{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T08:57:46Z","timestamp":1768121866896,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819557608","type":"print"},{"value":"9789819557615","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5761-5_36","type":"book-chapter","created":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T05:52:18Z","timestamp":1768110738000},"page":"518-532","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["WAHF-Net: Wavelet Attention and\u00a0Hierarchical Feature Fusion Network for\u00a0Image Tampering Localization"],"prefix":"10.1007","author":[{"given":"Yun","family":"Song","sequence":"first","affiliation":[]},{"given":"Yuchen","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Yaoyao","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2035-6242","authenticated-orcid":false,"given":"Jiaxin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhixu","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"issue":"1","key":"36_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dim.2022.100004","volume":"6","author":"X Ma","year":"2022","unstructured":"Ma, X., Fan, X.: A review of the studies on social media images from the perspective of information interaction. Data and Information Management 6(1), 100004 (2022)","journal-title":"Data and Information Management"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Shen, Y., Gu, J., Tang, X., Zhou, B.: Interpreting the latent space of gans for semantic face editing. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp. 9243\u20139252 (2020)","DOI":"10.1109\/CVPR42600.2020.00926"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Lee, C.H., Liu, Z., Wu, L., Luo, P.: Maskgan: Towards diverse and interactive facial image manipulation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp. 5549\u20135558 (2020)","DOI":"10.1109\/CVPR42600.2020.00559"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Lee, H., Kang, K., Ok, J., Cho, S.: Cliptone: Unsupervised learning for text-based image tone adjustment. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 2942\u20132951 (2024)","DOI":"10.1109\/CVPR52733.2024.00284"},{"issue":"3","key":"36_CR5","first-page":"507","volume":"10","author":"J Li","year":"2014","unstructured":"Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, Y.K., Chen, J., Liu, X.: Pscc-net: Progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Transactions on Circuits and Systems for Video Technology 32, 7505\u20137517 (2021), https:\/\/api.semanticscholar.org\/CorpusID:232290403","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Li, D., Zhu, J., Wang, M., Liu, J., Fu, X., Zha, Z.J.: Edge-aware regional message passing controller for image forgery localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 8222\u20138232 (2023)","DOI":"10.1109\/CVPR52729.2023.00795"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 1053\u20131061 (2018)","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"3","key":"36_CR9","doi-asserted-by":"publisher","first-page":"3539","DOI":"10.1109\/TPAMI.2022.3180556","volume":"45","author":"C Dong","year":"2022","unstructured":"Dong, C., Chen, X., Hu, R., Cao, J., Li, X.: Mvss-net: Multi-view multi-scale supervised networks for image manipulation detection. IEEE Trans. Pattern Anal. Mach. Intell. 45(3), 3539\u20133553 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"7","key":"36_CR10","first-page":"7541","volume":"35","author":"Z Gao","year":"2022","unstructured":"Gao, Z., Sun, C., Cheng, Z., Guan, W., Liu, A., Wang, M.: Tbnet: A two-stream boundary-aware network for generic image manipulation localization. IEEE Trans. Knowl. Data Eng. 35(7), 7541\u20137556 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"7851","DOI":"10.1109\/TMM.2022.3231110","volume":"25","author":"F Li","year":"2022","unstructured":"Li, F., Pei, Z., Zhang, X., Qin, C.: Image manipulation localization using multi-scale feature fusion and adaptive edge supervision. IEEE Trans. Multimedia 25, 7851\u20137866 (2022)","journal-title":"IEEE Trans. Multimedia"},{"issue":"11","key":"36_CR12","doi-asserted-by":"publisher","first-page":"6390","DOI":"10.1109\/TCSVT.2023.3269948","volume":"33","author":"D Xu","year":"2023","unstructured":"Xu, D., Shen, X., Lyu, Y.: Up-net: Uncertainty-supervised parallel network for image manipulation localization. IEEE Trans. Circuits Syst. Video Technol. 33(11), 6390\u20136403 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., Feichtenhofer, C., Darrell, T., Xie, S.: A convnet for the 2020s. