{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:38:47Z","timestamp":1742974727061,"version":"3.40.3"},"publisher-location":"Cham","reference-count":75,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031732225"},{"type":"electronic","value":"9783031732232"}],"license":[{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73223-2_15","type":"book-chapter","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T18:48:04Z","timestamp":1731005284000},"page":"255-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Image Manipulation Detection with Implicit Neural Representation and\u00a0Limited Supervision"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9613-6698","authenticated-orcid":false,"given":"Zhenfei","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3763-691X","authenticated-orcid":false,"given":"Mingyang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2067-2763","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9325-5341","authenticated-orcid":false,"given":"Ming-Ching","family":"Chang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5477-4891","authenticated-orcid":false,"given":"Jun-Wei","family":"Hsieh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Bammey, Q., Gioi, R.G.V., Morel, J.M.: An adaptive neural network for unsupervised mosaic consistency analysis in image forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14194\u201314204 (2020)","DOI":"10.1109\/CVPR42600.2020.01420"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Bi, X., Wei, Y., Xiao, B., Li, W.: RRU-Net: the ringed residual u-net for image splicing forgery detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (2019)","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Bondi, L., Lameri, S., G\u00fcera, D., Bestagini, P., Delp, E.J., Tubaro, S.: Tampering detection and localization through clustering of camera-based CNN features. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1855\u20131864. IEEE (2017)","DOI":"10.1109\/CVPRW.2017.232"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Chen, K., Hong, L., Xu, H., Li, Z., Yeung, D.Y.: Multisiam: self-supervised multi-instance Siamese representation learning for autonomous driving. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7546\u20137554 (2021)","DOI":"10.1109\/ICCV48922.2021.00745"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Chen, X., Dong, C., Ji, J., Cao, J., Li, X.: Image manipulation detection by multi-view multiscale supervision. In: IEEE\/CVF International Conference on Computer Vision, pp. 14185\u201314193 (2021)","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y., Liu, S., Wang, X.: Learning continuous image representation with local implicit image function. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8628\u20138638 (2021)","DOI":"10.1109\/CVPR46437.2021.00852"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Z., et al.: Videoinr: learning video implicit neural representation for continuous space-time super-resolution. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2047\u20132057 (2022)","DOI":"10.1109\/CVPR52688.2022.00209"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Choi, C.H., Choi, J.H., Lee, H.K.: CFA pattern identification of digital cameras using intermediate value counting. In: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and Security, pp. 21\u201326 (2011)","DOI":"10.1145\/2037252.2037258"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2019","unstructured":"Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN based camera model fingerprint. IEEE Trans. Inf. Forensics Secur. 15, 144\u2013159 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR10","first-page":"8780","volume":"34","author":"P Dhariwal","year":"2021","unstructured":"Dhariwal, P., Nichol, A.: Diffusion models beat GANs on image synthesis. Adv. Neural. Inf. Process. Syst. 34, 8780\u20138794 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"15_CR11","unstructured":"Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database (2010). http:\/\/forensics.idealtest.org"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp. 422\u2013426. IEEE (2013)","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"15_CR13","unstructured":"Dupont, E., Goli\u0144ski, A., Alizadeh, M., Teh, Y.W., Doucet, A.: Coin: compression with implicit neural representations. arXiv preprint arXiv:2103.03123 (2021)"},{"issue":"8","key":"15_CR14","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.1109\/TNNLS.2019.2935975","volume":"31","author":"T Ergen","year":"2019","unstructured":"Ergen, T., Kozat, S.S.: Unsupervised anomaly detection with LSTM neural networks. IEEE Trans. Neural Networks Learn. Syst. 31(8), 3127\u20133141 (2019)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"15_CR15","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X., et\u00a0al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol.