2018
DOI: 10.1016/j.image.2018.04.006
|View full text |Cite
|
Sign up to set email alerts
|

Exposing computer generated images by using deep convolutional neural networks

Abstract: The recent computer graphics developments have upraised the quality of the generated digital content, astonishing the most skeptical viewer. Games and movies have taken advantage of this fact but, at the same time, these advances have brought serious negative impacts like the ones yielded by fake images produced with malicious intents. Digital artists can compose artificial images capable of deceiving the great majority of people, turning this into a very dangerous weapon in a timespan currently know as "Fake … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(26 citation statements)
references
References 31 publications
0
23
0
Order By: Relevance
“…where L is the width or height of the image, K is the kernel size, P is the number of zero paddings, and S is the stride. All the feature maps will go to the next operations which are the convolution layer with identity shortcut and the convolution layer with projection shortcut [32]. The identity shortcut as shown in Figure 10(a) is used when the output feature maps volume is the same as the input feature map volume.…”
Section: = 1 ∑ =1mentioning
confidence: 99%
“…where L is the width or height of the image, K is the kernel size, P is the number of zero paddings, and S is the stride. All the feature maps will go to the next operations which are the convolution layer with identity shortcut and the convolution layer with projection shortcut [32]. The identity shortcut as shown in Figure 10(a) is used when the output feature maps volume is the same as the input feature map volume.…”
Section: = 1 ∑ =1mentioning
confidence: 99%
“…Digital content has evolved over a period of time with the advances in the computer graphics, internet, and digital contents. The advances are utilized for many applications in computer vision and image recognition applications [15]. However, the downside of the exploitation of these applications lies in the fact of analysis of creating fake images and videos.…”
Section: Related Workmentioning
confidence: 99%
“…Further, CNN combined with LSTM was used for image tampering detection using the various layers of CNN. Residual-based networks such as ResNet 50 were used in [15] for image tampering detection using the input of computer-generated images.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we briefly introduce the two classical ML methods we used to classify the dataset. The Support Vector Machine (SVM) (Widodo and Yang, 2007) and Convolutional Neural Network (CNN) (Krizhevsky et al, 2012;de Rezende et al, 2018), both are supervised learning methods, meaning that they require a labeled dataset to be trained. In this study, labels correspond to CoT and SPT techniques.…”
Section: Classification With Learning Algorithmsmentioning
confidence: 99%