{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T02:29:02Z","timestamp":1772764142296,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031723346","type":"print"},{"value":"9783031723353","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-72335-3_17","type":"book-chapter","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T14:03:01Z","timestamp":1726495381000},"page":"248-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["EL-FDL: Improving Image Forgery Detection and\u00a0Localization via\u00a0Ensemble Learning"],"prefix":"10.1007","author":[{"given":"Bin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Feifan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jingge","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haonan","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Shaopeng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chaohao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,17]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Bi, X., Wei, Y., Xiao, B., Li, W.: RRU-Net: the ringed residual u-net for image splicing forgery detection. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019)","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"69472","DOI":"10.1109\/ACCESS.2018.2880433","volume":"6","author":"B Chen","year":"2018","unstructured":"Chen, B., Qi, X., Wang, Y., Zheng, Y., Shim, H.J., Shi, Y.Q.: An improved splicing localization method by fully convolutional networks. IEEE Access 6, 69472\u201369480 (2018)","journal-title":"IEEE Access"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016). https:\/\/api.semanticscholar.org\/CorpusID:4650265","DOI":"10.1145\/2939672.2939785"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Corvi, R., Cozzolino, D., Zingarini, G., Poggi, G., Nagano, K., Verdoliva, L.: On the detection of synthetic images generated by diffusion models. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135 (2023). https:\/\/doi.org\/10.1109\/ICASSP49357.2023.10095167","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Dong, C., Chen, X., Hu, R., Cao, J., Li, X.: MVSS-Net: multi-view multi-scale supervised networks for image manipulation detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1\u201314 (2022). https:\/\/doi.org\/10.1109\/TPAMI.2022.3180556","DOI":"10.1109\/TPAMI.2022.3180556"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database. In: IEEE China Summit International Conference on Signal and Information Processing, pp. 422\u2013426. IEEE (2013)","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"17_CR7","unstructured":"Duan, T., Anand, A., Ding, D.Y., Thai, K.K., Basu, S., Ng, A., Schuler, A.: NGBoost: natural gradient boosting for probabilistic prediction. In: International Conference on Machine Learning, pp. 2690\u20132700. PMLR (2020)"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119\u2013139 (1997)","journal-title":"J. Comput. Syst. Sci."},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29, 1189\u20131232 (2001)","journal-title":"Ann. Stat."},{"key":"17_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105151","volume":"115","author":"MA Ganaie","year":"2022","unstructured":"Ganaie, M.A., Hu, M., Malik, A.K., Tanveer, M., Suganthan, P.N.: Ensemble deep learning: a review. Eng. Appl. Artif. Intell. 115, 105151 (2022)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"17_CR11","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Neural Information Processing Systems (2014)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Guillaro, F., Cozzolino, D., Sud, A., Dufour, N., Verdoliva, L.: TruFor: leveraging all-round clues for trustworthy image forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 20606\u201320615 (2023)","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Hsu, Y., Chang, S.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE International Conference on Multimedia and Expo, pp. 549\u2013552. IEEE (2006)","DOI":"10.1109\/ICME.2006.262447"},{"issue":"8","key":"17_CR14","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s11263-022-01617-5","volume":"130","author":"MJ Kwon","year":"2022","unstructured":"Kwon, M.J., Nam, S.H., Yu, I.J., Lee, H.K., Kim, C.: Learning JPEG compression artifacts for image manipulation detection and localization. Int. J. Comput. Vision 130(8), 1875\u20131895 (2022). https:\/\/doi.org\/10.1007\/s11263-022-01617-5","journal-title":"Int. J. Comput. Vision"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, Y., Chen, J., Liu, X.: PSCC-Net: progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Trans. Circ. Syst. Video Technol. 32, 7505\u20137517(2022)","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"17_CR17","doi-asserted-by":"publisher","unstructured":"Mahfoudi, G., Tajini, B., Retraint, F., Morain-nicolier, F., Dugelay, J.L., Pic, M.: DEFACTO: image and face manipulation dataset. In: 2019 27th European Signal Processing Conference (EUSIPCO), pp.