Y Sun, R Ni, Y Zhao - IEEE Signal Processing Letters, 2022 - ieeexplore.ieee.org
A key challenge of image splicing detection is how to localize integral tampered regions without false alarm. Although current forgery detection approaches have achieved promising …
R Han, X Wang, N Bai, Y Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Modern image editing software enables anyone to alter the content of an image to deceive the public, which can pose a security hazard to personal privacy and public safety. The …
X Jin, Z He, J Xu, Y Wang, Y Su - Multimedia Tools and Applications, 2022 - Springer
Splicing forgery refers to copying some regions of a video or an image to another video/image. Although image splicing detection has been studied for many years, video …
A Diwan, U Sonkar - Multimedia Tools and Applications, 2024 - Springer
Multimedia forensics is an essential field of research that deals with the authenticity and integrity of multimedia content in the digital world. With the increasing use of digital platforms …
Z Sheng, C Yin, W Lu - Pattern Recognition, 2025 - Elsevier
Existing forgery image localization methods have achieved impressive performance on monocular images but struggle to maintain comparable performance on stereo super …
P Zeng, L Tong, Y Liang, N Zhou, J Wu - Mathematics, 2022 - mdpi.com
In today's modern communication society, the authenticity of digital media has never been of such importance as it is now. In this aspect, the reliability of digital images is of paramount …
The easy availability and usability of photo-editing tools have increased the number of forgery attacks, primarily splicing attacks, thereby increasing cybercrimes. Because of an …
The content authenticity and reliability of digital images have promoted the research on image manipulation localization (IML). Most current deep learning-based methods focus on …
J Hou, X Wang, R Han, M Jia, D Liu, Q Yu… - Expert Systems with …, 2024 - Elsevier
With the proliferation of retouching software, the detrimental effects of malicious image tampering are becoming more prevalent. In this study, we propose an adaptive method …