{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:29:19Z","timestamp":1775579359038,"version":"3.50.1"},"publisher-location":"Cham","reference-count":75,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031732461","type":"print"},{"value":"9783031732478","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73247-8_2","type":"book-chapter","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T12:02:20Z","timestamp":1730376140000},"page":"18-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Noise-Assisted Prompt Learning for\u00a0Image Forgery Detection and\u00a0Localization"],"prefix":"10.1007","author":[{"given":"Dong","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiaying","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xueyang","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yidi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiawei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zheng-Jun","family":"Zha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1109\/TCSVT.2020.2993004","volume":"31","author":"M Aloraini","year":"2020","unstructured":"Aloraini, M., Sharifzadeh, M., Schonfeld, D.: Sequential and patch analyses for object removal video forgery detection and localization. IEEE Trans. Circuits Syst. Video Technol. 31(3), 917\u2013930 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Amerini, I., Uricchio, T., Ballan, L., Caldelli, R.: Localization of jpeg double compression through multi-domain convolutional neural networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1865\u20131871. IEEE (2017)","DOI":"10.1109\/CVPRW.2017.233"},{"issue":"11","key":"2_CR3","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691\u20132706 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Bondi, L., et\u00a0al.: Tampering detection and localization through clustering of camera-based CNN features. In: CVPR Workshops, vol.\u00a02 (2017)","DOI":"10.1109\/CVPRW.2017.232"},{"key":"2_CR5","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown, T., et al.: Language models are few-shot learners. Adv. Neural. Inf. Process. Syst. 33, 1877\u20131901 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-030-58542-6_31","volume-title":"Computer Vision \u2013 ECCV 2020","author":"J Chen","year":"2020","unstructured":"Chen, J., Sun, Y., Liu, Q., Huang, R.: Learning memory augmented cascading network for compressed sensing of images. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12367, pp. 513\u2013529. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58542-6_31"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Chen, X., Dong, C., Ji, J., Cao, J., Li, X.: Image manipulation detection by multi-view multi-scale supervision. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 14185\u201314193 (2021)","DOI":"10.1109\/ICCV48922.2021.01392"},{"issue":"11","key":"2_CR8","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","volume":"10","author":"D Cozzolino","year":"2015","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284\u20132297 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: SpliceBuster: a new blind image splicing detector. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20136. IEEE (2015)","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"2_CR10","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-981-16-7621-5_11","volume-title":"Multimedia Forensics","author":"D Cozzolino","year":"2022","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Data-driven digital integrity verification. In: Sencar, H.T., Verdoliva, L., Memon, N. (eds.) Multimedia Forensics. Advances in Computer Vision and Pattern Recognition, pp. 281\u2013311. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-7621-5_11"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2019","unstructured":"Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN-based camera model fingerprint. IEEE Trans. Inf. Forensics Secur. 15, 144\u2013159 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp. 422\u2013426. IEEE (2013)","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"2_CR13","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth 16$$\\times $$16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Dumoulin, V., et al.: Feature-wise transformations. Distill 3(7), e11 (2018)","DOI":"10.23915\/distill.00011"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"D\u2019Amiano, L., Cozzolino, D., Poggi, G., Verdoliva, L.: A patchmatch-based dense-field algorithm for video copy\u2013move detection and localization. IEEE Trans. Circuits Syst. Video Technol. 29(3), 669\u2013682 (2018)","DOI":"10.1109\/TCSVT.2018.2804768"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Gao, T., Fisch, A., Chen, D.: Making pre-trained language models better few-shot learners. arXiv preprint arXiv:2012.15723 (2020)","DOI":"10.18653\/v1\/2021.acl-long.295"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Gu, Y., Han, X., Liu, Z., Huang, M.: PPT: pre-trained prompt tuning for few-shot learning. arXiv preprint arXiv:2109.04332 (2021)","DOI":"10.18653\/v1\/2022.acl-long.576"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Guan, H., et al.: MFC datasets: large-scale benchmark datasets for media forensic challenge evaluation. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 63\u201372. IEEE (2019)","DOI":"10.1109\/WACVW.2019.00018"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Guillaro, F., Cozzolino, D., Sud, A., Dufour, N., Verdoliva, L.: TruFor: leveraging all-round clues for trustworthy image forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20606\u201320615 (2023)","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Guo, X., Liu, X., Ren, Z., Grosz, S., Masi, I., Liu, X.: Hierarchical fine-grained image forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3155\u20133165 (2023)","DOI":"10.1109\/CVPR52729.2023.00308"},{"key":"2_CR21","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840\u20136851 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 549\u2013552. IEEE (2006)","DOI":"10.1109\/ICME.2006.262447"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-030-58589-1_19","volume-title":"Computer Vision \u2013 ECCV 2020","author":"X Hu","year":"2020","unstructured":"Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: SPAN: spatial pyramid attention network for image manipulation localization. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12366, pp. 312\u2013328. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58589-1_19"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Huh, M., Liu, A., Owens, A., Efros, A.A.: Fighting fake news: Image splice detection via learned self-consistency. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 101\u2013117 (2018)","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Islam, A., Long, C., Basharat, A., Hoogs, A.: DOA-GAN: dual-order attentive generative adversarial network for image copy-move forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4676\u20134685 (2020)","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"2_CR26","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1162\/tacl_a_00324","volume":"8","author":"Z Jiang","year":"2020","unstructured":"Jiang, Z., Xu, F.F., Araki, J., Neubig, G.: How can we know what language models know? Trans. Assoc. Comput. Linguist. 8, 423\u2013438 (2020)","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"2_CR27","unstructured":"Jiao, S., Wei, Y., Wang, Y., Zhao, Y., Shi, H.: Learning mask-aware CLIP representations for zero-shot segmentation. Adv. Neural Inf. Process. Syst. 36 (2024)"},{"key":"2_CR28","unstructured":"Kniaz, V.V., Knyaz, V., Remondino, F.: The point where reality meets fantasy: mixed adversarial generators for image splice detection. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"2_CR29","unstructured":"Kuo, W., Cui, Y., Gu, X., Piergiovanni, A., Angelova, A.: F-VLM: open-vocabulary object detection upon frozen vision and language models. arXiv preprint arXiv:2209.15639 (2022)"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Lester, B., Al-Rfou, R., Constant, N.: The power of scale for parameter-efficient prompt tuning. arXiv preprint arXiv:2104.08691 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.243"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Li, D., Zhu, J., Wang, M., Liu, J., Fu, X., Zha, Z.J.: Edge-aware regional message passing controller for image forgery localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8222\u20138232 (2023)","DOI":"10.1109\/CVPR52729.2023.00795"},{"key":"2_CR32","unstructured":"Li, L., Bao, J., Yang, H., Chen, D., Wen, F.: FaceShifter: towards high fidelity and occlusion aware face swapping. arXiv preprint arXiv:1912.13457 (2019)"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Li, X.L., Liang, P.: Prefix-tuning: optimizing continuous prompts for generation. arXiv preprint arXiv:2101.00190 (2021)","DOI":"10.18653\/v1\/2021.acl-long.353"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Liang, Z., Li, C., Zhou, S., Feng, R., Loy, C.C.: Iterative prompt learning for unsupervised backlit image enhancement. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8094\u20138103 (2023)","DOI":"10.1109\/ICCV51070.2023.00743"},{"key":"2_CR35","doi-asserted-by":"publisher","first-page":"109026","DOI":"10.1016\/j.patcog.2022.109026","volume":"133","author":"X Lin","year":"2023","unstructured":"Lin, X., et al.: Image manipulation detection by multiple tampering traces and edge artifact enhancement. Pattern Recogn. 133, 109026 (2023)","journal-title":"Pattern Recogn."},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, Y., Chen, J., Liu, X.: PSCC-Net: progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Trans. Circuits Syst. Video Technol. (2022)","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"L\u00fcddecke, T., Ecker, A.: Image segmentation using text and image prompts. