Open AccessOpen Access


Deep Learning Based Image Forgery Detection Methods

Liang Xiu-jian1,2,*, Sun He2

1 Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology
2 School of Computer Science, Nanjing University of Information Science & Technology, Nanjing, 210044, China

* Corresponding Author: Liang Xiu-jian. Email:

Journal of Cyber Security 2022, 4(2), 119-133.


Increasingly advanced image processing technology has made digital image editing easier and easier. With image processing software at one’s fingertips, one can easily alter the content of an image, and the altered image is so realistic that it is illegible to the naked eye. These tampered images have posed a serious threat to personal privacy, social order, and national security. Therefore, detecting and locating tampered areas in images has important practical significance, and has become an important research topic in the field of multimedia information security. In recent years, deep learning technology has been widely used in image tampering localization, and the achieved performance has significantly surpassed traditional tampering forensics methods. This paper mainly sorts out the relevant knowledge and latest methods in the field of image tampering detection based on deep learning. According to the two types of tampering detection based on deep learning, the detection tasks of the method are detailed separately, and the problems and future prospects in this field are discussed. It is quite different from the existing work: 1) This paper mainly focuses on the problem of image tampering detection, so it does not elaborate on various forensic methods. 2) This paper focuses on the detection method of image tampering based on deep learning. 3) This paper is driven by the needs of tampering targets, so it pays more attention to sorting out methods for different tampering detection tasks.


Cite This Article

L. Xiu-jian and S. He, "Deep learning based image forgery detection methods," Journal of Cyber Security, vol. 4, no.2, pp. 119–133, 2022.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1190


  • 838


  • 0


Share Link