{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:37:55Z","timestamp":1743017875882,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811681288"},{"type":"electronic","value":"9789811681295"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-8129-5_73","type":"book-chapter","created":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T17:02:58Z","timestamp":1644598978000},"page":"474-480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Behavioural Study of Constrained Convolutional Neural Network on Image Splicing Classification of Various Datasets"],"prefix":"10.1007","author":[{"given":"Yang Yang","family":"Lee","sequence":"first","affiliation":[]},{"given":"Teck Seng","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Bee Ee","family":"Khoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,11]]},"reference":[{"key":"73_CR1","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer, pp. 5\u201310 (2016)","DOI":"10.1145\/2909827.2930786"},{"issue":"11","key":"73_CR2","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691\u20132706 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"73_CR3","doi-asserted-by":"crossref","unstructured":"Zhan L, Yuesheng Z.: Passive forensics for image splicing based on PCA noise estimation. In: 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 78\u201383 (2015)","DOI":"10.1109\/ICITST.2015.7412062"},{"key":"73_CR4","unstructured":"Zhang Y, Goh J, Win LL, Thing V.: Image region forgery detection: a deep learning approach. In: Cryptology and Information Security Series, pp. 1\u201311 (2016)"},{"key":"73_CR5","doi-asserted-by":"crossref","unstructured":"Vaishnavi D.: Recognizing image splicing forgeries using histogram features. In: 3rd MEC International Conference on Big Data and Smart City, pp. 1\u20134 (2016)","DOI":"10.1109\/ICBDSC.2016.7460342"},{"key":"73_CR6","doi-asserted-by":"crossref","unstructured":"He Z, Lu W, Sun W, Huang J.: Digital image splicing detection based on Markov features in DCT and DWT domain. In: Pattern Recognition, pp. 4292\u20134299. Elsevier (2012)","DOI":"10.1016\/j.patcog.2012.05.014"},{"key":"73_CR7","doi-asserted-by":"crossref","unstructured":"Rao Y, Ni J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136 (2016)","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"73_CR8","doi-asserted-by":"publisher","first-page":"25611","DOI":"10.1109\/ACCESS.2020.2970735","volume":"8","author":"Y Rao","year":"2020","unstructured":"Rao, Y., Ni, J., Zhao, H.: Deep learning local descriptor for image splicing detection and localization. IEEE Access 8, 25611\u201325625 (2020)","journal-title":"IEEE Access"},{"key":"73_CR9","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum, R., Yuzhuo Ren, C.-C., Kuo, J.: Image splicing localization using a multi-task fully convolutional network (MFCN). J. Vis. Commun. Image Represent. 51, 201\u2013209 (2018)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"73_CR10","doi-asserted-by":"publisher","first-page":"6729","DOI":"10.1109\/ACCESS.2019.2963745","volume":"8","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Zhao, X.: Constrained image splicing detection and localization with attention-aware encoder-decoder and atrous convolution. IEEE Access 8, 6729\u20136741 (2020)","journal-title":"IEEE Access"},{"key":"73_CR11","doi-asserted-by":"crossref","unstructured":"Phan-xuan, H., Le-Tien, T., Nguyen-Chinh, T., et al.: Preserving spatial information to enhance performance of image forgery classification. In: 2019 International Conference on Advanced Technologies for Communications (ATC), pp. 50\u201355. IEEE (2019)","DOI":"10.1109\/ATC.2019.8924504"},{"key":"73_CR12","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Verdoliva, L.: Single-image splicing localization through autoencoder-based anomaly detection. In: 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016 (2017)","DOI":"10.1109\/WIFS.2016.7823921"},{"key":"73_CR13","doi-asserted-by":"crossref","unstructured":"Verdoliva, L., Cozzolino, D., Poggi, G.: A feature-based approach for image tampering detection and localization. In: 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, pp. 149\u2013154 (2015)","DOI":"10.1109\/WIFS.2014.7084319"},{"key":"73_CR14","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: IH&MMSec 2017, pp. 159\u2013164 (2017)","DOI":"10.1145\/3082031.3083247"},{"key":"73_CR15","doi-asserted-by":"crossref","unstructured":"Bunk, J., Bappy, J.H., Mohammed, T.M., et al.: Detection and localization of image forgeries using resampling features and deep learning. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1881\u20131889 (2017)","DOI":"10.1109\/CVPRW.2017.235"},{"key":"73_CR16","doi-asserted-by":"publisher","first-page":"100112","DOI":"10.1016\/j.fsir.2020.100112","volume":"2","author":"B Diallo","year":"2020","unstructured":"Diallo, B., Urruty, T., Bourdon, P., Fernandez-Maloigne, C.: Robust forgery detection for compressed images using CNN supervision. Forensic Sci. Int. Rep. 2, 100112 (2020)","journal-title":"Forensic Sci. Int. Rep."},{"key":"73_CR17","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2020","unstructured":"Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN-based camera model fingerprint. IEEE Trans. Inf. Forensics Secur. 15, 144\u2013159 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"73_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-642-18405-5_2","volume-title":"Digital Watermarking","author":"X Zhao","year":"2011","unstructured":"Zhao, X., Li, J., Li, S., Wang, S.: Detecting digital image splicing in chroma spaces. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 12\u201322. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18405-5_2"},{"key":"73_CR19","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","volume":"8","author":"TJ De Carvalho","year":"2013","unstructured":"De Carvalho, T.J., Riess, C., Angelopoulou, E., et al.: Exposing digital image forgeries by illumination color classification. IEEE Trans. Inf. Forensics Secur. 8, 1182\u20131194 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Electrical Engineering","Proceedings of the 11th International Conference on Robotics, Vision, Signal Processing and Power Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8129-5_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T19:33:49Z","timestamp":1648582429000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8129-5_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811681288","9789811681295"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8129-5_73","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}