lyu","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Wu, R., Li, X., and Yang, B. (2011, January 11\u201314). Identifying computer generated graphics VIA histogram features. Proceedings of the 2011 18th IEEE International Conference on Image Processing, Brussels, Belgium.","DOI":"10.1109\/ICIP.2011.6115849"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Dehnie, S., Sencar, T., and Memon, N. (2006, January 8\u201311). Digital Image Forensics for Identifying Computer Generated and Digital Camera Images. Proceedings of the 2006 International Conference on Image Processing, Atlanta, GA, USA.","DOI":"10.1109\/ICIP.2006.312849"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Dirik, A., Bayram, S., Sencar, H., and Memon, N. (October, January 16). New features to identify computer generated images. Proceedings of the 2007 IEEE International Conference on Image Processing, San Antonio, TX, USA.","DOI":"10.1109\/ICIP.2007.4380047"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Gallagher, A., and Chen, T. (2008, January 23\u201328). Image authentication by detecting traces of demosaicing. Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, Anchorage, AK, USA.","DOI":"10.1109\/CVPRW.2008.4562984"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Lalonde, J.-F., and Efros, A. (2007, January 14\u201321). Using color compatibility for assessing image realism. Proceedings of the 2007 IEEE 11th International Conference on Computer Vision, Rio de Janeiro, Brazil.","DOI":"10.1109\/ICCV.2007.4409107"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhang, R., Wang, R.-D., and Ng, T.-T. (2011). Distinguishing photographic images and photorealistic computer graphics using visual vocabulary on local image edges. International Workshop on Digital Forensics and Watermarking, Springer.","DOI":"10.1007\/978-3-642-32205-1_24"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., and Echizen, I. (2017, January 4\u20137). Distinguishing computer graphics from natural images using convolution neural networks. Proceedings of the 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France.","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"De Rezende, E.R., Ruppert, G.C., and Carvalho, T. (2017, January 17\u201320). Detecting Computer Generated Images with Deep Convolutional Neural Networks. Proceedings of the 2017 30th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), Niteroi, Brazil.","DOI":"10.1109\/SIBGRAPI.2017.16"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2871714","article-title":"Assessing and Improving the Identification of Computer-Generated Portraits","volume":"13","author":"Holmes","year":"2016","journal-title":"ACM Trans. Appl. Percept."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Shrivastava, A., Pfister, T., Tuzel, O., Susskind, J., Webb, R., and Wang, W. (2017, January 21\u201326). Learning from Simulated and Unsupervised Images through Adversarial Training. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.241"},{"key":"ref_19","unstructured":"Liu, M.-Y., Breuel, T., and Kautz, J. (2017, January 4\u20139). Unsupervised Image-to-Image Translation Networks. Proceedings of the Advances in Neural Information Processing Systems, Long Beach, CA, USA."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Haouchine, N., Roy, F., Courtecuisse, H., Nie\u00dfner, M., and Cotin, S. (2017). Calipso: Physics-based image and video editing through cad model proxies. arXiv.","DOI":"10.1007\/s00371-018-1600-0"},{"key":"ref_21","unstructured":"Thies, J., Zollhofer, M., Stamminger, M., Theobalt, C., and Nie\u00dfner, M. (July, January 26). Face2Face: Real-Time Face Capture and Reenactment of RGB Videos. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Isola, P., Zhu, J.-Y., Zhou, T., and Efros, A.A. (2017, January 21\u201326). Image-to-Image Translation with Conditional Adversarial Networks. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhu, J.-Y., Park, T., Isola, P., and Efros, A.A. (2017, January 22\u201329). Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MSPEC.2009.5186556","article-title":"Seeing is not believing","volume":"46","author":"Farid","year":"2009","journal-title":"IEEE Spectr."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Bayram, S., Sencar, H.T., and Memon, N. (2009, January 19\u201324). An efficient and robust method for detecting copy-move forgery. Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, Taiwan.","DOI":"10.1109\/ICASSP.2009.4959768"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","article-title":"Efficient Dense-Field Copy\u2013Move Forgery Detection","volume":"10","author":"Cozzolino","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1007\/s11042-015-3152-x","article-title":"Robustness of copy-move forgery detection under high jpeg compression artifacts","volume":"76","author":"Huang","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.forsciint.2006.11.002","article-title":"Detection of copy\u2013move forgery using a method based on blur moment invariants","volume":"171","author":"Mahdian","year":"2007","journal-title":"Forensic Sci. Int."