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp. 11976\u201311986 (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"issue":"4","key":"36_CR14","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"LC Chen","year":"2017","unstructured":"Chen, L.C., Papandreou, G., Kokkinos, I., Murphy, K., Yuille, A.L.: Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans. Pattern Anal. Mach. Intell. 40(4), 834\u2013848 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J., Lee, J.Y., Kweon, I.S.: Cbam: Convolutional block attention module. In: Proceedings of the European conference on computer vision (ECCV). pp. 3\u201319 (2018)","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 7132\u20137141 (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Guan, H., Kozak, M., Robertson, E., Lee, Y., Yates, A.N., Delgado, A., Zhou, D., Kheyrkhah, T., Smith, J.M., Fiscus, J.G.: Mfc datasets: Large-scale benchmark datasets for media forensic challenge evaluation. 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW) pp. 63\u201372 (2019), https:\/\/api.semanticscholar.org\/CorpusID:61807685","DOI":"10.1109\/WACVW.2019.00018"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. 2013 IEEE China Summit and International Conference on Signal and Information Processing pp. 422\u2013426 (2013), https:\/\/api.semanticscholar.org\/CorpusID:14008455","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"36_CR19","volume-title":"Columbia image splicing detection evaluation dataset","author":"TT Ng","year":"2009","unstructured":"Ng, T.T., Hsu, J., Chang, S.F.: Columbia image splicing detection evaluation dataset. Columbia Univ CalPhotos Digit Libr, DVMM lab (2009)"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., Winkler, S.: Coverage\u2014a novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP). pp. 161\u2013165. IEEE (2016)","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: Span: Spatial pyramid attention network forimage manipulation localization. In: European Conference on Computer Vision (2020), https:\/\/api.semanticscholar.org\/CorpusID:221447878","DOI":"10.1007\/978-3-030-58589-1_19"},{"issue":"9","key":"36_CR22","doi-asserted-by":"publisher","first-page":"5614","DOI":"10.1109\/TNNLS.2021.3130168","volume":"34","author":"S Li","year":"2021","unstructured":"Li, S., Xu, S., Ma, W., Zong, Q.: Image manipulation localization using attentional cross-domain cnn features. IEEE Transactions on Neural Networks and Learning Systems 34(9), 5614\u20135628 (2021)","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Wang, J., Wu, Z., Chen, J., Han, X., Shrivastava, A., Lim, S.N., Jiang, Y.G.: Objectformer for image manipulation detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 2364\u20132373 (2022)","DOI":"10.1109\/CVPR52688.2022.00240"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, L., Xu, M., Li, D., Du, J., Wang, R.: Catmullrom splines-based regression for image forgery localization. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a038, pp. 7196\u20137204 (2024)","DOI":"10.1609\/aaai.v38i7.28548"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Zhu, J., Li, D., Fu, X., Yang, G., Huang, J., Liu, A., Zha, Z.J.: Learning discriminative noise guidance for image forgery detection and localization. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a038, pp. 7739\u20137747 (2024)","DOI":"10.1609\/aaai.v38i7.28608"},{"key":"36_CR26","doi-asserted-by":"crossref","unstructured":"Pan, W., Ma, W., Zhao, S., Gu, L., Shi, G., Xia, Z., Wang, M.: Image manipulation detection with cascade hierarchical graph representation. IEEE Transactions on Circuits and Systems for Video Technology (2024)","DOI":"10.1109\/TCSVT.2024.3390127"},{"key":"36_CR27","doi-asserted-by":"crossref","unstructured":"Chen, Y., Cheng, H., Wang, H., Liu, X., Chen, F., Li, F., Zhang, X., Wang, M.: Ean: Edge-aware network for image manipulation localization. IEEE Transactions on Circuits and Systems for Video Technology 35, 1591\u20131601 (2025), https:\/\/api.semanticscholar.org\/CorpusID:273128586","DOI":"10.1109\/TCSVT.2024.3473933"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5761-5_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T05:52:22Z","timestamp":1768110742000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5761-5_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819557608","9789819557615"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5761-5_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"12 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}