{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:34:01Z","timestamp":1776443641415,"version":"3.51.2"},"reference-count":36,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:00:00Z","timestamp":1659657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Ministry of Education","doi-asserted-by":"publisher","award":["NRF-2017R1D1A1B04032598"],"award-info":[{"award-number":["NRF-2017R1D1A1B04032598"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In the arena of image forensics, detecting manipulations in an image is extremely significant because of the use of images in different fields. Various detection techniques have been suggested in the literature that are based on digging out the features from images to unveil the traces left by manipulation operations. In this paper, a deep learning-based approach is proposed in which a residual network is used to learn deep, complex features from preprocessed images for classification into authentic and forged images. There is statistical symmetry in similar types of images and asymmetry in different types of images. The proposed scheme can highlight the statistical asymmetry between authentic and forged images. In the proposed scheme, firstly, an RGB image is analyzed for different JPEG compression levels. The obtained difference between the error levels is used to extract enhanced LBP code. Then, the scale- and direction-invariant LBP (SD-LBP) code is transformed into SD-LBP feature maps to feed to a deep residual network. Next, the concept of explainable artificial intelligence (XAI) is used to help provide explanations and interpret the output, thereby raising the credibility of the proposed approach. The unique feature selection approach employed is the kernel SHAP method, which is focused on the Shapley values. This technique is used to pinpoint the specific characteristics that are responsible for the aberrant behavior of the forged images dataset. Later, the deep learning-based model is trained and validated using these feature sets. A pre-activation version of ResNet-50 architecture is used that achieved an accuracy of 99.31%, 99.52%, 98.05%, and 99.10% on CASIA v1, CASIA v2, IMD 2020, and DVMM datasets, respectively. The capability of the pretrained residual network and rich textural features, which are scale- and direction-invariant, helps to expand the detection accuracy of the proposed approach. The results confirmed that the method either produced competitive results or outperformed existing methods.<\/jats:p>","DOI":"10.3390\/sym14081611","type":"journal-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T02:12:39Z","timestamp":1659665559000},"page":"1611","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Using XAI for Deep Learning-Based Image Manipulation Detection with Shapley Additive Explanation"],"prefix":"10.3390","volume":"14","author":[{"given":"Savita","family":"Walia","sequence":"first","affiliation":[{"name":"University Institute of Engineering and Technology, Panjab University, Chandigarh 160014, India"}]},{"given":"Krishan","family":"Kumar","sequence":"additional","affiliation":[{"name":"University Institute of Engineering and Technology, Panjab University, Chandigarh 160014, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3836-2595","authenticated-orcid":false,"given":"Saurabh","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Amity School of Engineering & Technology, Amity University Uttar Pradesh, Noida 201301, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7814-7454","authenticated-orcid":false,"given":"Hyunsung","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Computer Science, Kyungil University, Kyungbuk 38428, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2022,8,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1080\/00450618.2016.1153711","article-title":"Copy-Move and Splicing Image Forgery Detection and Localization Techniques: A Review","volume":"49","author":"Asghar","year":"2017","journal-title":"Aust. J. Forensic Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1080\/00450618.2018.1424241","article-title":"Digital Image Forgery Detection: A Systematic Scrutiny","volume":"51","author":"Walia","year":"2019","journal-title":"Aust. J. Forensic Sci."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Nixon, M.S., and Aguado, A.S. (2020). Feature Extraction and Image Processing for Computer Vision, Academic Press, Inc.. [4th ed.].","DOI":"10.1016\/B978-0-12-814976-8.00003-8"},{"key":"ref_4","unstructured":"Hemanth, D.J., and Vieira Estrela, V. (2017). Deep Learning for Image Processing Applications, IOS Press. [31st ed.]. Advances in Parallel Computing."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Al-hammadi, M.H., and Muhammad, G. (2013). Curvelet Transform and Local Texture Based Image Forgery Detection. Advances in Visual Computing, ISVC 2013, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-41939-3_49"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","article-title":"Image Forgery Detection Using Steerable Pyramid Transform and Local Binary Pattern","volume":"25","author":"Muhammad","year":"2014","journal-title":"Mach. Vis. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1142\/s0218213015400163","article-title":"Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors","volume":"24","author":"Hussain","year":"2015","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s11760-016-0899-0","article-title":"Passive Detection of Image Forgery Using DCT and Local Binary Pattern","volume":"11","author":"Alahmadi","year":"2017","journal-title":"Signal Image Video Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3177","DOI":"10.3233\/JIFS-169261","article-title":"Digital Image Forgery Detection Using Compact Multi-Texture Representation","volume":"32","author":"Vidyadharan","year":"2017","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"99742","DOI":"10.1109\/ACCESS.2021.3096240","article-title":"Fusion of Handcrafted and Deep Features for Forgery Detection in Digital Images","volume":"9","author":"Walia","year":"2021","journal-title":"IEEE Access"},{"key":"ref_11","unstructured":"Wang, J., Yang, Y., Mao, J., Huang, Z., Huang, C., and Xu, W. (July, January 26). CNN-RNN: A Unified Framework for Multi-Label Image Classification. