
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Digital image integrity – a survey of protection and verification techniques
Paweł Korus
Digital Signal Processing (2017) Vol. 71, pp. 1-26
Closed Access | Times Cited: 129
Paweł Korus
Digital Signal Processing (2017) Vol. 71, pp. 1-26
Closed Access | Times Cited: 129
Showing 1-25 of 129 citing articles:
Deepfakes and beyond: A Survey of face manipulation and fake detection
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
Information Fusion (2020) Vol. 64, pp. 131-148
Open Access | Times Cited: 741
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
Information Fusion (2020) Vol. 64, pp. 131-148
Open Access | Times Cited: 741
Media Forensics and DeepFakes: An Overview
Luisa Verdoliva
IEEE Journal of Selected Topics in Signal Processing (2020) Vol. 14, Iss. 5, pp. 910-932
Open Access | Times Cited: 536
Luisa Verdoliva
IEEE Journal of Selected Topics in Signal Processing (2020) Vol. 14, Iss. 5, pp. 910-932
Open Access | Times Cited: 536
Identification of deep network generated images using disparities in color components
Haodong Li, Bin Li, Shunquan Tan, et al.
Signal Processing (2020) Vol. 174, pp. 107616-107616
Open Access | Times Cited: 212
Haodong Li, Bin Li, Shunquan Tan, et al.
Signal Processing (2020) Vol. 174, pp. 107616-107616
Open Access | Times Cited: 212
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews
Fran Casino, Thomas K. Dasaklis, Γεώργιος Σπαθούλας, et al.
IEEE Access (2022) Vol. 10, pp. 25464-25493
Open Access | Times Cited: 87
Fran Casino, Thomas K. Dasaklis, Γεώργιος Σπαθούλας, et al.
IEEE Access (2022) Vol. 10, pp. 25464-25493
Open Access | Times Cited: 87
Localization of Deep Inpainting Using High-Pass Fully Convolutional Network
Haodong Li, Jiwu Huang
2021 IEEE/CVF International Conference on Computer Vision (ICCV) (2019), pp. 8300-8309
Closed Access | Times Cited: 107
Haodong Li, Jiwu Huang
2021 IEEE/CVF International Conference on Computer Vision (ICCV) (2019), pp. 8300-8309
Closed Access | Times Cited: 107
Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization
Myung-Joon Kwon, Seung-Hun Nam, In-Jae Yu, et al.
International Journal of Computer Vision (2022) Vol. 130, Iss. 8, pp. 1875-1895
Open Access | Times Cited: 68
Myung-Joon Kwon, Seung-Hun Nam, In-Jae Yu, et al.
International Journal of Computer Vision (2022) Vol. 130, Iss. 8, pp. 1875-1895
Open Access | Times Cited: 68
Image forgery detection: a survey of recent deep-learning approaches
Marcello Zanardelli, Fabrizio Guerrini, Riccardo Leonardi, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 12, pp. 17521-17566
Open Access | Times Cited: 67
Marcello Zanardelli, Fabrizio Guerrini, Riccardo Leonardi, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 12, pp. 17521-17566
Open Access | Times Cited: 67
Dual image-based reversible fragile watermarking scheme for tamper detection and localization
Aditya Kumar Sahu, Monalisa Sahu, Pramoda Patro, et al.
Pattern Analysis and Applications (2022) Vol. 26, Iss. 2, pp. 571-590
Closed Access | Times Cited: 39
Aditya Kumar Sahu, Monalisa Sahu, Pramoda Patro, et al.
Pattern Analysis and Applications (2022) Vol. 26, Iss. 2, pp. 571-590
Closed Access | Times Cited: 39
An Efficient Semi-blind Watermarking Technique Based on ACM and DWT for Mitigating Integrity Attacks
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access | Times Cited: 1
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
Arabian Journal for Science and Engineering (2025)
Closed Access | Times Cited: 1
Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network
Hongwei Yao, Tong Qiao, Ming Xu, et al.
IEEE Access (2018) Vol. 6, pp. 24973-24982
Open Access | Times Cited: 62
Hongwei Yao, Tong Qiao, Ming Xu, et al.