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7086\u20137096 (2022)","DOI":"10.1109\/CVPR52688.2022.00695"},{"issue":"2","key":"2_CR38","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/s11263-013-0688-y","volume":"110","author":"S Lyu","year":"2014","unstructured":"Lyu, S., Pan, X., Zhang, X.: Exposing region splicing forgeries with blind local noise estimation. Int. J. Comput. Vision 110(2), 202\u2013221 (2014)","journal-title":"Int. J. Comput. Vision"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Mou, C., et al.: T2I-adapter: learning adapters to dig out more controllable ability for text-to-image diffusion models. arXiv preprint arXiv:2302.08453 (2023)","DOI":"10.1609\/aaai.v38i5.28226"},{"key":"2_CR40","unstructured":"Nichol, A., et al.: GLIDE: towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741 (2021)"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Novozamsky, A., Mahdian, B., Saic, S.: IMD2020: a large-scale annotated dataset tailored for detecting manipulated images. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops, pp. 71\u201380 (2020)","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Patashnik, O., Wu, Z., Shechtman, E., Cohen-Or, D., Lischinski, D.: StyleCLIP: text-driven manipulation of StyleGAN imagery. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 2085\u20132094 (2021)","DOI":"10.1109\/ICCV48922.2021.00209"},{"key":"2_CR43","unstructured":"Radford, A., et\u00a0al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning, pp. 8748\u20138763. PMLR (2021)"},{"issue":"8","key":"2_CR44","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford, A., et al.: Language models are unsupervised multitask learners. OpenAI blog 1(8), 9 (2019)","journal-title":"OpenAI blog"},{"key":"2_CR45","unstructured":"Ramesh, A., Dhariwal, P., Nichol, A., Chu, C., Chen, M.: Hierarchical text-conditional image generation with CLIP latents. 7 (2022). https:\/\/arxiv.org\/abs\/2204.06125"},{"key":"2_CR46","doi-asserted-by":"crossref","unstructured":"Rao, Y., et al.: DenseCLIP: language-guided dense prediction with context-aware prompting. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18082\u201318091 (2022)","DOI":"10.1109\/CVPR52688.2022.01755"},{"key":"2_CR47","doi-asserted-by":"publisher","first-page":"108051","DOI":"10.1016\/j.sigpro.2021.108051","volume":"183","author":"Y Rao","year":"2021","unstructured":"Rao, Y., Ni, J., Xie, H.: Multi-semantic CRF-based attention model for image forgery detection and localization. Signal Process. 183, 108051 (2021)","journal-title":"Signal Process."},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"2_CR49","first-page":"36479","volume":"35","author":"C Saharia","year":"2022","unstructured":"Saharia, C., et al.: Photorealistic text-to-image diffusion models with deep language understanding. Adv. Neural. Inf. Process. Syst. 35, 36479\u201336494 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Shin, T., Razeghi, Y., Logan\u00a0IV, R.L., Wallace, E., Singh, S.: AutoPrompt: eliciting knowledge from language models with automatically generated prompts. arXiv preprint arXiv:2010.15980 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.346"},{"key":"2_CR51","doi-asserted-by":"crossref","unstructured":"Sun, Z., Jiang, H., Wang, D., Li, X., Cao, J.: SAFL-net: semantic-agnostic feature learning network with auxiliary plugins for image manipulation detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22424\u201322433 (2023)","DOI":"10.1109\/ICCV51070.2023.02049"},{"key":"2_CR52","unstructured":"Touvron, H., Cord, M., Douze, M., Massa, F., Sablayrolles, A., J\u00e9gou, H.: Training data-efficient image transformers & distillation through attention. In: International Conference on Machine Learning, pp. 10347\u201310357. PMLR (2021)"},{"key":"2_CR53","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"2_CR54","doi-asserted-by":"crossref","unstructured":"Wang, J., Chan, K.C., Loy, C.C.: Exploring clip for assessing the look and feel of images. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 2555\u20132563 (2023)","DOI":"10.1609\/aaai.v37i2.25353"},{"key":"2_CR55","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: ObjectFormer for image manipulation detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2364\u20132373 (2022)","DOI":"10.1109\/CVPR52688.2022.00240"},{"key":"2_CR56","doi-asserted-by":"crossref","unstructured":"Wang, T., Chow, K.P.: Noise based deepfake detection via multi-head relative-interaction. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 14548\u201314556 (2023)","DOI":"10.1609\/aaai.v37i12.26701"},{"key":"2_CR57","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., Winkler, S.: Coverage\u2013a novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 161\u2013165. IEEE (2016)","DOI":"10.1109\/ICIP.2016.7532339"},{"issue":"3","key":"2_CR58","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1109\/TCSVT.2021.3075039","volume":"32","author":"H Wu","year":"2021","unstructured":"Wu, H., Zhou, J.: IID-net: image inpainting detection network via neural architecture search and attention. IEEE Trans. Circuits Syst. Video Technol. 32(3), 1172\u20131185 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., Natarajan, P.: Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. In: Proceedings of the 25th ACM International Conference on Multimedia, pp. 1480\u20131502 (2017)","DOI":"10.1145\/3123266.3123411"},{"key":"2_CR60","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., Natarajan, P.: BusterNet: detecting copy-move image forgery with source\/target localization. