Return to Article Details Preserving authenticity: transfer learning methods for detecting and verifying facial image manipulation Download Download PDF