{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:56:33Z","timestamp":1763348193669,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030287511"},{"type":"electronic","value":"9783030287528"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-28752-8_11","type":"book-chapter","created":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T11:02:31Z","timestamp":1565089351000},"page":"201-215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Using Neural Networks for Fake Colorized Image Detection"],"prefix":"10.1007","author":[{"given":"Yuze","family":"Li","sequence":"first","affiliation":[]},{"given":"Yaping","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liangfu","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yongheng","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Jingcheng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,7]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"K. Bahrami, A. Kot, L. Li and H. Li, Blurred image splicing localization by exposing blur type inconsistency, IEEE Transactions on Information Forensics and Security, vol. 10(5), pp. 999\u20131009, 2015.","DOI":"10.1109\/TIFS.2015.2394231"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"R. Bohme and M. Kirchner, Counter-forensics: Attacking image forensics, in Digital Image Forensics, H. Sencar and N. Memon (Eds.), Springer, New York, pp. 327\u2013366, 2013.","DOI":"10.1007\/978-1-4614-0757-7_12"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"C. Chang and C. Lin, LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, vol. 2(3), article no. 27, 2011.","DOI":"10.1145\/1961189.1961199"},{"key":"11_CR4","unstructured":"H. Farid, Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act, Technical Report TR2004-518, Department of Computer Science, Dartmouth College, Hanover, New Hampshire, 2004."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"H. Farid, Exposing digital forgeries from JPEG ghosts, IEEE Transactions on Information Forensics and Security, vol. 4(1), pp. 154\u2013160, 2009.","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"H. Farid, Image forgery detection, IEEE Signal Processing, vol. 26(2), pp. 16\u201325, 2009.","DOI":"10.1109\/MSP.2008.931079"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"G. Fasano and A. Franceschini, A multidimensional version of the Kolmogorov-Smirnov test, Monthly Notices of the Royal Astronomical Society, vol. 225(1), pp. 155\u2013170, 1987.","DOI":"10.1093\/mnras\/225.1.155"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Y. Guo, X. Cao, W. Zhang and R. Wang, Fake colorized image detection, IEEE Transactions on Information Forensics and Security, vol. 13(8), pp. 1932\u20131944, 2018.","DOI":"10.1109\/TIFS.2018.2806926"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"K. He, X. Zhang, S. Ren and J. Sun, Delving deep into rectifiers: Surpassing human-level performance on ImageNet classification, Proceedings of the IEEE International Conference on Computer Vision, pp. 1026\u20131034, 2015.","DOI":"10.1109\/ICCV.2015.123"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"G. Huang, Z. Liu, L. van der Maaten and K. Weinberger, Densely connected convolutional networks, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2261\u20132269, 2017.","DOI":"10.1109\/CVPR.2017.243"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"S. Iizuka, E. Simo-Serra and H. Ishikawa, Let there be color! Joint end-to-end learning of global and local image priors for automatic image colorization with simultaneous classification, ACM Transactions on Graphics, vol. 35(4), article no. 110, 2016.","DOI":"10.1145\/2897824.2925974"},{"key":"11_CR12","unstructured":"R. Ironi, D. Cohen-Or and D. Lischinski, Colorization by example, Proceedings of the Sixteenth Eurographics Conference on Rendering Techniques, pp. 201\u2013210, 2005."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"G. Larsson, M. Maire and G. Shakhnarovich, Learning representations for automatic colorization, Proceedings of the Fourteenth European Conference on Computer Vision, Part IV, pp. 577\u2013593, 2016.","DOI":"10.1007\/978-3-319-46493-0_35"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Y. LeCun, Y. Bengio and G. Hinton, Deep learning, Nature, vol. 521(7553), pp. 436\u2013444, 2015.","DOI":"10.1038\/nature14539"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Y. LeCun, B. Boser, J. Denker, D. Henderson, R. Howard, W. Hubbard and L. Jackel, Backpropagation applied to handwritten ZIP code recognition, Neural Computation, vol. 1(4), pp. 541\u2013551, 1989.","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"A. Levin, D. Lischinski and Y. Weiss, Colorization using optimization, ACM Transactions on Graphics, vol. 23(3), pp. 689\u2013694, 2004.","DOI":"10.1145\/1015706.1015780"},{"key":"11_CR17","unstructured":"Q. Luan, F. Wen, D. Cohen-Or, L. Liang, Y. Xu and H. Shum, Natural image colorization, Proceedings of the Eighteenth Eurographics Conference on Rendering Techniques, pp. 309\u2013320, 2007."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"E. Reinhard, M. Adhikhmin, B. Gooch and P. Shirley, Color transfer between images, IEEE Computer Graphics and Applications, vol. 21(5), pp. 34\u201341, 2001.","DOI":"10.1109\/38.946629"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. Berg and F. Li, ImageNet Large-Scale Visual Recognition Challenge, International Journal of Computer Vision, vol. 115(3), pp. 211\u2013252, 2015.","DOI":"10.1007\/s11263-015-0816-y"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"D. Sykora, J. Dingliana and S. Collins, LazyBrush: Flexible painting tool for hand-drawn cartoons, Computer Graphics Forum, vol. 28(2), pp. 599\u2013608, 2009.","DOI":"10.1111\/j.1467-8659.2009.01400.x"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Y. Wen, K. Zhang, Z. Li and Y. Qiao, A discriminative feature learning approach for deep face recognition, Proceedings of the Fourteenth European Conference on Computer Vision, Part VII, pp. 499\u2013515, 2016.","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"R. Zhang, P. Isola and A. Efros, Colorful image colorization, Proceedings of the Fourteenth European Conference on Computer Vision, Part III, pp. 649\u2013666, 2016.","DOI":"10.1007\/978-3-319-46487-9_40"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-28752-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T00:07:49Z","timestamp":1691280469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-28752-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030287511","9783030287528"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-28752-8_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"7 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/ConferenceProgramCommittee2019.pdf","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}