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 168\u2013184 (2018)","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"2_CR61","doi-asserted-by":"crossref","unstructured":"Wu, Y., Abd-Almageed, W., Natarajan, P.: Image copy-move forgery detection via an end-to-end deep neural network. In: 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1907\u20131915. IEEE (2018)","DOI":"10.1109\/WACV.2018.00211"},{"key":"2_CR62","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: ManTra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9543\u20139552 (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"2_CR63","doi-asserted-by":"crossref","unstructured":"Xu, M., Zhang, Z., Wei, F., Hu, H., Bai, X.: Side adapter network for open-vocabulary semantic segmentation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2945\u20132954 (2023)","DOI":"10.1109\/CVPR52729.2023.00288"},{"issue":"10","key":"2_CR64","doi-asserted-by":"publisher","first-page":"4131","DOI":"10.1109\/TCSVT.2020.3046240","volume":"31","author":"Q Yang","year":"2020","unstructured":"Yang, Q., Yu, D., Zhang, Z., Yao, Y., Chen, L.: Spatiotemporal trident networks: detection and localization of object removal tampering in video passive forensics. IEEE Trans. Circuits Syst. Video Technol. 31(10), 4131\u20134144 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-031-20077-9_7","volume-title":"Computer Vision \u2013 ECCV 2022","author":"Y Zang","year":"2022","unstructured":"Zang, Y., Li, W., Zhou, K., Huang, C., Loy, C.C.: Open-vocabulary DETR with conditional matching. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13669, pp. 106\u2013122. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20077-9_7"},{"key":"2_CR66","doi-asserted-by":"crossref","unstructured":"Zhang, F., Liu, J., Xie, J., Zhang, Q., Xu, Y., Zha, Z.J.: ESCNet: entity-enhanced and stance checking network for multi-modal fact-checking. In: Proceedings of the ACM on Web Conference 2024, pp. 2429\u20132440 (2024)","DOI":"10.1145\/3589334.3645455"},{"key":"2_CR67","doi-asserted-by":"crossref","unstructured":"Zhang, F., Liu, J., Zhang, Q., Sun, E., Xie, J., Zha, Z.J.: ECENet: explainable and context-enhanced network for muti-modal fact verification. In: Proceedings of the 31st ACM International Conference on Multimedia, pp. 1231\u20131240 (2023)","DOI":"10.1145\/3581783.3612183"},{"key":"2_CR68","doi-asserted-by":"crossref","unstructured":"Zhang, L., Rao, A., Agrawala, M.: Adding conditional control to text-to-image diffusion models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 3836\u20133847 (2023)","DOI":"10.1109\/ICCV51070.2023.00355"},{"key":"2_CR69","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhu, G., Wu, L., Kwong, S., Zhang, H., Zhou, Y.: Multi-task se-network for image splicing localization. IEEE Trans. Circuits Syst. Video Technol. (2021)","DOI":"10.1109\/TCSVT.2021.3123829"},{"key":"2_CR70","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-031-19815-1_40","volume-title":"Computer Vision \u2013 ECCV 2022","author":"C Zhou","year":"2022","unstructured":"Zhou, C., Loy, C.C., Dai, B.: Extract free dense labels from CLIP. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 1368, pp. 696\u2013712. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19815-1_40"},{"issue":"9","key":"2_CR71","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1007\/s11263-022-01653-1","volume":"130","author":"K Zhou","year":"2022","unstructured":"Zhou, K., Yang, J., Loy, C.C., Liu, Z.: Learning to prompt for vision-language models. Int. J. Comput. Vision 130(9), 2337\u20132348 (2022)","journal-title":"Int. J. Comput. Vision"},{"issue":"1","key":"2_CR72","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11263-022-01699-1","volume":"131","author":"M Zhou","year":"2023","unstructured":"Zhou, M., Yan, K., Pan, J., Ren, W., Xie, Q., Cao, X.: Memory-augmented deep unfolding network for guided image super-resolution. Int. J. Comput. Vision 131(1), 215\u2013242 (2023)","journal-title":"Int. J. Comput. Vision"},{"key":"2_CR73","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1053\u20131061 (2018)","DOI":"10.1109\/CVPR.2018.00116"},{"key":"2_CR74","doi-asserted-by":"crossref","unstructured":"Zhu, J., et al.: Learning discriminative noise guidance for image forgery detection and localization. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a038, pp. 7739\u20137747 (2024)","DOI":"10.1609\/aaai.v38i7.28608"},{"key":"2_CR75","first-page":"90","volume":"67","author":"X Zhu","year":"2018","unstructured":"Zhu, X., Qian, Y., Zhao, X., Sun, B., Sun, Y.: A deep learning approach to patch-based image inpainting forensics. Signal Process.: Image Commun. 67, 90\u201399 (2018)","journal-title":"Signal Process.: Image Commun."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73247-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T12:03:40Z","timestamp":1730376220000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73247-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"ISBN":["9783031732461","9783031732478"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73247-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,1]]},"assertion":[{"value":"1 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}