\u00a01\u20135 (2019). https:\/\/doi.org\/10.23919\/EUSIPCO.2019.8903181","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Cozzolino, D., Verdoliva, L.: Detection of GAN-generated fake images over social networks. In: 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) (2018)","DOI":"10.1109\/MIPR.2018.00084"},{"key":"17_CR19","unstructured":"Meng, Q.: LightGBM: a highly efficient gradient boosting decision tree. In: Neural Information Processing Systems (2017)"},{"key":"17_CR20","unstructured":"Nichol, A., et al.: GLIDE: towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741 (2021)"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Novoz\u00e1msk\u00fd, A., Mahdian, B., Saic, S.: Imd2020: A large-scale annotated dataset tailored for detecting manipulated images. In: 2020 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 71\u201380 (2020). https:\/\/doi.org\/10.1109\/WACVW50321.2020.9096940","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"17_CR22","unstructured":"Prokhorenkova, L., Gusev, G., Vorobev, A., Dorogush, A.V., Gulin, A.: CatBoost: unbiased boosting with categorical features. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"issue":"5","key":"17_CR23","doi-asserted-by":"publisher","first-page":"5366","DOI":"10.1007\/s10489-021-02696-6","volume":"52","author":"HM Rai","year":"2022","unstructured":"Rai, H.M., Chatterjee, K.: Hybrid CNN-LSTM deep learning model and ensemble technique for automatic detection of myocardial infarction using big ECG data. Appl. Intell. 52(5), 5366\u20135384 (2022)","journal-title":"Appl. Intell."},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Rajani, N.F., Mooney, R.J.: Stacking with auxiliary features. arXiv preprint arXiv:1605.08764 (2016)","DOI":"10.24963\/ijcai.2017\/367"},{"key":"17_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100357","volume":"39","author":"BA Tama","year":"2021","unstructured":"Tama, B.A., Lim, S.: Ensemble learning for intrusion detection systems: a systematic mapping study and cross-benchmark evaluation. Comput. Sci. Rev. 39, 100357 (2021)","journal-title":"Comput. Sci. Rev."},{"issue":"4","key":"17_CR26","doi-asserted-by":"publisher","first-page":"1453","DOI":"10.1109\/JBHI.2021.3083274","volume":"26","author":"M Tanveer","year":"2021","unstructured":"Tanveer, M., Rashid, A.H., Ganaie, M., Reza, M., Razzak, I., Hua, K.L.: Classification of Alzheimer\u2019s disease using ensemble of deep neural networks trained through transfer learning. IEEE J. Biomed. Health Inform. 26(4), 1453\u20131463 (2021)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Wang, B., Xue, B., Zhang, M.: Particle swarm optimisation for evolving deep neural networks for image classification by evolving and stacking transferable blocks. In: 2020 IEEE Congress on Evolutionary Computation (CEC), pp.\u00a01\u20138. IEEE (2020)","DOI":"10.1109\/CEC48606.2020.9185541"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Winkler, S.: Coverage \u2013 a novel database for copy-move forgery detection. In: IEEE International Conference on Image Processing (2016)","DOI":"10.1109\/ICIP.2016.7532339"},{"issue":"9","key":"17_CR29","doi-asserted-by":"publisher","first-page":"2839","DOI":"10.1016\/j.patcog.2015.03.009","volume":"48","author":"T-T Wong","year":"2015","unstructured":"Wong, T.-T.: Performance evaluation of classification algorithms by k-fold and leave-one-out cross validation. Pattern Recogn. 48(9), 2839\u20132846 (2015)","journal-title":"Pattern Recogn."},{"key":"17_CR30","unstructured":"Wu, H., Chen, Y., Zhou, J.: Rethinking image forgery detection via contrastive learning and unsupervised clustering. arXiv preprint arXiv:2308.09307 (2023)"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Wu, H., Zhou, J., Tian, J., Liu, J.: Robust image forgery detection over online social network shared images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13440\u201313449 (2022)","DOI":"10.1109\/CVPR52688.2022.01308"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., Natarajan, P.: BusterNet: detecting copy-move image forgery with source\/target localization. In: European Conference on Computer Vision (2018)","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Zhuang, P., Li, H., Yang, R., Huang, J.: ReLoc: a restoration-assisted framework for robust image tampering localization. IEEE Transactions on Information Forensics and Security (2023)","DOI":"10.1109\/TIFS.2023.3306181"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72335-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T14:18:18Z","timestamp":1726496298000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72335-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031723346","9783031723353"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72335-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"17 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lugano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}