{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:05:21Z","timestamp":1764842721324,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031278174"},{"type":"electronic","value":"9783031278181"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27818-1_50","type":"book-chapter","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:20:17Z","timestamp":1680171617000},"page":"611-622","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Multi-Stream Fusion Network for\u00a0Image Splicing Localization"],"prefix":"10.1007","author":[{"given":"Maria","family":"Siopi","sequence":"first","affiliation":[]},{"given":"Giorgos","family":"Kordopatis-Zilos","sequence":"additional","affiliation":[]},{"given":"Polychronis","family":"Charitidis","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[]},{"given":"Symeon","family":"Papadopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Bappy, J.H., Simons, C., Nataraj, L., Manjunath, B., Roy-Chowdhury, A.K.: Hybrid LSTM and encoder-decoder architecture for detection of image forgeries. IEEE Trans. Image Process. (2019)","DOI":"10.1109\/TIP.2019.2895466"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Charitidis, P., Kordopatis-Zilos, G., Papadopoulos, S., Kompatsiaris, I.: Operation-wise attention network for tampering localization fusion. In: International Conference on Content-based Multimedia Indexing (2021)","DOI":"10.1109\/CBMI50038.2021.9461920"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Splicebuster: a new blind image splicing detector. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS) (2015)","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing (2013)","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"issue":"1","key":"50_CR5","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid, H.: Exposing digital forgeries from jpeg ghosts. IEEE Trans. Inf. Forensics Secur. 4(1), 154\u2013160 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"50_CR6","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TIFS.2013.2248727","volume":"8","author":"M Fontani","year":"2013","unstructured":"Fontani, M., Bianchi, T., De Rosa, A., Piva, A., Barni, M.: A framework for decision fusion in image forensics based on Dempster-Shafer theory of evidence. IEEE Trans. Inf. Forensics Secur. 8(4), 593\u2013607 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"50_CR7","first-page":"832","volume":"3","author":"J Gordon","year":"1984","unstructured":"Gordon, J., Shortliffe, E.H.: The Dempster-Shafer theory of evidence. Rule-Based Exp. Syst.: MYCIN Exp. Stanford Heuristic Program. Proj. 3, 832\u2013838 (1984)","journal-title":"Rule-Based Exp. Syst.: MYCIN Exp. Stanford Heuristic Program. Proj."},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Hao, J., Zhang, Z., Yang, S., Xie, D., Pu, S.: Transforensics: image forgery localization with dense self-attention. In: IEEE\/CVF International Conference on Computer Vision (2021)","DOI":"10.1109\/ICCV48922.2021.01478"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: SPAN: spatial pyramid attention network for image manipulation localization. In: European Conference on Computer Vision (2020)","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Iakovidou, C., Papadopoulos, S., Kompatsiaris, Y.: Knowledge-based fusion for image tampering localization. In: IFIP International Conference on Artificial Intelligence Applications and Innovations (2020)","DOI":"10.1007\/978-3-030-49161-1_16"},{"key":"50_CR11","unstructured":"IFS-TC: Report on the IEEE-IFS challenge (2016). http:\/\/ifc.recod.ic.unicamp.br\/"},{"key":"50_CR12","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International Conference on Machine Learning (2015)"},{"key":"50_CR13","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"50_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2017.08.009","volume":"71","author":"P Korus","year":"2017","unstructured":"Korus, P.: Digital image integrity-a survey of protection and verification techniques. Digit. Signal Proces. 71, 1\u201326 (2017)","journal-title":"Digit. Signal Proces."},{"issue":"9","key":"50_CR15","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1016\/j.sigpro.2009.03.025","volume":"89","author":"W Li","year":"2009","unstructured":"Li, W., Yuan, Y., Yu, N.: Passive detection of doctored jpeg image via block artifact grid extraction. Signal Process. 89(9), 1821\u20131829 (2009)","journal-title":"Signal Process."},{"issue":"11","key":"50_CR16","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin, Z., He, J., Tang, X., Tang, C.K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn. 42(11), 2492\u20132501 (2009)","journal-title":"Pattern Recogn."},{"issue":"10","key":"50_CR17","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27(10), 1497\u20131503 (2009)","journal-title":"Image Vis. Comput."},{"key":"50_CR18","unstructured":"Mazaheri, G., Mithun, N.C., Bappy, J.H., Roy-Chowdhury, A.K.: A skip connection architecture for localization of image manipulations. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 119\u2013129 (2019)"},{"key":"50_CR19","unstructured":"Ng, T.T., Hsu, J., Chang, S.F.: Columbia image splicing detection evaluation dataset. Columbia Univ CalPhotos Digit Libr, DVMM lab (2009)"},{"key":"50_CR20","unstructured":"Paszke, A., et al.: PyTorch: an imperative style, high-performance deep learning library. In: Proceedings of the International Conference on Neural Information Processing Systems (2019)"},{"key":"50_CR21","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1109\/LSP.2020.3026954","volume":"27","author":"Z Shi","year":"2020","unstructured":"Shi, Z., Shen, X., Chen, H., Lyu, Y.: Global semantic consistency network for image manipulation detection. IEEE Signal Process. Lett. 27, 1755\u20131759 (2020)","journal-title":"IEEE Signal Process. Lett."},{"key":"50_CR22","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"issue":"4","key":"50_CR23","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1007\/s11042-016-3795-2","volume":"76","author":"M Zampoglou","year":"2016","unstructured":"Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Large-scale evaluation of splicing localization algorithms for web images. Multimed. Tools Appl. 76(4), 4801\u20134834 (2016). https:\/\/doi.org\/10.1007\/s11042-016-3795-2","journal-title":"Multimed. Tools Appl."},{"key":"50_CR24","unstructured":"Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y., Bouwmeester, R., Spangenberg, J.: Web and social media image forensics for news professionals. In: Proceedings of the International AAAI Conference on Web and Social Media (2016)"},{"issue":"15","key":"50_CR25","doi-asserted-by":"publisher","first-page":"23377","DOI":"10.1007\/s11042-020-10211-1","volume":"80","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Zhang, J., Xu, S.: A hybrid convolutional architecture for accurate image manipulation localization at the pixel-level. Multimed. Tools Appl. 80(15), 23377\u201323392 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10211-1","journal-title":"Multimed. Tools Appl."}],"container-title":["Lecture Notes in Computer Science","MultiMedia Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27818-1_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:33:48Z","timestamp":1680172428000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27818-1_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031278174","9783031278181"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27818-1_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bergen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 January 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 January 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mmm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conftool Pro","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"267","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"86","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}