{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:34:39Z","timestamp":1773329679147,"version":"3.50.1"},"reference-count":16,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T00:00:00Z","timestamp":1741132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Andong National University (Gyeongkuk National University)"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Recent advancements in image processing technology have positively impacted some fields, such as image, document, and video production. However, the negative implications of these advancements have also increased, with document image manipulation being a prominent issue. Document image manipulation involves the forgery or alteration of documents like receipts, invoices, various certificates, and confirmations. The use of such manipulated documents can cause significant economic and social disruption. To prevent these issues, various methods for the detection of forged document images are being researched, with recent proposals focused on deep learning techniques. An essential aspect of using deep learning to detect manipulated documents is to enhance or augment the characteristics of document images before inputting them into a model. Enhancing the distinctive features of manipulated documents before inputting them into a deep learning model is crucial to achieve high accuracy. One crucial characteristic of document images is their inherent symmetrical patterns, such as consistent text alignment, structural balance, and uniform pixel distribution. This study investigates document forgery detection through a symmetry-aware approach. By focusing on the symmetric structures found in document layouts and pixel distribution, the proposed LTHE technique enhances feature extraction in deep learning-based models. Therefore, this study proposes a new image enhancement technique based on the results of three general-purpose CNN models to enhance the characteristics of document images and achieve high accuracy in deep learning-based forgery detection. The proposed LTHE (Log-Transform Histogram Equalization) technique increases low pixel values through log transformation and increases image contrast by performing histogram equalization to make the features of the image more prominent. Experimental results show that the proposed LTHE technique achieves higher accuracy when compared to other enhancement methods, indicating its potential to aid the development of deep learning-based forgery detection algorithms in the future.<\/jats:p>","DOI":"10.3390\/sym17030395","type":"journal-article","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T06:02:13Z","timestamp":1741240933000},"page":"395","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A New Log-Transform Histogram Equalization Technique for Deep Learning-Based Document Forgery Detection"],"prefix":"10.3390","volume":"17","author":[{"given":"Yong-Yeol","family":"Bae","sequence":"first","affiliation":[{"name":"Department of Software Convergence, Gyeongkuk National University (Andong National University), Andong 36729, Republic of Korea"}]},{"given":"Dae-Jea","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Software Convergence, Gyeongkuk National University (Andong National University), Andong 36729, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0662-8355","authenticated-orcid":false,"given":"Ki-Hyun","family":"Jung","sequence":"additional","affiliation":[{"name":"Department of Software Convergence, Gyeongkuk National University (Andong National University), Andong 36729, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Wang, W., Dong, J., and Tan, T. (December, January 29). Exploring DCT coefficient Quantization Effect for Image Tampering Localization. Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, Iguacu Falls, Brazil.","DOI":"10.1109\/WIFS.2011.6123129"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"110828","DOI":"10.1016\/j.patcog.2024.110828","article-title":"Toward real text manipulation detection: New dataset and new solution","volume":"157","author":"Luo","year":"2025","journal-title":"Pattern Recognit."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Qu, C., Liu, J., Zhang, H., Chen, Y., Wu, Y., Li, X., and Yang, F. (2023, January 17\u201324). Towards Robust Tampered Text Detection in Document Image: New Dataset and New Solution. Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada.","DOI":"10.1109\/CVPR52729.2023.00575"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Nandanwar, L., Shivakumara, P., and Pal, U. (2020). A New Method for Detecting Altered Text in Document Images. Pattern Recognition and Artificial Intelligence, Springer.","DOI":"10.1007\/978-3-030-59830-3_8"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1504\/IJASS.2022.124085","article-title":"Analysis of Image Forgery Detection using Convolutional Neural Network","volume":"9","author":"Balabantaray","year":"2022","journal-title":"Int. J. Appl. Syst. Stud."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., van der Maaten, L., and Weinberger, K.Q. Densely Connected Convolutional Networks. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep Residual Learning for Image Recognition. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_8","unstructured":"Tan, M., and Le, Q.V. (2019). EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"17521","DOI":"10.1007\/s11042-022-13797-w","article-title":"Image Forgery Detection: A Survey of Recent Deep-Learning Approaches","volume":"82","author":"Zanardelli","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bi, X., Wei, Y., Xiao, B., and Li, W. (2019, January 16\u201317). RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection. Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA.","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"ref_11","first-page":"1","article-title":"Document Image Forgery Detection Using RGB Color Channel","volume":"10","author":"Gornale","year":"2022","journal-title":"Trans. Eng. Comput. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"314","DOI":"10.7763\/IJMLC.2012.V2.137","article-title":"A Survey of OCR Applications","volume":"2","author":"Singh","year":"2012","journal-title":"Int. J. Mach. Learn. Comput."},{"key":"ref_13","unstructured":"Khayam, S.A. (2024, December 07). The Discrete Cosine Transform (DCT): Theory and Application. Course Notes Dep. Electr. Comput. Eng., Available online: https:\/\/api.semanticscholar.org\/CorpusID:2593654."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yadav, G., Maheshwari, S., and Agarwal, A. (2014, January 24\u201327). Contrast Limited Adaptive Histogram Equalization Based Enhancement for Real Time Video System. Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Delhi, India.","DOI":"10.1109\/ICACCI.2014.6968381"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"23419","DOI":"10.1007\/s11042-020-10241-9","article-title":"Improved Copy Move Forgery Detection Method via L*a*b* Color Space and Enhanced Localization Technique","volume":"80","author":"Tahaoglu","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_16","first-page":"1930","article-title":"Forgery Detection in Medical Image and Enhancement Using Modified CLAHE Method","volume":"10","author":"Pakala","year":"2023","journal-title":"J. Surv. Fish. Sci."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/3\/395\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:47:52Z","timestamp":1760028472000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/3\/395"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,5]]},"references-count":16,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["sym17030395"],"URL":"https:\/\/doi.org\/10.3390\/sym17030395","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,5]]}}}