{"id":"https://openalex.org/W7128374326","doi":"https://doi.org/10.48550/arxiv.2602.06530","title":"Universal Anti-forensics Attack against Image Forgery Detection via Multi-modal Guidance","display_name":"Universal Anti-forensics Attack against Image Forgery Detection via Multi-modal Guidance","publication_year":2026,"publication_date":"2026-02-06","ids":{"openalex":"https://openalex.org/W7128374326","doi":"https://doi.org/10.48550/arxiv.2602.06530"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.06530","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.06530","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.06530","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125402738","display_name":"Haipeng Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li, Haipeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102852210","display_name":"R. C. Peng","orcid":"https://orcid.org/0009-0005-1707-8941"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peng, Rongxuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125415185","display_name":"Anwei Luo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Luo, Anwei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023503629","display_name":"Shunquan Tan","orcid":"https://orcid.org/0000-0002-7457-3691"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tan, Shunquan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125425601","display_name":"Changsheng Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Changsheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5086393377","display_name":"Anastasia Antsiferova","orcid":"https://orcid.org/0000-0002-1272-5135"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antsiferova, Anastasia","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5125402738"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.7440999746322632,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.7440999746322632,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.10300000011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.07900000363588333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.690500020980835},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5284000039100647},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.510699987411499},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4909999966621399},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4255000054836273},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.37549999356269836},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3312999904155731},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.32030001282691956}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7348999977111816},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.690500020980835},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5284000039100647},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.510699987411499},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4909999966621399},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48649999499320984},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4255000054836273},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.37549999356269836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34150001406669617},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3312999904155731},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.32030001282691956},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.31779998540878296},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.31139999628067017},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3012000024318695},{"id":"https://openalex.org/C2987933465","wikidata":"https://www.wikidata.org/wiki/Q141130","display_name":"Image manipulation","level":3,"score":0.2831000089645386},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2619999945163727}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.06530","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.06530","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.06530","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.06530","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.7476348280906677,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"advancement":[2],"of":[3,28,84,90],"AI-Generated":[4],"Content":[5],"(AIGC)":[6],"technologies":[7],"poses":[8],"significant":[9],"challenges":[10],"for":[11,158],"authenticity":[12],"assessment.":[13],"However,":[14],"existing":[15],"evaluation":[16],"protocols":[17],"largely":[18],"overlook":[19],"anti-forensics":[20,48],"attack,":[21],"failing":[22],"to":[23,45,52,100,114,133,151],"ensure":[24],"the":[25,53,64,81,106],"comprehensive":[26],"robustness":[27],"state-of-the-art":[29],"AIGC":[30,55,78,135],"detectors":[31,79,136],"in":[32],"real-world":[33],"applications.":[34],"To":[35],"bridge":[36],"this":[37],"gap,":[38],"we":[39,94],"propose":[40],"ForgeryEraser,":[41],"a":[42,96],"framework":[43],"designed":[44],"execute":[46],"universal":[47],"attack":[49],"without":[50],"access":[51],"target":[54],"detectors.":[56],"We":[57],"reveal":[58],"an":[59],"adversarial":[60],"vulnerability":[61],"stemming":[62],"from":[63,121],"systemic":[65],"reliance":[66],"on":[67,137],"Vision-Language":[68],"Models":[69],"(VLMs)":[70],"as":[71],"shared":[72],"backbones":[73],"(e.g.,":[74],"CLIP),":[75],"where":[76],"downstream":[77],"inherit":[80],"feature":[82,108],"space":[83,109],"these":[85],"publicly":[86,166],"accessible":[87],"models.":[88],"Instead":[89],"traditional":[91],"logit-based":[92],"optimization,":[93],"design":[95],"multi-modal":[97],"guidance":[98],"loss":[99],"drive":[101],"forged":[102,159],"image":[103],"embeddings":[104],"within":[105],"VLM":[107],"toward":[110],"text-derived":[111],"authentic":[112,156],"anchors":[113],"erase":[115],"forgery":[116,122],"traces,":[117],"while":[118],"repelling":[119],"them":[120],"anchors.":[123],"Extensive":[124],"experiments":[125],"demonstrate":[126],"that":[127],"ForgeryEraser":[128,146],"causes":[129],"substantial":[130],"performance":[131],"degradation":[132],"advanced":[134],"both":[138],"global":[139],"synthesis":[140],"and":[141],"local":[142],"editing":[143],"benchmarks.":[144],"Moreover,":[145],"induces":[147],"explainable":[148],"forensic":[149],"models":[150],"generate":[152],"explanations":[153],"consistent":[154],"with":[155],"images":[157],"images.":[160],"Our":[161],"code":[162],"will":[163],"be":[164],"made":[165],"available.":[167]},"counts_by_year":[],"updated_date":"2026-02-10T06:17:13.238206","created_date":"2026-02-10T00:00:00"}
