{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:47:06Z","timestamp":1765889226323,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031515828"},{"type":"electronic","value":"9783031515835"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51583-5_11","type":"book-chapter","created":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T18:03:41Z","timestamp":1704391421000},"page":"185-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Spliced Region Detection and\u00a0Localization in\u00a0Digital Images Based on\u00a0CNN Learning Guided by\u00a0Color Transitions and\u00a0Surface Texture"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2606-8786","authenticated-orcid":false,"given":"Debjit","family":"Das","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7350-3442","authenticated-orcid":false,"given":"Ranit","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6826-940X","authenticated-orcid":false,"given":"Ruchira","family":"Naskar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,5]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1080\/00450618.2016.1153711","volume":"49","author":"K Asghar","year":"2017","unstructured":"Asghar, K., Habib, Z., Hussain, M.: Copy-move and splicing image forgery detection and localization techniques: a review. Aust. J. Forensic Sci. 49(3), 281\u2013307 (2017)","journal-title":"Aust. J. Forensic Sci."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Bi, X., Wei, Y., Xiao, B., Li, W.: RRU-Net: the ringed residual U-Net for image splicing forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (2019)","DOI":"10.1109\/CVPRW.2019.00010"},{"issue":"6","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"11_CR4","doi-asserted-by":"publisher","first-page":"5015","DOI":"10.1007\/s00521-021-06329-4","volume":"35","author":"H Ding","year":"2023","unstructured":"Ding, H., Chen, L., Tao, Q., Fu, Z., Dong, L., Cui, X.: DCU-Net: a dual-channel U-shaped network for image splicing forgery detection. Neural Comput. Appl. 35(7), 5015\u20135031 (2023). https:\/\/doi.org\/10.1007\/s00521-021-06329-4","journal-title":"Neural Comput. Appl."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N.: Image tamper detection based on demosaicing artifacts. In: 2009 16th IEEE International Conference on Image Processing (ICIP), pp. 1497\u20131500. IEEE (2009)","DOI":"10.1109\/ICIP.2009.5414611"},{"issue":"2","key":"11_CR6","first-page":"443","volume":"34","author":"M Habibi","year":"2021","unstructured":"Habibi, M., Hassanpour, H.: Splicing image forgery detection and localization based on color edge inconsistency using statistical dispersion measures. Int. J. Eng. 34(2), 443\u2013451 (2021)","journal-title":"Int. J. Eng."},{"key":"11_CR7","unstructured":"Kniaz, V.V., Knyaz, V., Remondino, F.: The point where reality meets fantasy: mixed adversarial generators for image splice detection. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Kwon, M.J., Yu, I.J., Nam, S.H., Lee, H.K.: CAT-Net: compression artifact tracing network for detection and localization of image splicing. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 375\u2013384 (2021)","DOI":"10.1109\/WACV48630.2021.00042"},{"issue":"11","key":"11_CR9","doi-asserted-by":"publisher","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","volume":"32","author":"X Liu","year":"2022","unstructured":"Liu, X., Liu, Y., Chen, J., Liu, X.: PSCC-Net: progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Trans. Circ. Syst. Video Technol. 32(11), 7505\u20137517 (2022)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"3","key":"11_CR10","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480\u2013491 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1109\/TIFS.2019.2935913","volume":"15","author":"F Matern","year":"2019","unstructured":"Matern, F., Riess, C., Stamminger, M.: Gradient-based illumination description for image forgery detection. IEEE Trans. Inf. Forensics Secur. 15, 1303\u20131317 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TIFS.2019.2924552","volume":"15","author":"O Mayer","year":"2019","unstructured":"Mayer, O., Stamm, M.C.: Forensic similarity for digital images. IEEE Trans. Inf. Forensics Secur. 15, 1331\u20131346 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-981-13-6351-1_14","volume-title":"Data, Engineering and Applications","author":"KB Meena","year":"2019","unstructured":"Meena, K.B., Tyagi, V.: Image forgery detection: survey and future directions. In: Shukla, R.K., Agrawal, J., Sharma, S., Singh Tomer, G. (eds.) Data, Engineering and Applications, pp. 163\u2013194. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-6351-1_14"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2015","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28"},{"key":"11_CR15","unstructured":"Rony, J., Belharbi, S., Dolz, J., Ayed, I.B., McCaffrey, L., Granger, E.: Deep weakly-supervised learning methods for classification and localization in histology images: a survey. arXiv preprint arXiv:1909.03354 (2019)"},{"issue":"4","key":"11_CR16","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/TPAMI.2016.2572683","volume":"39","author":"E Shelhamer","year":"2017","unstructured":"Shelhamer, E., Long, J., Darrell, T.: Fully convolutional networks for semantic segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 39(4), 640\u2013651 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"11_CR17","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva, L.: Media forensics and deepfakes: an overview. IEEE J. Sel. Top. Sig. Process. 14(5), 910\u2013932 (2020)","journal-title":"IEEE J. Sel. Top. Sig. Process."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., Natarajan, P.: Image copy-move forgery detection via an end-to-end deep neural network. In: 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1907\u20131915. IEEE (2018)","DOI":"10.1109\/WACV.2018.00211"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9543\u20139552 (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.ins.2019.09.038","volume":"511","author":"B Xiao","year":"2020","unstructured":"Xiao, B., Wei, Y., Bi, X., Li, W., Ma, J.: Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Inf. Sci. 511, 172\u2013191 (2020)","journal-title":"Inf. Sci."},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"4259","DOI":"10.1007\/s10462-019-09792-7","volume":"53","author":"M Zhang","year":"2020","unstructured":"Zhang, M., Zhou, Y., Zhao, J., Man, Y., Liu, B., Yao, R.: A survey of semi-and weakly supervised semantic segmentation of images. Artif. Intell. Rev. 53, 4259\u20134288 (2020). https:\/\/doi.org\/10.1007\/s10462-019-09792-7","journal-title":"Artif. Intell. Rev."},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, R., Ni, J.: A dense U-Net with cross-layer intersection for detection and localization of image forgery. In: ICASSP 2020\u20132020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2982\u20132986. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9054068"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51583-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T18:06:57Z","timestamp":1704391617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51583-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031515828","9783031515835"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51583-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Roorkee","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iitr.ac.in\/space2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}