INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )
E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 11 NO. 1 2025
DOI: 10.56201/ijcsmt.v11.no1.2025.pg12.20
Okpala Calista Uchenna
This study presents a novel approach for detecting synthetic images using a Convolutional Neural Network (CNN). The proposed approach makes use of a two-step procedure: first, data collection and preprocessing; next, model training and assessment. While pre-trained diffusion and Generative Adversarial Network (GAN) models were used to create synthetic images, real images were used from publicly available datasets such as FFHQ, AFHQ, and LSUN. To differentiate between genuine and artificial photos, a CNN model with a complex architecture was created. It consists of fully connected layers for classification and convolutional layers for feature extraction. Using a 10-fold cross-validation method, the system's average accuracy, precision, recall, and F1- score were 96.7%, 0.96, and 0.97, respectively. The results obtained show how well the model detects synthetic images with high recall and precision, underscoring its potential for practical uses in content authentication, digital forensics, and AI-generated image recognition. The study emphasises how crucial it is to use deep learning methods to tackle the escalating difficulties in synthetic image identification.
: Synthetic Image Detection; Convolutional Neural Network; Deep Learning; Data Preprocessing; Image Classification; Generative Adversarial Networks (GANs)
Bayram, S., Sencar, H. T., & Memon, N. (2009). An efficient and robust method for detecting
copy-move forgery. In Proceedings of the 2009 IEEE International Conference on Acoustics,
Speech
and
Signal
Processing
(pp.
1053–1056).
https://doi.org/10.1109/ICASSP.2009.4971862
Bianchini, M., & Scarselli, F. (2014). On the complexity of neural network classifiers: A
comparison between shallow and deep architectures. IEEE Transactions on Neural Networks
and Learning Systems, 25(9), 1553–1565. https://doi.org/10.1109/TNNLS.2013.2282551
Choi, Y., Choi, M., Kim, M., Ha, J.-W., Kim, S., & Choo, J. (2018). StarGAN: Unified generative
adversarial networks for multi-domain image-to-image translation. In Proceedings of the
IEEE/CVF Conference on Computer Vision and Pattern Recognition.
Ferrara, P., Bianchi, T., De Rosa, A., & Piva, A. (2012). Image forgery localization via fine-grained
analysis of CFA artifacts. IEEE Transactions on Information Forensics and Security, 7(5),
1566–1577. https://doi.org/10.1109/TIFS.2012.2202910
Fridrich, J., Soukal, D., & Lukás, J. (2003). Detection of copy-move forgery in digital images.
International Journal of Computer Science Issues, 3(2), 55–61.
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning (p. 800). MIT Press. Retrieved
from http://www.deeplearningbook.org
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A.,
& Bengio, Y. (2014). Generative adversarial networks. Advances in Neural Information
Processing Systems, 3, 139–144. https://doi.org/10.5555/2993189.2993194
Gu, J., Wang, Z., Kuen, J., Ma, L., Shahroudy, A., Shuai, B., Liu, T., Wang, X., Wang, G., Cai, J.,
& Chen, H. (2018). Recent advances in convolutional neural networks. Pattern Recognition,
77, 354–377. https://doi.org/10.1016/j.patcog.2017.10.013
He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 770–
778). https://doi.org/10.1109/CVPR.2016.90
He, Z., Lu, W., Sun, W., & Huang, J. (2012). Digital image splicing detection based on Markov
features in DCT and DWT domain. Pattern Recognition, 45(12), 4292–4299.
https://doi.org/10.1016/j.patcog.2012.05.024
Huang, G., Liu, Z., Van Der Maaten, L., & Weinberger, K. Q. (2017). Densely connected
convolutional networks. In Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition (pp. 4700–4708). https://doi.org/10.1109/CVPR.2017.643
Karras, T., Laine, S., & Aila, T. (2019). A style-based generator architecture for generative
adversarial networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and
Pattern Recognition.
Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., & Aila, T. (2020). Analyzing and
improving the image quality of StyleGAN. In Proceedings of the IEEE/CVF Conference on
Computer Vision and Pattern Recognition.
Li, G., Wu, Q., Tu, D., & Sun, S. (2007). A sorted neighborhood approach for detecting duplicated
regions in image forgeries based on DWT and SVD. In Proceedings of the 2007 IEEE
International
Conference
on
Multimedia
and
Expo
(pp.
1750–1753).
https://doi.org/10.1109/ICME.2007.4284784
Masood, M., Nawaz, M., Malik, K., Javed, A., Irtaza, A., & Malik, H. (2022). Deepfakes
generation and detection: State-of-the-art, open challenges, countermeasures, and way
forward. Applied Intelligence, 53(7), 3974–4026. https://doi.org/10.1007/s10462-022-
09932-1
Mirsky, Y., & Lee, W. (2021). The creation and detection of deepfakes: A survey. ACM Computing
Surveys, 54(9), 1–41. https://doi.org/10.1145/3433181.3433186
Rombach, R., Blattmann, A., Lorenz, D., Esser, P., & Ommer, B. (2022). High-resolution image
synthesis with latent diffusion models. In Proceedings of the IEEE/CVF Conference on
Computer Vision and Pattern Recognition.
Sharma, D. K., Singh, B., Agarwal, S., Garg, L., Kim, C., & Jung, K. H. (2023). A survey of
detection and mitigation for fake images on social media platforms. Applied Sciences,
13(20), 10980. https://doi.org/10.3390/app132010980
Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image
recognition. arXiv. https://arxiv.org/abs/1409.1556
Thakur, R., & Rohilla, R. (2020). Recent advances in digital image manipulation detection
techniques:
A
brief
review.
Forensic
Science
International,
312,
https://doi.org/10.1016/j.forsciint.2020.110311
Yu, F., Seff, A., Zhang, Y., Song, S., Funkhouser, T., & Xiao, J. (2015). LSUN: Construction of a
large-scale image dataset using deep learning with humans in the loop. arXiv preprint
arXiv:1506.03365.
Zhu, Y., Du, J., Zhu, Y., Wang, Y., Ou, Z., Feng, F., & Tang, J. (2021). Training BatchNorm only
in neural architecture search and beyond. arXiv preprint arXiv:2112.00265.