\u00a096, pp. 226\u2013231 (1996)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Feng, Y., Feng, Y., You, H., Zhao, X., Gao, Y.: MeshNet: mesh neural network for 3D shape representation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a033, pp. 8279\u20138286 (2019)","DOI":"10.1609\/aaai.v33i01.33018279"},{"issue":"5","key":"15_CR17","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara, P., Bianchi, T., De Rosa, A., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7(5), 1566\u20131577 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"15_CR18","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Guan, H., et al.: MFC datasets: large-scale benchmark datasets for media forensic challenge evaluation. In: IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops, pp. 63\u201372. IEEE (2019)","DOI":"10.1109\/WACVW.2019.00018"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Guillaro, F., Cozzolino, D., Sud, A., Dufour, N., Verdoliva, L.: Trufor: leveraging all-round clues for trustworthy image forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20606\u201320615 (2023)","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Guo, X., Liu, X., Ren, Z., Grosz, S., Masi, I., Liu, X.: Hierarchical fine-grained image forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3155\u20133165 (2023)","DOI":"10.1109\/CVPR52729.2023.00308"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R.: Momentum contrast for unsupervised visual representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9729\u20139738 (2020)","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 549\u2013552. IEEE (2006)","DOI":"10.1109\/ICME.2006.262447"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-030-58589-1_19","volume-title":"Computer Vision \u2013 ECCV 2020","author":"X Hu","year":"2020","unstructured":"Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: SPAN: spatial pyramid attention network for image manipulation localization. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12366, pp. 312\u2013328. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58589-1_19"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Ji, K., Chen, F., Guo, X., Xu, Y., Wang, J., Chen, J.: Uncertainty-guided learning for improving image manipulation detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22456\u201322465 (2023)","DOI":"10.1109\/ICCV51070.2023.02052"},{"key":"15_CR27","unstructured":"Koch, G., Zemel, R., Salakhutdinov, R., et\u00a0al.: Siamese neural networks for one-shot image recognition. In: ICML Deep Learning Workshop, vol.\u00a02. Lille (2015)"},{"key":"15_CR28","unstructured":"Kwan, H.M., Gao, G., Zhang, F., Gower, A., Bull, D.: Hinerv: video compression with hierarchical encoding-based neural representation. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Kwon, M.J., Nam, S.H., Yu, I.J., Lee, H.K., Kim, C.: Learning jpeg compression artifacts for image manipulation detection and localization. In: International Journal of Computer Vision, pp. 1875\u20131895 (2022)","DOI":"10.1007\/s11263-022-01617-5"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Li, J., Chen, Y., Xing, Y.: Memory mechanism for unsupervised anomaly detection. In: The 39th Conference on Uncertainty in Artificial Intelligence (2023)","DOI":"10.3233\/FAIA240822"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Li, S., Xia, X., Ge, S., Liu, T.: Selective-supervised contrastive learning with noisy labels. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 316\u2013325 (2022)","DOI":"10.1109\/CVPR52688.2022.00041"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Liu, D., Yu, J.: Otsu method and k-means. In: 2009 Ninth International Conference on Hybrid Intelligent Systems, vol.\u00a01, pp. 344\u2013349. IEEE (2009)","DOI":"10.1109\/HIS.2009.74"},{"issue":"11","key":"15_CR33","doi-asserted-by":"publisher","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","volume":"32","author":"X Liu","year":"2022","unstructured":"Liu, X., Liu, Y., Chen, J., Liu, X.: PSCC-Net: progressive Spatio-channel correlation network for image manipulation detection and localization. IEEE Trans. Circuits Syst. Video Technol. 32(11), 7505\u20137517 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"15_CR34","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28(2), 129\u2013137 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"15_CR35","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101 (2017)"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Lu, X., Wang, W., Ma, C., Shen, J., Shao, L., Porikli, F.: See more, know more: Unsupervised video object segmentation with co-attention siamese networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3623\u20133632 (2019)","DOI":"10.1109\/CVPR.2019.00374"},{"key":"15_CR37","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/s11263-013-0688-y","volume":"110","author":"S Lyu","year":"2014","unstructured":"Lyu, S., Pan, X., Zhang, X.: Exposing region splicing forgeries with blind local noise estimation. Int. J. Comput. Vision 110, 202\u2013221 (2014)","journal-title":"Int. J. Comput. Vision"},{"issue":"10","key":"15_CR38","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27(10), 1497\u20131503 (2009)","journal-title":"Image Vis. Comput."},{"issue":"1","key":"15_CR39","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/3503250","volume":"65","author":"B Mildenhall","year":"2021","unstructured":"Mildenhall, B., Srinivasan, P.P., Tancik, M., Barron, J.T., Ramamoorthi, R., Ng, R.: NeRF: representing scenes as neural radiance fields for view synthesis. Commun. ACM 65(1), 99\u2013106 (2021)","journal-title":"Commun. ACM"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Molaei, A., et al.: Implicit neural representation in medical imaging: a comparative survey. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 2381\u20132391 (2023)","DOI":"10.1109\/ICCVW60793.2023.00252"},{"key":"15_CR41","doi-asserted-by":"publisher","first-page":"5397","DOI":"10.1109\/TIFS.2021.3129654","volume":"16","author":"Y Niu","year":"2021","unstructured":"Niu, Y., Tondi, B., Zhao, Y., Ni, R., Barni, M.: Image splicing detection, localization and attribution via jpeg primary quantization matrix estimation and clustering. IEEE Trans. Inf. Forensics Secur. 16, 5397\u20135412 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Novozamsky, A., Mahdian, B., Saic, S.: Imd2020: a large-scale annotated dataset tailored for detecting manipulated images. In: IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops, pp. 71\u201380 (2020)","DOI":"10.1109\/WACVW50321.2020.9096940"},{"issue":"1","key":"15_CR43","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu, N.: A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man Cybern. 9(1), 62\u201366 (1979)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"Pan, X., Zhang, X., Lyu, S.: Exposing image forgery with blind noise estimation. In: Proceedings of the thirteenth ACM Multimedia Workshop on Multimedia and Security, pp. 15\u201320 (2011)","DOI":"10.1145\/2037252.2037256"},{"key":"15_CR45","unstructured":"Paszke, A., et\u00a0al.: Pytorch: an imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"15_CR46","unstructured":"Pathak, D., Shelhamer, E., Long, J., Darrell, T.: Fully convolutional multi-class multiple instance learning. arXiv preprint arXiv:1412.7144 (2014)"},{"issue":"2","key":"15_CR47","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/TIP.2012.2221728","volume":"22","author":"S Pyatykh","year":"2012","unstructured":"Pyatykh, S., Hesser, J., Zheng, L.: Image noise level estimation by principal component analysis. IEEE Trans. Image Process. 22(2), 687\u2013699 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"15_CR48","doi-asserted-by":"crossref","unstructured":"Qian, Y., Hong, X., Guo, Z., Arandjelovi\u0107, O., Donovan, C.R.: Semi-supervised crowd counting with contextual modeling: facilitating holistic understanding of crowd scenes. IEEE Trans. Circuits Syst. Video Technol. (2024)","DOI":"10.1109\/TCSVT.2024.3392500"},{"key":"15_CR49","doi-asserted-by":"crossref","unstructured":"Qiao, T., Zhang, J., Xu, D., Tao, D.: MirrorGAN: learning text-to-image generation by redescription. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1505\u20131514 (2019)","DOI":"10.1109\/CVPR.2019.00160"},{"issue":"7","key":"15_CR50","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1109\/TPAMI.2018.2846566","volume":"41","author":"F Radenovi\u0107","year":"2018","unstructured":"Radenovi\u0107, F., Tolias, G., Chum, O.: Fine-tuning CNN image retrieval with no human annotation. IEEE Trans. Pattern Anal. Mach. Intell. 41(7), 1655\u20131668 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR51","doi-asserted-by":"crossref","unstructured":"Shi, J., Xu, N., Bui, T., Dernoncourt, F., Wen, Z., Xu, C.: A benchmark and baseline for language-driven image editing. In: Proceedings of the Asian Conference on Computer Vision (2020)","DOI":"10.1007\/978-3-030-69544-6_38"},{"key":"15_CR52","doi-asserted-by":"crossref","unstructured":"Smucny, J., Shi, G., Lesh, T.A., Carter, C.S., Davidson, I.: Data augmentation with mixup: Enhancing performance of a functional neuroimaging-based prognostic deep learning classifier in recent onset psychosis. NeuroImage: Clinical 36, 103214 (2022)","DOI":"10.1016\/j.nicl.2022.103214"},{"key":"15_CR53","doi-asserted-by":"crossref","unstructured":"Tao, C., et al.: Siamese image modeling for self-supervised vision representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2132\u20132141 (2023)","DOI":"10.1109\/CVPR52729.2023.00212"},{"key":"15_CR54","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: ObjectFormer for image manipulation detection and localization. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2364\u20132373 (2022)","DOI":"10.1109\/CVPR52688.2022.00240"},{"key":"15_CR55","doi-asserted-by":"crossref","unstructured":"Wang, L., et al.: Learning to detect salient objects with image-level supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 136\u2013145 (2017)","DOI":"10.1109\/CVPR.2017.404"},{"issue":"11","key":"15_CR56","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1109\/TPAMI.2016.2636150","volume":"39","author":"Y Wei","year":"2016","unstructured":"Wei, Y., et al.: STC: a simple to complex framework for weakly-supervised semantic segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 39(11), 2314\u20132320 (2016)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR57","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., Winkler, S.: Coverage - a novel database for copy-move forgery detection. In: IEEE International Conference on Image Processing (ICIP) (2016)","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"15_CR58","unstructured":"Wu, H., Chen, Y., Zhou, J.: Rethinking image forgery detection via contrastive learning and unsupervised clustering. arXiv preprint arXiv:2308.09307 (2023)"},{"key":"15_CR59","doi-asserted-by":"crossref","unstructured":"Wu, H., Zhou, J., Tian, J., Liu, J.: Robust image forgery detection over online social network shared images. