{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:14:55Z","timestamp":1742912095182,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031189067"},{"type":"electronic","value":"9783031189074"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18907-4_11","type":"book-chapter","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:03:53Z","timestamp":1666825433000},"page":"130-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["General High-Pass Convolution: A Novel Convolutional Layer for\u00a0Image Manipulation Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4688-7394","authenticated-orcid":false,"given":"Zecheng","family":"Tang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9814-638X","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,27]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Acuna, D.E., Brookes, P.S., Kording, K.P.: Bioscience-scale automated detection of figure element reuse, p. 269415. BioRxiv (2018)","DOI":"10.1101\/269415"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Anumala, U., Okade, M.: Forensic detection of median filtering in images using local tetra patterns and J-divergence. In: 2020 National Conference on Communications (NCC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/NCC48643.2020.9055999"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5\u201310 (2016)","DOI":"10.1145\/2909827.2930786"},{"issue":"11","key":"11_CR4","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691\u20132706 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bik, E.M., Casadevall, A., Fang, F.C.: The prevalence of inappropriate image duplication in biomedical research publications. MBio 7(3), e00809\u201316 (2016)","DOI":"10.1128\/mBio.00809-16"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-36373-3_1","volume-title":"Information Hiding","author":"C Chen","year":"2013","unstructured":"Chen, C., Ni, J., Huang, R., Huang, J.: Blind median filtering detection using statistics in difference domain. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 1\u201315. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36373-3_1"},{"issue":"11","key":"11_CR7","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Sig. Process. Lett. 22(11), 1849\u20131853 (2015)","journal-title":"IEEE Sig. Process. Lett."},{"key":"11_CR8","unstructured":"Chen, L.C., Papandreou, G., Schroff, F., Adam, H.: Rethinking atrous convolution for semantic image segmentation. arXiv preprint arXiv:1706.05587 (2017)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 159\u2013164 (2017)","DOI":"10.1145\/3082031.3083247"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Fan, W., Wang, K., Cayre, F.: General-purpose image forensics using patch likelihood under image statistical models. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/WIFS.2015.7368606"},{"issue":"3","key":"11_CR12","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR13","unstructured":"Gallagher, A.C.: Detection of linear and cubic interpolation in JPEG compressed images. In: The 2nd Canadian Conference on Computer and Robot Vision (CRV 2005), pp. 65\u201372. IEEE (2005)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J.: CFA-aware features for steganalysis of color images. In: Media Watermarking, Security, and Forensics 2015, vol. 9409, pp. 279\u2013291. SPIE (2015)","DOI":"10.1117\/12.2078399"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Hwang, J.J., Rhee, K.H.: Gaussian filtering detection based on features of residuals in image forensics. In: 2016 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), pp. 153\u2013157. IEEE (2016)","DOI":"10.1109\/RIVF.2016.7800286"},{"issue":"9","key":"11_CR17","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TIFS.2013.2273394","volume":"8","author":"X Kang","year":"2013","unstructured":"Kang, X., Stamm, M.C., Peng, A., Liu, K.R.: Robust median filtering forensics using an autoregressive model. IEEE Trans. Inf. Forensics Secur. 8(9), 1456\u20131468 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 11\u201320 (2008)","DOI":"10.1145\/1411328.1411333"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"11_CR20","unstructured":"Liu, L., et al.: On the variance of the adaptive learning rate and beyond. arXiv preprint arXiv:1908.03265 (2019)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., Feichtenhofer, C., Darrell, T., Xie, S.: A convnet for the 2020s. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11976\u201311986 (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3431\u20133440 (2015)","DOI":"10.1109\/CVPR.2015.7298965"},{"issue":"3","key":"11_CR23","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","volume":"3","author":"B Mahdian","year":"2008","unstructured":"Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 3(3), 529\u2013538 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"11_CR24","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"11_CR25","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Sig. Process. 53(2), 758\u2013767 (2005)","journal-title":"IEEE Trans. Sig. Process."},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Qiu, X., Li, H., Luo, W., Huang, J.: A universal image forensic strategy based on steganalytic model. In: Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp. 165\u2013170 (2014)","DOI":"10.1145\/2600918.2600941"},{"key":"11_CR27","unstructured":"Rahaman, N., et al.: On the spectral bias of neural networks. In: International Conference on Machine Learning, pp. 5301\u20135310. PMLR (2019)"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Rhee, K.H., Chung, I.: Improved feature vector of median filtering residual for image forensics. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), pp. 1\u20134. IEEE (2018)","DOI":"10.1109\/ICETAS.2018.8629201"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-36373-3_5","volume-title":"Information Hiding","author":"YQ Shi","year":"2013","unstructured":"Shi, Y.Q., Sutthiwan, P., Chen, L.: Textural features for steganalysis. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 63\u201377. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36373-3_5"},{"key":"11_CR30","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"11_CR31","doi-asserted-by":"publisher","first-page":"e02956","DOI":"10.7554\/eLife.02956","volume":"3","author":"AM Stern","year":"2014","unstructured":"Stern, A.M., Casadevall, A., Steen, R.G., Fang, F.C.: Financial costs and personal consequences of research misconduct resulting in retracted publications. Elife 3, e02956 (2014)","journal-title":"Elife"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9543\u20139552 (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"11_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-030-36708-4_22","volume-title":"Neural Information Processing","author":"Z-QJ Xu","year":"2019","unstructured":"Xu, Z.-Q.J., Zhang, Y., Xiao, Y.: Training behavior of deep neural network in frequency domain. In: Gedeon, T., Wong, K.W., Lee, M. (eds.) ICONIP 2019. LNCS, vol. 11953, pp. 264\u2013274. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36708-4_22"},{"issue":"4","key":"11_CR34","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1007\/s11042-016-3795-2","volume":"76","author":"M Zampoglou","year":"2016","unstructured":"Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Large-scale evaluation of splicing localization algorithms for web images. Multimed. Tools Appl. 76(4), 4801\u20134834 (2016). https:\/\/doi.org\/10.1007\/s11042-016-3795-2","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"11_CR35","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/LSP.2013.2295858","volume":"21","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Li, S., Wang, S., Shi, Y.Q.: Revealing the traces of median filtering using high-order local ternary patterns. IEEE Sig. Process. Lett. 21(3), 275\u2013279 (2014)","journal-title":"IEEE Sig. Process. Lett."},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1053\u20131061 (2018)","DOI":"10.1109\/CVPR.2018.00116"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18907-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:06:37Z","timestamp":1666825597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18907-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031189067","9783031189074"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18907-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/en.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"564","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"233","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.03","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.35","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}