{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:35:14Z","timestamp":1743140114792,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030368012"},{"type":"electronic","value":"9783030368029"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36802-9_4","type":"book-chapter","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T18:03:03Z","timestamp":1575568983000},"page":"32-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["T-SAMnet: A Segmentation Driven Network for Image Manipulation Detection"],"prefix":"10.1007","author":[{"given":"Jie","family":"Pan","sequence":"first","affiliation":[]},{"given":"Yunshu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xinghao","family":"Ding","sequence":"additional","affiliation":[]},{"given":"En","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,5]]},"reference":[{"unstructured":"Farid, H.: Creating and detecting doctored and virtual images: implications to the child pornography prevention act. Department of Computer Science, Dartmouth College, TR2004-518, 13:970 (2004)","key":"4_CR1"},{"issue":"12","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.3724\/SP.J.1004.2008.01458","volume":"34","author":"Q Wu","year":"2008","unstructured":"Wu, Q., Li, G., Tu, D., Sun, S.: A survey of blind digital image forensics technology for authenticity detection. Acta Autom. Sinica 34(12), 1458\u20131466 (2008)","journal-title":"Acta Autom. Sinica"},{"doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1053\u20131061 (2018)","key":"4_CR3","DOI":"10.1109\/CVPR.2018.00116"},{"unstructured":"Ng, T.T., Chang, S.F.: A model for image splicing. In: 2004 IEEE International Conference on Image Processing, vol. 2, pp. 1169\u20131172 (2004)","key":"4_CR4"},{"issue":"1","key":"4_CR5","first-page":"237","volume":"42","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Hu, C., Huang, H.: Image blur forgery detection based on color consistency. Comput. Eng. 42(1), 237\u2013242 (2016)","journal-title":"Comput. Eng."},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security, pp. 1\u20136 (2016)","key":"4_CR7","DOI":"10.1109\/WIFS.2016.7823911"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","key":"4_CR8","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"crossref","unstructured":"Gao, Y., Beijbom, O., Zhang, N.: Compact bilinear pooling. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 317\u2013326 (2016)","key":"4_CR9","DOI":"10.1109\/CVPR.2016.41"},{"doi-asserted-by":"crossref","unstructured":"Fu J., Zheng, H., Mei, T.: Look closer to see better: recurrent attention convolutional neural network for finegrained image recognition. In: Proceedings of the Conference on Computer Vision and Pattern Recognition (2017)","key":"4_CR10","DOI":"10.1109\/CVPR.2017.476"},{"unstructured":"Nist nimble 2016 datasets. https:\/\/www.nist.gov\/itl\/iad\/mig\/nimble-challenge-2017-evaluation\/","key":"4_CR11"},{"unstructured":"Dong, J., Wang W., Tan, T.: Casia image tampering detection evaluation database (2010). http:\/\/forensics.idealtest.org","key":"4_CR12"},{"doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp. 422\u2013426 (2013)","key":"4_CR13","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.-T., Shen, X., Winkler, S.: COVERAGEA novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing, pp. 161\u2013165 (2016)","key":"4_CR14","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"unstructured":"Krawetz, N.: A picture\u2019s worth.... Hacker Factor Solutions 6, 2 (2007)","key":"4_CR16"},{"issue":"10","key":"4_CR17","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27(10), 1497\u20131503 (2009)","journal-title":"Image Vis. Comput."},{"issue":"5","key":"4_CR18","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara, P., Bianchi, T., De Rosa, A.: Image forgery localization via finegrained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7(5), 1566\u20131577 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N.: Image tamper detection based on demosaicing artifacts. In: 2009 IEEE International Conference on Image Processing, pp. 1497\u20131500 (2009)","key":"4_CR19","DOI":"10.1109\/ICIP.2009.5414611"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum, R., Ren, Y., Kuo, C.C.J.: Image splicing localization using a multi-task fully convo-lutional network (MFCN). J. Vis. Commun. Image Represent. 51, 201\u2013209 (2018)","journal-title":"J. Vis. Commun. Image Represent."}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36802-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:47:56Z","timestamp":1710262076000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-36802-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030368012","9783030368029"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36802-9_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ajiips.com.au\/iconip2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}