IEEE Access (2018) Vol. 6, pp. 24973-24982
Open Access | Times Cited: 62
A technique for image splicing detection using hybrid feature set
Ankit Jaiswal, Rajeev Srivastava
Multimedia Tools and Applications (2020) Vol. 79, Iss. 17-18, pp. 11837-11860
Closed Access | Times Cited: 58
Ankit Jaiswal, Rajeev Srivastava
Multimedia Tools and Applications (2020) Vol. 79, Iss. 17-18, pp. 11837-11860
Closed Access | Times Cited: 58
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh
Information Sciences (2019) Vol. 486, pp. 204-230
Closed Access | Times Cited: 55
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh
Information Sciences (2019) Vol. 486, pp. 204-230
Closed Access | Times Cited: 55
A logistic map based blind and fragile watermarking for tamper detection and localization in images
Aditya Kumar Sahu
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 8, pp. 3869-3881
Closed Access | Times Cited: 46
Aditya Kumar Sahu
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 8, pp. 3869-3881
Closed Access | Times Cited: 46
Block-level double JPEG compression detection for image forgery localization
Vinay Kumar Verma, Deepak Singh, Nitin Khanna
Multimedia Tools and Applications (2023) Vol. 83, Iss. 4, pp. 9949-9971
Closed Access | Times Cited: 16
Vinay Kumar Verma, Deepak Singh, Nitin Khanna
Multimedia Tools and Applications (2023) Vol. 83, Iss. 4, pp. 9949-9971
Closed Access | Times Cited: 16
A Video Forensic Framework for the Unsupervised Analysis of MP4-Like File Container
Massimo Iuliani, Dasara Shullani, Marco Fontani, et al.
IEEE Transactions on Information Forensics and Security (2018) Vol. 14, Iss. 3, pp. 635-645
Closed Access | Times Cited: 51
Massimo Iuliani, Dasara Shullani, Marco Fontani, et al.
IEEE Transactions on Information Forensics and Security (2018) Vol. 14, Iss. 3, pp. 635-645
Closed Access | Times Cited: 51
Fourier Spectrum Discrepancies in Deep Network Generated Images
Tarik Dzanic, Karan Shah, Freddie Witherden
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 48
Tarik Dzanic, Karan Shah, Freddie Witherden
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 48
A Bibliometric Analysis of Digital Image Forensics
Angelina Gokhale, Preeti Mulay, Dhanya Pramod, et al.
Science & Technology Libraries (2020) Vol. 39, Iss. 1, pp. 96-113
Closed Access | Times Cited: 48
Angelina Gokhale, Preeti Mulay, Dhanya Pramod, et al.
Science & Technology Libraries (2020) Vol. 39, Iss. 1, pp. 96-113
Closed Access | Times Cited: 48
An Adaptive Neural Network for Unsupervised Mosaic Consistency Analysis in Image Forensics
Quentin Bammey, Rafael Grompone von Gioi, Jean‐Michel Morel
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020), pp. 14182-14192
Open Access | Times Cited: 44
Quentin Bammey, Rafael Grompone von Gioi, Jean‐Michel Morel
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020), pp. 14182-14192
Open Access | Times Cited: 44
Ciratefi based copy move forgery detection on digital images
Gül Tahaoğlu, Güzin Ulutaş, Beste Üstübioğlu, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 16, pp. 22867-22902
Closed Access | Times Cited: 25
Gül Tahaoğlu, Güzin Ulutaş, Beste Üstübioğlu, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 16, pp. 22867-22902
Closed Access | Times Cited: 25
Logistic-map based fragile image watermarking scheme for tamper detection and localization
Aditya Kumar Sahu, M. Hassaballah, Routhu Srinivasa Rao, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 16, pp. 24069-24100
Closed Access | Times Cited: 25
Aditya Kumar Sahu, M. Hassaballah, Routhu Srinivasa Rao, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 16, pp. 24069-24100
Closed Access | Times Cited: 25
Toward Deep-Learning-Based Methods in Image Forgery Detection: A Survey
Nam Thanh Pham, Chun‐Su Park
IEEE Access (2023) Vol. 11, pp. 11224-11237
Open Access | Times Cited: 15
Nam Thanh Pham, Chun‐Su Park
IEEE Access (2023) Vol. 11, pp. 11224-11237
Open Access | Times Cited: 15
Source screen identification using difference image mask obtained from images recaptured through screenshots based on spatial rich features
Areesha Anjum, Saiful Islam, Mahreen Saleem, et al.
Pattern Analysis and Applications (2025) Vol. 28, Iss. 2
Closed Access
Areesha Anjum, Saiful Islam, Mahreen Saleem, et al.
Pattern Analysis and Applications (2025) Vol. 28, Iss. 2
Closed Access
Blind Image Watermarking for Localization and Restoration of Color Images
Rishi Sinhal, Irshad Ahmad Ansari, Chang Wook Ahn
IEEE Access (2020) Vol. 8, pp. 200157-200169
Open Access | Times Cited: 38
Rishi Sinhal, Irshad Ahmad Ansari, Chang Wook Ahn
IEEE Access (2020) Vol. 8, pp. 200157-200169
Open Access | Times Cited: 38
DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 35
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 35
A Novel Copy-Move Forgery Detection Algorithm via Feature Label Matching and Hierarchical Segmentation Filtering
Yanfen Gan, Jun-Liu Zhong, Chi‐Man Vong
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102783-102783
Closed Access | Times Cited: 27
Yanfen Gan, Jun-Liu Zhong, Chi‐Man Vong
Information Processing & Management (2021) Vol. 59, Iss. 1, pp. 102783-102783
Closed Access | Times Cited: 27