Digital Image Forgery Detection using Deep Learning

International Journal of Emerging Research in Science, Engineering, and Management
Vol. 2, Issue 1, pp. 79-85, January 2026.

https://doi.org/10.58482/ijersem.v2i1.12

A. Surekha

Kuncha Keerthi

Earla Anil Kumar

C Mohan

Chinta Achyuth Vara Prasad

Vayalapati Jeevan Reddy

Department of CSE, Siddartha Institute of Science and Technology, Puttur, India.

Abstract: The rapid advancement of image editing software and the emergence of sophisticated generative AI have made digital image forgery a significant challenge for modern information security. Traditional detection techniques, which often rely on manual inspection or basic mathematical heuristics to identify common manipulations like copy-move, splicing, and retouching, are increasingly becoming obsolete. These older methods struggle to keep pace with the seamless blending and high-resolution outputs produced by modern neural networks. As a result, there is an urgent need for automated, robust systems capable of uncovering subtle artifacts that are invisible to the human eye, ensuring the integrity of digital media in an era of “deepfakes” and hyper-realistic edits. This paper addresses these vulnerabilities by designing and implementing a deep learning-based system specifically engineered for the high-precision detection of digital image forgery. By leveraging the hierarchical feature-extraction capabilities of Convolutional Neural Networks (CNNs), the proposed system can automatically learn the “fingerprints” of various manipulation tools. Unlike traditional methods, this CNN-based approach focuses on detecting local inconsistencies in noise patterns, lighting distributions, and compression artifacts that occur when an image is tampered with. This allows the system to pinpoint forged regions with a high degree of granularity and accuracy, regardless of whether the edit was a simple copy-move or a complex AI-driven synthesis. To ensure the model is effective in real-world scenarios, it is trained on extensive, large-scale datasets containing a diverse range of both authentic and manipulated imagery. This comprehensive training enables the model to generalize its findings, allowing it to identify new and previously unseen forgery types across different file formats and resolutions. The ultimate outcome of this paper is to provide a reliable framework for authenticity verification that can be deployed across various sectors. From assisting journalists in verifying eyewitness media to providing forensic evidence in legal proceedings and strengthening cybersecurity defenses, this system aims to restore trust in digital content by providing a transparent and adaptive layer of security.

Keywords: Digital Image Forgery, Convolutional Neural Networks, Image Splicing, Copy-Move Forgery, Authenticity Verification.

References: 

  1. E. Liang, K. Zhang, Z. Hua, and X. Jia, “Frequency-driven deep learning network for image splicing forgery detection,” Knowledge-Based Systems, vol. 330, p. 114365, Sep. 2025, doi: 10.1016/j.knosys.2025.114365.
  2. S. Dhivya, R. Deepika, R. A. Kumar, K. S. Tiwari, D. Bhatia, and P. Singh, “Unmasking deception harnessing noise cancellation for digital image forgery detection using Feature-Map convolutional neural networks,” International Journal of Sensors Wireless Communications and Control, vol. 15, no. 2, pp. 184–199, Aug. 2024, doi: 10.2174/0122103279316771240725112305.
  3. V. Gopi, K. Gnanasree, G. Dharshini, M. C. Teja, V. Murali, and S. N. Kumar, “Detection of Phishing Websites using Novel Machine Learning Fusion Approach,” International Journal of Emerging Research in Science Engineering and Management, vol. 1, no. 6, pp. 11–18, Dec. 2025, doi: 10.58482/ijersem.v1i6.2.
  4. M. Mao, G. Jiao, W. Gao, and J. Ye, “MSFENet: Multi-Scale Filter-Enhanced Network architecture for digital image forgery trace localization,” Computer Vision and Image Understanding, vol. 262, p. 104550, Oct. 2025, doi: 10.1016/j.cviu.2025.104550.
  5. Y. Cheng, X. Li, X. Zhang, and C. Yang, “Image forgery localization with sparse reward compensation using curiosity-driven deep reinforcement learning,” Journal of Visual Communication and Image Representation, vol. 112, p. 104587, Sep. 2025, doi: 10.1016/j.jvcir.2025.104587.
  6. M. A. Manivasagam, G. Hema, A. Maheswarareddy, P. Vinitha, T. Manasa, and K. Dileep, “Electronic protection for exam paper leakage,” International Journal of Emerging Research in Science Engineering and Management, vol. 1, no. 6, pp. 19–25, Dec. 2025, doi: 10.58482/ijersem.v1i6.3.
  7. M. A. Manivasagam, S. Sai Ram, C. Lakshmikanth Reddy, E. Ram Charan, P. Venkata Charan, and M. Prabhash, “MQTTNET-IDS: Deep-Fuzzy Fusion for Intelligent Threat Detection,” International Journal of Emerging Research in Science Engineering and Management, vol. 1, no. 6, pp. 55–62, Dec. 2025, doi: 10.58482/ijersem.v1i6.7.
  8. M. Ugale and J. Midhunchakkaravarthy, “MDR-LOD2 Model: Forgery Detection using Modified Depth ResNet features and Layer Optimized Dunnock Deep Model from Videos,” Computers & Electrical Engineering, vol. 125, p. 110423, May 2025, doi: 10.1016/j.compeleceng.2025.110423.
  9. S. Agarwal, D. Sharma, N. Girdhar, C. Kim, and K.-H. Jung, “A Survey of Image Forensics: Exploring forgery detection in Image Colorization,” Computers, Materials & Continua/Computers, Materials & Continua (Print), vol. 84, no. 3, pp. 4195–4221, Jan. 2025, doi: 10.32604/cmc.2025.066202.
  10. K. Rehman and G. Jain, “Detection of copy-move forgery with deep CNN features using Machine learning Classifier,” Procedia Computer Science, vol. 258, pp. 3062–3071, Jan. 2025, doi: 10.1016/j.procs.2025.04.564.
  11. M. Li, Y. Qin, H. Zhang, and Z. Shi, “An adaptive dual-domain feature representation method for enhanced deep forgery detection,” Journal of Automation and Intelligence, vol. 4, no. 4, pp. 273–281, Nov. 2025, doi: 10.1016/j.jai.2025.11.003.
  12. G. Hao, P. Liang, Z. Li, H. Zhao, and H. Zhang, “Image Copy-Move Forgery detection and localization method based on Sequence-to-Sequence transformer structure,” Computers, Materials & Continua/Computers, Materials & Continua (Print), vol. 82, no. 3, pp. 5221–5238, Jan. 2025, doi: 10.32604/cmc.2025.055739.