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","article-title":"Image forgery detection using adaptive over-segmentation and feature point matching","volume":"10","author":"Pun","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","article-title":"Detection of copy-rotate-move forgery using Zernike moments","volume":"Volume 6387","author":"Ryu","year":"2010","journal-title":"International Workshop on Information Hiding"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","article-title":"Copy\u2013Move Forgery Detection by Matching Triangles of Keypoints","volume":"10","author":"Ardizzone","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Manu, V., and Mehtre, B.M. (2016). Detection of copy-move forgery in images using segmentation and surf. Advances in Signal Processing and Intelligent Recognition Systems, Springer.","DOI":"10.1007\/978-3-319-28658-7_55"},{"key":"ref_33","first-page":"199","article-title":"Detection of region duplication forgery in digital images using surf","volume":"8","author":"Shivakumar","year":"2011","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jvcir.2015.01.016","article-title":"Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes","volume":"29","author":"Silva","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1109\/TIFS.2014.2337654","article-title":"Forensic Analysis of SIFT Keypoint Removal and Injection","volume":"9","author":"Costanzo","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/s11042-016-4289-y","article-title":"A copy-move forgery detection method based on CMFD-SIFT","volume":"77","author":"Yang","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","article-title":"A SIFT-Based Forensic Method for Copy\u2013Move Attack Detection and Transformation Recovery","volume":"6","author":"Amerini","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","article-title":"Segmentation-based image copy-move forgery detection scheme","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.diin.2013.04.007","article-title":"Digital image forgery detection using passive techniques: A survey","volume":"10","author":"Birajdar","year":"2013","journal-title":"Digit. Investig."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1080\/00450618.2016.1153711","article-title":"Copy-move and splicing image forgery detection and localization techniques: A review","volume":"49","author":"Asghar","year":"2017","journal-title":"Aust. J. Forensic Sci."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1049\/iet-ipr.2017.0441","article-title":"Cmfd: A detailed review of block-based and key feature-based techniques in image copy-move forgery detection","volume":"12","author":"Soni","year":"2017","journal-title":"IET Image Process."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","article-title":"Copy-move forgery detection: Survey, challenges and future directions","volume":"75","author":"Warif","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1177\/0161734614554461","article-title":"Ultrasound image edge detection based on a novel multiplicative gradient and canny operator","volume":"37","author":"Zheng","year":"2015","journal-title":"Ultrason. Imaging"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2359","DOI":"10.1016\/j.asr.2016.03.026","article-title":"An efficient circle detection not relying on edge detection","volume":"57","author":"Cai","year":"2016","journal-title":"Adv. Space Res."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Liu, Y., Liu, T., Li, Y., and Ye, W. (2019). Edge Detection Algorithm of a Symmetric Difference Kernel SAR Image Based on the GAN Network Model. Symmetry, 11.","DOI":"10.3390\/sym11040557"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"4357","DOI":"10.1109\/TIP.2018.2835143","article-title":"Gabor Convolutional Networks","volume":"27","author":"Luan","year":"2018","journal-title":"IEEE Trans. Image Process."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Park, K., and Kim, D.H. (2019). Accelerating Image Classification using Feature Map Similarity in Convolutional Neural Networks. Appl. Sci., 9.","DOI":"10.3390\/app9010108"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Hsu, C.C., Lee, C.Y., and Zhuang, Y.X. (2018). Learning to Detect Fake Face Images in the Wild. 2018 International Symposium on Computer, Consumer and Control (IS3C), IEEE.","DOI":"10.1109\/IS3C.2018.00104"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.imavis.2016.05.006","article-title":"A Robust Similarity Measure for Volumetric Image Registration with Outliers","volume":"52","author":"Snape","year":"2016","journal-title":"Image Vis. Comput."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","article-title":"Copy-move forgery detection based on convolutional kernel network","volume":"77","author":"Liu","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Bunk, J., Bappy, J.H., Mohammed, T.M., Nataraj, L., Flenner, A., Manjunath, B., Chandrasekaran, S., Roy-Chowdhury, A.K., and Peterson, L. (2017, January 21\u201326). Detection and localization of image forgeries using resampling features and deep learning. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA.","DOI":"10.1109\/CVPRW.2017.235"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., and Natarajan, P. (2017, January 23\u201327). Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. Proceedings of the 2017 ACM on Multimedia Conference, Mountain View, CA, USA.","DOI":"10.1145\/3123266.3123411"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., and Davis, L.S. (2017, January 21\u201326). Two-Stream Neural Networks for Tampered Face Detection. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA.","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Dang, L., Hassan, S., Im, S., Lee, J., Lee, S., and Moon, H. (2018). Deep learning based computer generated face identification using a convolutional neural network. Appl. Sci., 8.","DOI":"10.3390\/app8122610"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"3221","DOI":"10.1007\/s11042-014-2431-2","article-title":"Copy-move forgery detection based on a scaled orb","volume":"75","author":"Zhu","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_56","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2014, January 8\u201313). Generative adversarial nets. Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Mohammed, T.M., Manjunath, B.S., Chandrasekaran, S., Flenner, A., Bappy, J.H., and Roy-Chowdhury, A.K. (2019). Detecting GAN generated fake images using co-occurrence matrices. arXiv.","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Cozzolino, D., and Verdoliva, L. (2018, January 10\u201312). Detection of GAN-generated Fake Images over Social Networks. Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval, Miami, FL, USA.","DOI":"10.1109\/MIPR.2018.00084"},{"key":"ref_59","unstructured":"Carey, O. (2019, February 19). Generative Adversarial Networks GANs. Available online: http:\/\/towardsdatascience.com\/generative-adversarial-networks-gans-a-beginners-guide-5b38eceece24."},{"key":"ref_60","unstructured":"Bupe, C. (2018). Why Is SVM Not Popular Nowadays, University of Zambia. Available online: https:\/\/www.quora.com\/."},{"key":"ref_61","unstructured":"Cozzoline, D., Gragnaniello, D., and Verdoliva, L. (2013). Image forgery detection based on the fusion of machine learning and block-matching methods. Computer Science\u2014Computer Vision and Pattern Recognition. arXiv."},{"key":"ref_62","unstructured":"Popescu, A.C., and Farid, H. (2004). Exposing Digital Forgeries by Detecting Duplicated Image Regions, Dartmouth College. Tech. Rep. TR2004-515."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.forsciint.2010.08.001","article-title":"Improved DCT-based detection of copy-move forgery in images","volume":"206","author":"Huang","year":"2011","journal-title":"Forensic Sci. Int."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2016\/8713202","article-title":"Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images","volume":"2016","author":"Mahmood","year":"2016","journal-title":"Math. Probl. Eng."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Yarlagadda, S.K., G\u00fcera, D., Bestagini, P., Maggie Zhu, F., Tubaro, S., and Delp, E.J. (2018). Satellite Image Forgery Detection and Localization Using GAN and One-Class Classification. arXiv.","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-214"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., and Brox, T.N. (2015, January 5\u20139). Convolutional networks for biomedical image segmentation. Proceedings of the International Conference on Medical Image Computing and Computer-Assisted Intervention, Munich, Germany.","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref_67","unstructured":"Sabour, S., Frosst, N., and Hinton, G.E. (2017, January 4\u20139). Dynamic routing between capsules. Proceedings of the Advances in Neural Information Processing Systems, Long Beach, CA, USA."},{"key":"ref_68","unstructured":"Krizhevsky, A. (2009). Learning Multiple Layers of Features from Tiny Images, University of Toronto."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"LeCun","year":"1998","journal-title":"Proc. IEEE"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Jing, W., and Hongbin, Z. (2006). Exposing digital forgeries by detecting traces of image splicing. 2006 8th International Conference on Signal Processing, IEEE.","DOI":"10.1109\/ICOSP.2006.345714"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Hinton, G.E., Krizhevsky, A., and Wang, S.D. (2011). Transforming auto-encoders. International Conference on Artificial Neural Networks, Springer.","DOI":"10.1007\/978-3-642-21735-7_6"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s11263-016-0911-8","article-title":"Visualizing deep convolutional neural networks using natural pre-images","volume":"12","author":"Mahendran","year":"2016","journal-title":"Int. J. Comput. Vis."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Dwibedi, D., Misra, I., and Hebert, M. (2017, January 22\u201329). Cut, paste and learn: Surprisingly easy synthesis for instance detection. Proceedings of the IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","DOI":"10.1109\/ICCV.2017.146"},{"key":"ref_74","unstructured":"(2019, August 28). Wagner, Forensically Beta, 16 08 2015. Available online: https:\/\/29a.ch\/photo-forensics\/#forensic-magnifier."},{"key":"ref_75","unstructured":"McQuaid, J. (2019, August 28). MagNet. Available online: https:\/\/www.magnetforensics.com\/for-forensic-examiners\/."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/9\/286\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:20:35Z","timestamp":1760188835000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/9\/286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,16]]},"references-count":75,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["info10090286"],"URL":"https:\/\/doi.org\/10.3390\/info10090286","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,16]]}}}