Open Access
Issue
ITM Web Conf.
Volume 79, 2025
International Conference on Knowledge Engineering and Information Systems (KEIS-2025)
Article Number 01008
Number of page(s) 6
DOI https://doi.org/10.1051/itmconf/20257901008
Published online 08 October 2025
  1. S. Sabour, N. Frosst, G.E. Hinton, Dynamic routing between capsules, NIPS'17: Proceedings of the 31st International Conference on Neural Information Processing Systems, Curran Associates Inc, Red Hook, NY, United States, December 04 (2017), 3859–3869 [Google Scholar]
  2. A. Rössler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies, M. Nießner, FaceForensics++: Learning to detect manipulated facial images, In Proceedings of the IEEE/CVF international conference on computer vision, IEEE, Seoul, South Korea, February 27 (2019), 1–11 [Google Scholar]
  3. P. Zhou, X. Han, V.I. Morariu, L.S. Davis, Two- stream neural networks for tampered face detection, In 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW), IEEE, Honolulu, HI, USA, August 24 (2017), 1831–1839 [Google Scholar]
  4. D. Afchar, V. Nozick, J. Yamagishi, I. Echizen, MesoNet: A compact facial video forgery detection network, In 2018 IEEE international workshop on information forensics and security (WIFS), IEEE, Hong Kong, China, January 31 (2019), 1–7 [Google Scholar]
  5. D. Cozzolino, G. Poggi, L. Verdoliva, Recasting residual-based local descriptors as convolutional neural networks: An application to image forgery detection, In Proceedings of the 5th ACM workshop on information hiding and multimedia security, Association for Computing Machinery, New York, NY, United States, June 20 (2017), 159164 [Google Scholar]
  6. C. Yu, J. Jiang, X. Zhou, Attention-based neural networks for image forgery detection. Pattern Recogn. Lett, (2020). [Google Scholar]
  7. S. Ganguly, S. Mohiuddin, S. Malakar, E. Cuevas, R. Sarkar, Visual attention-based deepfake video forgery detection. Pattern Anal. Appl. 25, 981–992 (2022). https://doi.org/10.1007/s10044-022-01083-2 [Google Scholar]
  8. H.H. Nguyen, J. Yamagishi, I. Echizen, CapsuleForensics: Using capsule networks to detect forged images and videos, In ICASSP 2019–2019 IEEE international conference on acoustics, speech and signal processing (ICASSP), IEEE, Brighton, UK, May 12–17 (2019), 2307–2311 [Google Scholar]
  9. L. Verdoliva, Media forensics and DeepFakes: An overview. IEEE J. Sel. Top Signal Process. 14, 910932 (2020). https://doi.org/10.1109/JSTSP.2020.3002101 [Google Scholar]
  10. I. Amerini, T. Uricchio, L. Ballan, R. Caldelli, A deep learning-based approach for image forgery detection and localization. Pattern Recogn. Lett. 113, 430–437 (2017). https://doi.org/10.1016/j.patrec.2017.04.016 [Google Scholar]
  11. Y. Li, X. Yang, P. Sun, H. Qi, S. Lyu, Celeb-DF: A large-scale challenging dataset for DeepFake forensics, IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, Seattle, WA, USA, August 05 (2020), 3204–3213 [Google Scholar]
  12. Dang, H., Liu, F., Stehouwer, J., Liu, X., & Jain, A. K., On the detection of digital face manipulation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern recognition, IEEE, Seattle, WA, USA, August 05 (2020), 5781–5790 [Google Scholar]
  13. B. Dolhansky, R. Howes, B. Pflaum, N. Baram, C.C. Ferrer, The DeepFake Detection Challenge (DFDC) Preview Dataset. arXiv preprint, (2019). https://doi.org/10.48550/arXiv.1910.08854 [Google Scholar]
  14. A. Jain, S. Jain, Deep learning based image forgery detection: A survey. arXiv preprint, (2020). https://doi.org/10.48550/arXiv.2005.04296 [Google Scholar]
  15. T. Wang, X. Liao, K.P. Chow, X. Lin, Y. Wang, Deepfake detection: A comprehensive survey from the reliability perspective, ACM Computing Surveys, Association for Computing Machinery, New York, NY, United States, November 11 (2024), 1–35 [Google Scholar]
  16. H. Dang, F. Liu, J. Stehouwer, X. Liu, A.K. Jain, Detection and localization of image forgeries using resampling features and deep learning. IEEE Trans. Inf. Forensics Secur. 17, 167–182 (2022). [Google Scholar]
  17. Zhou, P., Han, X., Morariu, V. I., & Davis, L. S., Learning rich features for image manipulation detection, In Proceedings of the IEEE conference on computer vision and pattern recognition, IEEE, Salt Lake City, UT, USA, December 16 (2018), 1053–1061 [Google Scholar]
  18. J.H. Bappy, C. Simons, A.K. Roy-Chowdhury, A. A. Rad, Exposing splicing forgery using noise features and camera characteristics, IEEE Winter Conference on Applications of Computer Vision (WACV), (2017). [Google Scholar]
  19. P. Korshunov, S. Marcel, DeepFakes: A new threat to face recognition? Assessment and detection. arXiv preprint, (2018). https://doi.org/10.48550/arXiv.1812.08685 [Google Scholar]
  20. M. Barni, B. Tondi, Transferability of Adversarial Attacks in Image Forensics. IEEE International Conference on Image Processing (ICIP), (2018). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.