An Attention-Enhanced Multi-Scale Framework for Copy–Move Forgery Detection and Localization
Received: 25 February 2026 | Revised: 16 March 2026 | Accepted: 24 March 2026 | Online: 5 April 2026
Corresponding author: Vanishri. V. Sataraddi
Abstract
When a region in an image is copied and pasted elsewhere within the same image, the resulting forgery is considered a Copy–Move Forgery (CMF). CMF is a challenging problem in digital image forensics, as the copied region retains the original image's statistical properties and can also be manipulated by rotation, scaling, compression, and other transformations. In this paper, we propose an attention-guided deep learning framework for robust Copy–Move Forgery Detection (CMFD) with precise localization. The proposed network architecture aggregates hierarchical convolutional feature maps and boosts the representational saliency through successive channel and spatial attention modules. A multi-scale decoder with integrated self-correlation computation and a lightweight transformer block further encourage the extraction of long-range duplicated patterns, enhancing localization accuracy. Extensive experiments on benchmark datasets validate that this method achieves up to 95% precision, 93% recall, and 94% F1-score, significantly outperforming notable baseline methods. The network also demonstrates robust generalizability against commonly encountered postprocessing operations such as JPEG compression, noise, and moderate geometric transformations. The complete architectural design and mathematical formulation are provided to ensure reproducibility and practical applicability in real-world image forensic scenarios.
Keywords:
Copy–Move Forgery (CMF), image forensics, attention mechanism, multi-scale, deep learning, forgery localizationDownloads
References
J. Fridrich, D. Soukal, and J. Lukáš, "Detection of Copy-Move Forgery in Digital Images," , 2003. - References - Scientific Research Publishing," in Proceedings of the Digital Forensic Research Workshop, Cleveland, Cleveland, OH, USA, 2003.
D. G. Lowe, "Distinctive Image Features from Scale-Invariant Keypoints," International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, Nov. 2004.
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099–1110, Sept. 2011.
D. Cozzolino, G. Poggi, and L. Verdoliva, "Efficient Dense-Field Copy–Move Forgery Detection," IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2284–2297, Nov. 2015.
J. H. Bappy, C. Simons, L. Nataraj, B. S. Manjunath, and A. K. Roy-Chowdhury, "Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries," IEEE Transactions on Image Processing, vol. 28, no. 7, pp. 3286–3300, July 2019.
F. Z. Mehrjardi, A. M. Latif, M. S. Zarchi, and R. Sheikhpour, "A survey on deep learning-based image forgery detection," Pattern Recognition, vol. 144, Dec. 2023, Art. no. 109778.
S. Woo, J. Park, J.-Y. Lee, and I. S. Kweon, "CBAM: Convolutional Block Attention Module," in 15th European Conference on Computer Vision, Munich, Germany, 2018, pp. 3–19.
D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, "CoMoFoD — New database for copy-move forgery detection," in Proceedings ELMAR-2013, Zadar, Croatia, 2013, pp. 49–54.
"Copy-Move Forgery Detection and Localization." Image and Communication Laboratory. https://lci.micc.unifi.it/labd/2015/01/copy-move-forgery-detection-and-localization/.
Y. Liu et al., "CMFDFormer: Transformer-based Copy-Move Forgery Detection with Continual Learning." arXiv, Nov. 22, 2023.
K. Zhao et al., "CAMU-Net: Copy-move forgery detection utilizing coordinate attention and multi-scale feature fusion-based up-sampling," Expert Systems with Applications, vol. 238, Mar. 2024, Art. no. 121918.
P. Liang, Z. Li, H. Tu, and H. Zhao, "LBRT: Local-Information-Refined Transformer for Image Copy–Move Forgery Detection," Sensors, vol. 24, no. 13, June 2024, Art. no. 4143.
M. Zanardelli, F. Guerrini, R. Leonardi, and N. Adami, "Image forgery detection: a survey of recent deep-learning approaches," Multimedia Tools and Applications, vol. 82, no. 12, pp. 17521–17566, May 2023.
S. Sharma, B. Singh, and H. Garg, "Robust Image Forgery Localization Using Hybrid CNN-Transformer Synergy Based Framework," Computers, Materials & Continua, vol. 82, no. 3, pp. 4691–4708, Mar. 2025.
A. Hegazi, A. Taha, and M. M. Selim, "An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal," Journal of King Saud University - Computer and Information Sciences, vol. 33, no. 9, pp. 1055–1063, Nov. 2021.
O. M. Al-Qershi and B. E. Khoo, "Evaluation of copy-move forgery detection: datasets and evaluation metrics," Multimedia Tools and Applications, vol. 77, no. 24, pp. 31807–31833, Dec. 2018.
P. Selvaraj and A. B. S, "Attention based deep learning model for detecting copy move forgery." Research Square, Oct. 01, 2025.
P. B. Shailaja Rani and A. Kumar, "Digital Image Forgery Detection Techniques: A Comprehensive Review," in 2019 3rd International conference on Electronics, Communication and Aerospace Technology, Coimbatore, India, 2019, pp. 959–963.
H. A. Raheem, M. A. Mohammed, and A. S. H. M. Ali, "Enhancing the Image Forgery Detection based Machine Learning Approach using Multiple Datasets," Engineering, Technology & Applied Science Research, vol. 15, no. 3, pp. 22739–22745, June 2025.
"MICC-F220." Kaggle. [Online]. Available: https://www.kaggle.com/datasets/mashraffarouk/micc-f220.
"CASIA 2.0 Image Tampering Detection Dataset." Kaggle. [Online]. Available: https://www.kaggle.com/datasets/divg07/casia-20-image-tampering-detection-dataset.
"CoMoFoD." Video Communications Laboratory, Department of Communication and Space Technologies, University of Zagreb. [Online]. Available: https://www.vcl.fer.hr/comofod/.
Downloads
How to Cite
License
Copyright (c) 2026 Vanishri V. Sataraddi, N. P. Nethravathi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