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13440\u201313449 (2022)","DOI":"10.1109\/CVPR52688.2022.01308"},{"key":"15_CR60","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: Mantra-Net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9543\u20139552 (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"15_CR61","doi-asserted-by":"crossref","unstructured":"Xu, T., et al.: AttnGAN: fine-grained text to image generation with attentional generative adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1316\u20131324 (2018)","DOI":"10.1109\/CVPR.2018.00143"},{"key":"15_CR62","doi-asserted-by":"crossref","unstructured":"Yang, C., Li, H., Lin, F., Jiang, B., Zhao, H.: Constrained R-CNN: a general image manipulation detection model. In: IEEE International Conference on Multimedia and Expo (ICME), pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/ICME46284.2020.9102825"},{"key":"15_CR63","doi-asserted-by":"crossref","unstructured":"Yang, S., Ding, M., Wu, Y., Li, Z., Zhang, J.: Implicit neural representation for cooperative low-light image enhancement. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 12918\u201312927 (2023)","DOI":"10.1109\/ICCV51070.2023.01187"},{"key":"15_CR64","unstructured":"Yoon, J., Yu, S., Bansal, M.: Raccoon: remove, add, and change video content with auto-generated narratives. arXiv preprint arXiv:2405.18406 (2024)"},{"key":"15_CR65","doi-asserted-by":"crossref","unstructured":"Zhai, Y., Luan, T., Doermann, D., Yuan, J.: Towards generic image manipulation detection with weakly-supervised self-consistency learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22390\u201322400 (2023)","DOI":"10.1109\/ICCV51070.2023.02046"},{"key":"15_CR66","doi-asserted-by":"crossref","unstructured":"Zhang, B., Tang, J., Niessner, M., Wonka, P.: 3dshape2vecset: a 3D shape representation for neural fields and generative diffusion models. arXiv preprint arXiv:2301.11445 (2023)","DOI":"10.1145\/3592442"},{"key":"15_CR67","unstructured":"Zhang, H., et al.: Nerd: neural representation of distribution for medical image segmentation. arXiv preprint arXiv:2103.04020 (2021)"},{"key":"15_CR68","unstructured":"Zhang, K., Mo, L., Chen, W., Sun, H., Su, Y.: Magicbrush: a manually annotated dataset for instruction-guided image editing. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"},{"issue":"8","key":"15_CR69","first-page":"4388","volume":"44","author":"L Zhang","year":"2021","unstructured":"Zhang, L., Bao, C., Ma, K.: Self-distillation: towards efficient and compact neural networks. IEEE Trans. Pattern Anal. Mach. Intell. 44(8), 4388\u20134403 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR70","doi-asserted-by":"crossref","unstructured":"Zhang, L., Rao, A., Agrawala, M.: Adding conditional control to text-to-image diffusion models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 3836\u20133847 (2023)","DOI":"10.1109\/ICCV51070.2023.00355"},{"key":"15_CR71","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/978-3-031-20056-4_27","volume-title":"ECCV 2022","author":"W Zhang","year":"2022","unstructured":"Zhang, W., Pang, J., Chen, K., Loy, C.C.: Dense Siamese network for dense unsupervised learning. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13690, pp. 464\u2013480. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20056-4_27"},{"key":"15_CR72","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Bui, T.D.: Attention-based selection strategy for weakly supervised object localization. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 10305\u201310311. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412173"},{"key":"15_CR73","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Chang, M.C.: Two-stage dual augmentation with clip for improved text-to-sketch synthesis. In: 2023 IEEE 6th International Conference on Multimedia Information Processing and Retrieval (MIPR), pp.\u00a01\u20136. IEEE (2023)","DOI":"10.1109\/MIPR59079.2023.00027"},{"key":"15_CR74","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Chang, M.C., Bui, T.D.: Improving class activation map for weakly supervised object localization. In: ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2624\u20132628. IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9747058"},{"key":"15_CR75","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Li, M., Chang, M.C.: A new benchmark and model for challenging image manipulation detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a038, pp. 7405\u20137413 (2024)","DOI":"10.1609\/aaai.v38i7.28571"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73223-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:05:59Z","timestamp":1731006359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73223-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,8]]},"ISBN":["9783031732225","9783031732232"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73223-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,8]]},"assertion":[{"value":"8 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}