{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:52:51Z","timestamp":1769943171041,"version":"3.49.0"},"reference-count":52,"publisher":"MDPI AG","issue":"22","license":[{"start":{"date-parts":[[2020,11,21]],"date-time":"2020-11-21T00:00:00Z","timestamp":1605916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Moving away from hand-crafted feature extraction, the use of data-driven convolution neural network (CNN)-based algorithms facilitates the realization of end-to-end automated forgery detection in multimedia forensics. On the basis of fingerprints acquired by images from different camera models, the goal of this paper is to design an effective detector capable of completing image forgery detection and localization. Specifically, relying on the designed constant high-pass filter, we first establish a well-performing CNN architecture to adaptively and automatically extract characteristics, and design a reliability fusion map (RFM) to improve localization resolution, and tamper detection accuracy. The extensive results from our empirical experiments demonstrate the effectiveness of our proposed RFM-based detector, and its better performance than other competing approaches.<\/jats:p>","DOI":"10.3390\/s20226668","type":"journal-article","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T01:28:48Z","timestamp":1606094928000},"page":"6668","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Image Forgery Detection and Localization via a Reliability Fusion Map"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4680-5536","authenticated-orcid":false,"given":"Hongwei","family":"Yao","sequence":"first","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"},{"name":"Institute of Cyberspace Research, Zhejiang University, Hangzhou 310027, China"}]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Tong","family":"Qiao","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Yiming","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Ning","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1109\/TMM.2018.2872863","article-title":"Statistical model-based detector via texture weight map: Application in re-sampling authentication","volume":"21","author":"Qiao","year":"2018","journal-title":"IEEE Trans. Multimedia"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1007\/s11042-016-4314-1","article-title":"Exposing image resampling forgery by using linear parametric model","volume":"77","author":"Qiao","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","article-title":"Copy-move forgery detection and localization by means of robust clustering with J-Linkage","volume":"28","author":"Amerini","year":"2013","journal-title":"Signal Process. Image Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1109\/TIFS.2010.2078506","article-title":"Region duplication detection using image feature matching","volume":"5","author":"Pan","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"8247","DOI":"10.1007\/s11042-018-6809-4","article-title":"Source camera identification via low dimensional PRNU features","volume":"78","author":"Zhao","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.image.2016.12.011","article-title":"Individual camera device identification from JPEG images","volume":"52","author":"Qiao","year":"2017","journal-title":"Signal Process. Image Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"78038","DOI":"10.1109\/ACCESS.2018.2884710","article-title":"Identifying Individual Camera Device From RAW Images","volume":"6","author":"Qiao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","article-title":"Determining image origin and integrity using sensor noise","volume":"3","author":"Chen","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/TIFS.2010.2077628","article-title":"Camera response functions for image forensics: An automatic algorithm for splicing detection","volume":"5","author":"Hsu","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TCSVT.2014.2347513","article-title":"Passive image-splicing detection by a 2-D noncausal Markov model","volume":"25","author":"Zhao","year":"2015","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","article-title":"Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)","volume":"51","author":"Salloum","year":"2018","journal-title":"J. Vis. Commun. Image Represent"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Bunk, J., Bappy, J.H., Mohammed, T.M., Nataraj, L., Flenner, A., Manjunath, B., Chandrasekaran, S., Roy-Chowdhury, A.K., and Peterson, L. (2017, January 21\u201326). Detection and localization of image forgeries using resampling features and deep learning. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA.","DOI":"10.1109\/CVPRW.2017.235"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Chen, C., McCloskey, S., and Yu, J. (2017, January 21\u201326). Image Splicing Detection via Camera Response Function Analysis. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.203"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Rao, Y., and Ni, J. (2016, January 4\u20137). A deep learning approach to detection of splicing and copy-move forgeries in images. Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security, Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., and Natarajan, P. (2017, January 23\u201327). Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. Proceedings of the 2017 ACM on Multimedia Conference, Silicon Valley, CA, USA.","DOI":"10.1145\/3123266.3123411"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","article-title":"Efficient dense-field copy\u2013move forgery detection","volume":"10","author":"Cozzolino","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Soni, B., Das, P.K., and Thounaojam, D.M. (2017, January 24\u201326). Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature. Proceedings of the 7th International Conference on Computer and Communication Technology, Allahabad, India.","DOI":"10.1145\/3154979.3155001"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Verdoliva, L., Cozzolino, D., and Poggi, G. (2014, January 3\u20135). A feature-based approach for image tampering detection and localization. Proceedings of the 2014 IEEE Information Forensics and Security (WIFS), Atlanta, GA, USA.","DOI":"10.1109\/WIFS.2014.7084319"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bappy, J.H., Roy-Chowdhury, A.K., Bunk, J., Nataraj, L., and Manjunath, B. (2017, January 22\u201329). Exploiting spatial structure for localizing manipulated image regions. Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy.","DOI":"10.1109\/ICCV.2017.532"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"29303","DOI":"10.1007\/s11042-018-5959-8","article-title":"Video logo removal detection based on sparse representation","volume":"77","author":"Jin","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_21","unstructured":"Pibre, L., J\u00e9r\u00f4me, P., Ienco, D., and Chaumont, M. (2015, November 16). Deep Learning for Steganalysis Is Better Than a Rich Model with An Ensemble Classifier, and Is Natively Robust to the Cover Source-Mismatch. Available online: https:\/\/arxiv.org\/abs\/1511.04855."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Bayar, B., and Stamm, M.C. (2017, January 17\u201320). Augmented convolutional feature maps for robust cnn-based camera model identification. Proceedings of the 2017 IEEE International Conference on Image Processing (ICIP), Beijing, China.","DOI":"10.1109\/ICIP.2017.8297053"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","article-title":"Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection","volume":"13","author":"Bayar","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/TIFS.2017.2656823","article-title":"Image forgery localization via integrating tampering possibility maps","volume":"12","author":"Li","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., Zhu, F., Yarlagadda, S.K., Tubaro, S., Bestagini, P., and Delp, E.J. (2018, January 12\u201315). Reliability map estimation for CNN-based camera model attribution. Proceedings of the 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), Lake Tahoe, NV, USA.","DOI":"10.1109\/WACV.2018.00111"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Bondi, L., Lameri, S., G\u00fcera, D., Bestagini, P., Delp, E.J., and Tubaro, S. (2017, January 21\u201326). Tampering detection and localization through clustering of camera-based CNN features. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Honolulu, HI, USA.","DOI":"10.1109\/CVPRW.2017.232"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","article-title":"Robust median filtering forensics using an autoregressive model","volume":"8","author":"Kang","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Chierchia, G., Cozzolino, D., Poggi, G., Sansone, C., and Verdoliva, L. (2014, January 4\u20139). Guided filtering for PRNU-based localization of small-size image forgeries. Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy.","DOI":"10.1109\/ICASSP.2014.6854802"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TSP.2004.839932","article-title":"Exposing digital forgeries by detecting traces of resampling","volume":"53","author":"Popescu","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Kirchner, M. (2008, January 22\u201323). Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. Proceedings of the 10th ACM Workshop on Multimedia and Security, Oxford, UK.","DOI":"10.1145\/1411328.1411333"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Qiu, X., Li, H., Luo, W., and Huang, J. (2014, January 11). A universal image forensic strategy based on steganalytic model. Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, Salzburg, Austria.","DOI":"10.1145\/2600918.2600941"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., and Verdoliva, L. (2019). Noiseprint: A CNN-based camera model fingerprint. arXiv.","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, Y., Zhou, Z., and Luo, J. (2018, January 20\u201324). Boundary-based image forgery detection by fast shallow cnn. Proceedings of the 2018 24th International Conference on Pattern Recognition (ICPR), Beijing, China.","DOI":"10.1109\/ICPR.2018.8545074"},{"key":"ref_34","unstructured":"Mazaheri, G., Mithun, N.C., Bappy, J.H., and Roy-Chowdhury, A.K. (2019, January 16\u201317). A Skip Connection Architecture for Localization of Image Manipulations. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Long Beach, CA, USA."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Bi, X., Wei, Y., Xiao, B., and Li, W. (2019, January 16\u201317). RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Long Beach, CA, USA.","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/s11554-019-00866-x","article-title":"A multi-purpose image forensic method using densely connected convolutional neural networks","volume":"16","author":"Chen","year":"2019","journal-title":"J. REAL-TIME IMAGE PR."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"67","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-327","article-title":"A preliminary study on convolutional neural networks for camera model identification","volume":"2017","author":"Bondi","year":"2017","journal-title":"J. Electron. Imaging"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","article-title":"Exposing digital forgeries from JPEG ghosts","volume":"4","author":"Farid","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","article-title":"Image forgery localization via block-grained analysis of JPEG artifacts","volume":"7","author":"Bianchi","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Gragnaniello, D., and Verdoliva, L. (2014, January 27\u201330). Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques. Proceedings of the 2014 IEEE International Conference on Image Processing (ICIP), Paris, France.","DOI":"10.1109\/ICIP.2014.7026073"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Gaborini, L., Bestagini, P., Milani, S., Tagliasacchi, M., and Tubaro, S. (2014, January 3\u20135). Multi-clue image tampering localization. Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, USA.","DOI":"10.1109\/WIFS.2014.7084315"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1312","DOI":"10.1109\/TIP.2016.2518870","article-title":"Multi-scale fusion for improved localization of malicious tampering in digital images","volume":"25","author":"Korus","year":"2016","journal-title":"IEEE Trans. Image Process."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/LSP.2015.2507598","article-title":"Improved tampering localization in digital image forensics based on maximal entropy random walk","volume":"23","author":"Korus","year":"2016","journal-title":"IEEE Signal Process Lett."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Qian, Y., Dong, J., Wang, W., and Tan, T. (2015, January 9\u201311). Deep learning for steganalysis via convolutional neural networks. Proceedings of the Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA.","DOI":"10.1117\/12.2083479"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078","article-title":"Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch","volume":"2016","author":"Pibre","year":"2016","journal-title":"Electron. Imaging"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Tuama, A., Comby, F., and Chaumont, M. (2016, January 4\u20137). Camera model identification with the use of deep convolutional neural networks. Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/WIFS.2016.7823908"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"24973","DOI":"10.1109\/ACCESS.2018.2832066","article-title":"Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network","volume":"6","author":"Yao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1080\/15567281.2010.531500","article-title":"The dresden image database for benchmarking digital image forensics","volume":"3","author":"Gloe","year":"2010","journal-title":"J. Digit. Forensic Pract."},{"key":"ref_49","unstructured":"Bottou, L. (2010, January 22\u201327). Large-scale machine learning with stochastic gradient descent. Proceedings of the 19th International Conference on Computational Statistics (COMPSTAT), Paris, France."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"107082","DOI":"10.1016\/j.patcog.2019.107082","article-title":"Efficient nearest neighbor search in high dimensional hamming space","volume":"99","author":"Fan","year":"2020","journal-title":"Pattern Recognit."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Chen, B., Tan, W., Coatrieux, G., Zheng, Y., and Shi, Y.Q. (2020). A serial image copy-move forgery localization scheme with source\/target distinguishment. IEEE Trans. Multimedia.","DOI":"10.1109\/TMM.2020.3026868"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Fan, B., Liu, H., Zeng, H., Zhang, J., Liu, X., and Han, J. (2020). Deep Unsupervised Binary Descriptor Learning through Locality Consistency and Self Distinctiveness. IEEE Trans. Multimedia.","DOI":"10.1109\/TMM.2020.3016122"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/22\/6668\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:35:21Z","timestamp":1760178921000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/22\/6668"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,21]]},"references-count":52,"journal-issue":{"issue":"22","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20226668"],"URL":"https:\/\/doi.org\/10.3390\/s20226668","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,21]]}}}