References
- D. L. M. Sacchi, F. Agnoli, and E. F. Loftus, "Changing history: doctored photographs affect memory for past public events," vol. 21, no. 8, pp. 1005-1022, Dec. 2007, doi: 10.1002/acp.1394.
- M. Mishra and F. L. D. M. C. Adhikary, "Digital Image Tamper Detection Techniques - A Comprehensive Study," Jun. 2013, doi: 10.48550/arxiv.1306.6737.
- C. N. Bharti and P. Tandel, "A survey of image forgery detection techniques," 2016, pp. 877-881, doi: 10.1109/WiSPNET.2016.7566257
- W. N. Nathalie Diane, S. Xingming, and F. K. Moise, "A Survey of Partition-Based Techniques for CopyMove Forgery Detection," vol. 2014, pp. 975456-13, Jul. 2014, doi: 10.1155/2014/975456.
- M. D. Ansari, S. P. Ghrera, and V. Tyagi, "Pixel-Based Image Forgery Detection: A Review," vol. 55, no. 1, pp. 40-46, Jan. 2014, doi: 10.1080/09747338.2014.921415.
- G. K. Birajdar and V. H. Mankar, "Digital image forgery detection using passive techniques: A survey," vol. 10, no. 3, pp. 226-245, Oct. 2013, doi: 10.1016/j.diin.2013.04.007.
- T. Qazi et al., "Survey on blind image forgery detection," vol. 7, no. 7, pp. 660-670, Oct. 2013, doi: 10.1049/ietipr.2012.0388.
- Y. Shi, C. Chen, and W. Chen, "A natural image model approach to splicing detection," 2007, pp. 51-62, doi: 10.1145/1288869.1288878
- Z. He, W. Lu, W. Sun, and J. Huang, "Digital image splicing detection based on Markov features in DCT and DWT domain," vol. 45, no. 12, pp. 4292-4299, Dec. 2012, doi: 10.1016/j.patcog.2012.05.014.
- S. Velliangiri and J. Premalatha, "A Novel Forgery Detection in Image Frames of the Videos Using Enhanced Convolutional Neural Network in Face Images," vol. 125, no. 2, pp. 625-645, Nov. 2020, doi: 10.32604/cmes.2020.010869.
- H. Mo, B. Chen, and W. Luo, "Fake Faces Identification via Convolutional Neural Network," 2018, pp. 43-47, doi: 10.1145/3206004.3206009
- Y. Wu, W. AbdAlmageed, and P. Natarajan, "ManTraNet: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features," 2019, pp. 9535-9544, doi: 10.1109/CVPR.2019.00977
- X. Bi, Y. Wei, B. Xiao, and W. Li, "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection," 2019, pp. 30-39, doi: 10.1109/CVPRW.2019.00010
- M.-J. Kwon, S.-H. Nam, I.-J. Yu, H.-K. Lee, and C. Kim, "Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization," vol. 130, no. 8, pp. 1875-1895, 2022, doi: 10.1007/s11263-022-01617-5.
- J. Wang et al., "Deep High-Resolution Representation Learning for Visual Recognition," vol. 43, no. 10, pp. 3349-3364, Oct. 2021, doi: 10.1109/TPAMI.2020.2983686.org.libproxy.smu.ac.kr/document/9052469
- Jia Deng, Wei Dong, R. Socher, Li-Jia Li, Kai Li, and Li Fei-Fei, "ImageNet: A large-scale hierarchical imag e database," 2009, pp. 248-255, doi: 10.1109/CVPR.2009.5206848
- Jing Dong, Wei Wang, and Tieniu Tan, "CASIA Image Tampering Detection Evaluation Database," 2013, pp. 422-426, doi: 10.1109/ChinaSIP.2013.6625374
- D. P. Kingma and J. Ba, "Adam: A method for stochastic optimization," Dec. 2014, doi: 10.48550/ARXIV.1412.6980.