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4843","DOI":"10.1109\/TIP.2017.2725580","article-title":"Going Deeper With Contextual CNN for Hyperspectral Image Classification","volume":"26","author":"Lee","year":"2017","journal-title":"IEEE Trans. Image Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.eswa.2017.11.028","article-title":"A New Image Classification Method Using CNN Transfer Learning and Web Data Augmentation","volume":"95","author":"Han","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3840","DOI":"10.1109\/TCYB.2020.2983860","article-title":"Automatically Designing CNN Architectures Using the Genetic Algorithm for Image Classification","volume":"50","author":"Sun","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"11791","DOI":"10.1149\/10701.11791ecst","article-title":"A Novel Machine Learning Approach for Forgery Detection and Verification in Digital Image","volume":"107","author":"Parashar","year":"2022","journal-title":"ECS Trans."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Rao, Y., and Ni, J. (2016, January 4\u20137). A Deep Learning Approach to Detection of Splicing and Copy-Move Forgeries in Images. Proceedings of the 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016, Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"76437","DOI":"10.1109\/ACCESS.2018.2883588","article-title":"Image Manipulation Detection and Localization Based on the Dual-Domain Convolutional Neural Networks","volume":"6","author":"Shi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Qazi, E.U.H., Zia, T., and Almorjan, A. (2022). Deep Learning-Based Digital Image Forgery Detection System. Appl. Sci., 12.","DOI":"10.3390\/app12062851"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ali, S.S., Ganapathi, I.I., Vu, N.S., Ali, S.D., Saxena, N., and Werghi, N. (2022). Image Forgery Detection Using Deep Learning by Recompressing Images. Electronics, 11.","DOI":"10.3390\/electronics11030403"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Zhou, J., Ni, J., and Rao, Y. (2017). Block-Based Convolutional Neural Network for Image Forgery Detection. Digital Forensics and Watermarking IWDW2017, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-319-64185-0_6"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/j.compeleceng.2017.05.008","article-title":"A Generic Passive Image Forgery Detection Scheme Using Local Binary Pattern with Rich Models","volume":"62","author":"Farooq","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Muhammad, G., Al-hammadi, M.H., Hussain, M., Mirza, A.M., and Bebis, G. (2013, January 1\u20134). Copy Move Image Forgery Detection Method Using Steerable Pyramid Transform and Texture Descriptor. Proceedings of the Eurocon 2013, Zagreb, Croatia.","DOI":"10.1109\/EUROCON.2013.6625188"},{"key":"ref_23","unstructured":"Moore, J.D., and Swartout, W.R. (1988). Explanation in Expert Systems: A Survey, University of Southern California, Information Sciences Institute. Technical Report."},{"key":"ref_24","unstructured":"Van Lent, M., Fisher, W., and Mancuso, M. (2004, January 27\u201329). An Explainable Artificial Intelligence System for Small-Unit Tactical Behavior. Proceedings of the 16th Conference on Innovative Applications of Artificial Intelligence (IAAI\u201904), San Jose, CA, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3236009","article-title":"A Survey of Methods for Explaining Black Box Models","volume":"51","author":"Guidotti","year":"2018","journal-title":"ACM Comput. Surv."},{"key":"ref_26","unstructured":"Lundberg, S., and Lee, S.-I. (2017, January 4\u20139). A Unified Approach to Interpreting Model Predictions. Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS\u201917), Long Beach, CA, USA."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Takeishi, N., and Lee, S. (2019, January 8). Shapley Values of Reconstruction Errors of PCA for Explaining Anomaly Detection. Proceedings of the International Conference on Data Mining Workshops (ICDMW), Beijing, China.","DOI":"10.1109\/ICDMW.2019.00117"},{"key":"ref_28","first-page":"653","article-title":"Image Forgery Detection Using Error Level Analysis and Deep Learning","volume":"17","author":"Sudiatmika","year":"2019","journal-title":"TELKOMNIKA Telecommun. Comput. Electron. Control"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep Residual Learning for Image Recognition. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","article-title":"Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)","volume":"6","author":"Adadi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_31","unstructured":"Shrikumar, A., Greenside, P., Shcherbina, A., and Kundaje, A. (2017, January 6\u201311). Not Just a Black Box: Learning Important Features through Propagating Activation Differences. Proceedings of the 34th International Conference on Machine Learning (ICML), Sydney, Australia."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., and Guestrin, C. (2016, January 13\u201317). \u201cWhy Should i Trust You?\u201d Explaining the Predictions of Any Classifier. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Association for Computing Machinery, San Francisco, CA, USA.","DOI":"10.1145\/2939672.2939778"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., and Tan, T. (2013, January 6\u201310). CASIA image tampering detection evaluation database. Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China.","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Novoz\u00e1msk\u00fd, A., Mahdian, B., and Saic, S. (2020, January 1\u20135). IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images. Proceedings of the 2020 IEEE Winter Applications of Computer Vision Workshops (WACVW), Snowmass, CO, USA.","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"6391","DOI":"10.3233\/JIFS-179720","article-title":"Image Forgery Detection Using Deep Textural Features from Local Binary Pattern Map","volume":"38","author":"Wilscy","year":"2020","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Samir, S., Emary, E., El-Sayed, K., and Onsi, H. (2020). Optimization of a Pre-Trained AlexNet Model for Detecting and Localizing Image Forgeries. Information, 11.","DOI":"10.3390\/info11050275"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/8\/1611\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:04:25Z","timestamp":1760141065000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/8\/1611"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,5]]},"references-count":36,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["sym14081611"],"URL":"https:\/\/doi.org\/10.3390\/sym14081611","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,5]]}}}