{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:43:51Z","timestamp":1743083031048,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031736490"},{"type":"electronic","value":"9783031736506"}],"license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73650-6_17","type":"book-chapter","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T18:16:55Z","timestamp":1732126615000},"page":"290-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Delving into Adversarial Robustness on\u00a0Document Tampering Localization"],"prefix":"10.1007","author":[{"given":"Huiru","family":"Shao","sequence":"first","affiliation":[]},{"given":"Zhuang","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Kaizhu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qiufeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"17_CR1","unstructured":"Agnihotri, S., Keuper, M.: Cospgd: a unified white-box adversarial attack for pixel-wise prediction tasks. arXiv preprint arXiv:2302.02213 (2023)"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"155161","DOI":"10.1109\/ACCESS.2021.3127960","volume":"9","author":"N Akhtar","year":"2021","unstructured":"Akhtar, N., Mian, A., Kardan, N., Shah, M.: Advances in adversarial attacks and defenses in computer vision: A survey. IEEE Access 9, 155161\u2013155196 (2021)","journal-title":"IEEE Access"},{"issue":"3","key":"17_CR3","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection via texture description. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, pp. 59\u201364. ACM (2010)","DOI":"10.1145\/1877972.1877990"},{"issue":"10","key":"17_CR5","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10(10), 2084\u20132094 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR6","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: International Conference on Machine Learning, pp. 274\u2013283. PMLR (2018)"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Bammey, Q., Gioi, R.G.v., Morel, J.M.: An adaptive neural network for unsupervised mosaic consistency analysis in image forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14194\u201314204. IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.01420"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Bappy, J.H., Roy-Chowdhury, A.K., Bunk, J., Nataraj, L., Manjunath, B.: Exploiting spatial structure for localizing manipulated image regions. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 4970\u20134979 (2017)","DOI":"10.1109\/ICCV.2017.532"},{"issue":"11","key":"17_CR9","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691\u20132706 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Berman, M., Triki, A.R., Blaschko, M.B.: The lov\u00e1sz-softmax loss: a tractable surrogate for the optimization of the intersection-over-union measure in neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4413\u20134421 (2018)","DOI":"10.1109\/CVPR.2018.00464"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Bertrand, R., Terrades, O.R., Gomez-Kr\u00e4mer, P., Franco, P., Ogier, J.M.: A conditional random field model for font forgery detection. In: 2015 13th International Conference on Document Analysis and Recognition (ICDAR), pp. 576\u2013580. IEEE (2015)","DOI":"10.1109\/ICDAR.2015.7333827"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Verdoliva, L.: Single-image splicing localization through autoencoder-based anomaly detection. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20136. IEEE (2016)","DOI":"10.1109\/WIFS.2016.7823921"},{"key":"17_CR13","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: International Conference on Machine Learning, pp. 2206\u20132216. PMLR (2020)"},{"key":"17_CR14","unstructured":"Croce, F., Singh, N.D., Hein, M.: Robust semantic segmentation: strong adversarial attacks and fast training of robust models. arXiv preprint arXiv:2306.12941 (2023)"},{"issue":"3","key":"17_CR15","doi-asserted-by":"publisher","first-page":"3539","DOI":"10.1109\/TPAMI.2022.3180556","volume":"45","author":"C Dong","year":"2022","unstructured":"Dong, C., Chen, X., Hu, R., Cao, J., Li, X.: Mvss-net: Multi-view multi-scale supervised networks for image manipulation detection. IEEE Trans. Pattern Anal. Mach. Intell. 45(3), 3539\u20133553 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"17_CR16","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"17_CR17","doi-asserted-by":"publisher","unstructured":"Gu, J., Zhao, H., Tresp, V., Torr, P.H.S.: SegPGD: an effective and efficient adversarial attack for Evaluating and Boosting Segmentation Robustness. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) Computer Vision - ECCV 2022, ECCV 2022, LNCS, vol. 13689, pp. 308\u2013325. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19818-2_18","DOI":"10.1007\/978-3-031-19818-2_18"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Guo, X., Liu, X., Ren, Z., Grosz, S., Masi, I., Liu, X.: Hierarchical fine-grained image forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3155\u20133165 (2023)","DOI":"10.1109\/CVPR52729.2023.00308"},{"issue":"12","key":"17_CR19","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on markov features in DCT and dwt domain. Pattern Recogn. 45(12), 4292\u20134299 (2012)","journal-title":"Pattern Recogn."},{"key":"17_CR20","doi-asserted-by":"publisher","unstructured":"Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: SPAN: spatial pyramid attention network for image manipulation localization. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.M. (eds.) Computer Vision - ECCV 2020, ECCV 2020, LNCS, Part XXI, vol. 12366, pp. 312\u2013328. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58589-1_19","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"17_CR21","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Kwon, M.J., Yu, I.J., Nam, S.H., Lee, H.K.: Cat-net: Compression artifact tracing network for detection and localization of image splicing. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 375\u2013384 (2021)","DOI":"10.1109\/WACV48630.2021.00042"},{"key":"17_CR23","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"17_CR24","unstructured":"Mazaheri, G., Mithun, N.C., Bappy, J.H., Roy-Chowdhury, A.K.: A skip connection architecture for localization of image manipulations. In: CVPR Workshops, pp. 119\u2013129 (2019)"},{"key":"17_CR25","unstructured":"Nowozin, S., Cseke, B., Tomioka, R.: f-gan: training generative neural samplers using variational divergence minimization. In: NeurIPS, vol. 29 (2016)"},{"key":"17_CR26","unstructured":"Qian, Z., Zhang, S., Huang, K., Wang, Q., Zhang, R., Yi, X.: Improving model robustness with latent distribution locally and globally. arXiv preprint arXiv:2107.04401 (2021)"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Qu, C., Liu, C., Liu, Y., Chen, X., Peng, D., Guo, F., Jin, L.: Towards robust tampered text detection in document image: new dataset and new solution. In: CVPR, pp. 5937\u20135946 (2023)","DOI":"10.1109\/CVPR52729.2023.00575"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Satkhozhina, A., Ahmadullin, I., Allebach, J.P.: Optical font recognition using conditional random field. In: Proceedings of the 2013 ACM Symposium on Document Engineering, pp. 119\u2013122 (2013)","DOI":"10.1145\/2494266.2494307"},{"key":"17_CR29","doi-asserted-by":"publisher","unstructured":"Shao, H., Huang, K., Wang, W., Huang, X., Wang, Q.: Progressive supervision for tampering localization in document images. In: Luo, B., Cheng, L., Wu, ZG., Li, H., Li, C. (eds.) Neural Information Processing, ICONIP 2023, CCIS, vol. 1969, pp. 140\u2013151. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-99-8184-7_11","DOI":"10.1007\/978-981-99-8184-7_11"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Sun, Z., Jiang, H., Wang, D., Li, X., Cao, J.: Safl-net: semantic-agnostic feature learning network with auxiliary plugins for image manipulation detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22424\u201322433 (2023)","DOI":"10.1109\/ICCV51070.2023.02049"},{"key":"17_CR31","unstructured":"Wang, J., Li, Z., Zhang, C., Chen, J., Wu, Z., Davis, L.S., Jiang, Y.G.: Fighting malicious media data: A survey on tampering detection and deepfake detection. arXiv preprint arXiv:2212.05667 (2022)"},{"key":"17_CR32","doi-asserted-by":"publisher","unstructured":"Wang, Y., Xie, H., Xing, M., Wang, J., Zhu, S., Zhang, Y.: Detecting tampered scene text in the wild. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) Computer Vision - ECCV 2022, ECCV 2022, LNCS, vol. 13688, pp. 215\u2013232. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19815-1_13","DOI":"10.1007\/978-3-031-19815-1_13"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Wu, H., Zhou, J., Tian, J., Liu, J.: Robust image forgery detection over online social network shared images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13440\u201313449 (2022)","DOI":"10.1109\/CVPR52688.2022.01308"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Xu, X., Zhao, H., Jia, J.: Dynamic divide-and-conquer adversarial training for robust semantic segmentation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7486\u20137495 (2021)","DOI":"10.1109\/ICCV48922.2021.00739"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. arXiv preprint arXiv:1605.07146 (2016)","DOI":"10.5244\/C.30.87"},{"key":"17_CR36","unstructured":"Zhang, H., Wang, J.: Defense against adversarial attacks using feature scattering-based adversarial training. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"17_CR37","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E., El\u00a0Ghaoui, L., Jordan, M.: Theoretically principled trade-off between robustness and accuracy. In: International Conference on Machine Learning, pp. 7472\u20137482. PMLR (2019)"},{"key":"17_CR38","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.neunet.2021.03.031","volume":"140","author":"S Zhang","year":"2021","unstructured":"Zhang, S., Huang, K., Zhu, J., Liu, Y.: Manifold adversarial training for supervised and semi-supervised learning. Neural Netw. 140, 282\u2013293 (2021)","journal-title":"Neural Netw."},{"key":"17_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, Y., Zhou, Z., Luo, J.: Boundary-based image forgery detection by fast shallow cnn. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 2658\u20132663. IEEE (2018)","DOI":"10.1109\/ICPR.2018.8545074"},{"key":"17_CR40","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1053\u20131061 (2018)","DOI":"10.1109\/CVPR.2018.00116"},{"key":"17_CR41","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TIFS.2022.3152362","volume":"17","author":"L Zhuo","year":"2022","unstructured":"Zhuo, L., Tan, S., Li, B., Huang, J.: Self-adversarial training incorporating forgery attention for image forgery localization. IEEE Trans. Inf. Forensics Secur. 17, 819\u2013834 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"17_CR42","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/34.709616","volume":"20","author":"A Zramdini","year":"1998","unstructured":"Zramdini, A., Ingold, R.: Optical font recognition using typographical features. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 877\u2013882 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73650-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T19:06:57Z","timestamp":1732129617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73650-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,21]]},"ISBN":["9783031736490","9783031736506"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73650-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,21]]},"assertion":[{"value":"21 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}