{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:29:04Z","timestamp":1770917344956,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609628","type":"print"},{"value":"9789819609635","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0963-5_13","type":"book-chapter","created":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T07:45:43Z","timestamp":1733557543000},"page":"220-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["SCCA-Net: A Novel Network for\u00a0Image Manipulation Localization Using Split-Channel Contextual Attention"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0607-0762","authenticated-orcid":false,"given":"Yan","family":"Xiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3436-2249","authenticated-orcid":false,"given":"Kaiqi","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3512-7739","authenticated-orcid":false,"given":"Haichang","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,8]]},"reference":[{"key":"13_CR1","unstructured":"Camera model identification, https:\/\/www.kaggle.com\/c\/sp-society-camera-model-identification"},{"key":"13_CR2","unstructured":"Nist: Nist nimble 2016 datasets, https:\/\/www.nist.gov\/itl\/iad\/mig\/"},{"issue":"2","key":"13_CR3","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.fcij.2018.03.001","volume":"3","author":"HA Alberry","year":"2018","unstructured":"Alberry, H.A., Hegazy, A.A., Salama, G.I.: A fast sift based method for copy move forgery detection. Future Computing and Informatics Journal 3(2), 159\u2013165 (2018)","journal-title":"Future Computing and Informatics Journal"},{"issue":"11","key":"13_CR4","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691\u20132706 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Chen, B., Liu, Y., Zhang, Z., Lu, G., Kong, A.W.K.: Transattunet: Multi-level attention-guided u-net with transformer for medical image segmentation. IEEE Transactions on Emerging Topics in Computational Intelligence pp. 1\u201314 (2023)","DOI":"10.1109\/TETCI.2023.3309626"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Dong, C., Chen, X., Hu, R., Cao, J., Li, X.: Mvss-net: Multi-view multi-scale supervised networks for image manipulation detection. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022)","DOI":"10.1109\/TPAMI.2022.3180556"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. pp. 422\u2013426. IEEE (2013)","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"13_CR8","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., et\u00a0al.: An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Farid, H., Lyu, S.: Higher-order wavelet statistics and their application to digital forensics. In: 2003 Conference on computer vision and pattern recognition workshop. vol.\u00a08, pp. 94\u201394. IEEE (2003)","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"13_CR11","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization (2017), http:\/\/arxiv.org\/abs\/1412.6980"},{"issue":"2","key":"13_CR12","first-page":"2","volume":"6","author":"N Krawetz","year":"2007","unstructured":"Krawetz, N., Solutions, H.F.: A picture\u2019s worth. Hacker Factor. Solutions 6(2), 2 (2007)","journal-title":"Solutions"},{"issue":"9","key":"13_CR13","doi-asserted-by":"publisher","first-page":"5614","DOI":"10.1109\/TNNLS.2021.3130168","volume":"34","author":"S Li","year":"2023","unstructured":"Li, S., Xu, S., Ma, W., Zong, Q.: Image manipulation localization using attentional cross-domain cnn features. IEEE Transactions on Neural Networks and Learning Systems 34(9), 5614\u20135628 (2023)","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"13_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109026","volume":"133","author":"X Lin","year":"2023","unstructured":"Lin, X., Wang, S., Deng, J., Fu, Y., Bai, X., Chen, X., Qu, X., Tang, W.: Image manipulation detection by multiple tampering traces and edge artifact enhancement. Pattern Recogn. 133, 109026 (2023)","journal-title":"Pattern Recogn."},{"issue":"10","key":"13_CR15","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27(10), 1497\u20131503 (2009)","journal-title":"Image Vis. Comput."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Pandey, R.C., Singh, S.K., Shukla, K.K., Agrawal, R.: Fast and robust passive copy-move forgery detection using surf and sift image features. In: 2014 9th International Conference on Industrial and Information Systems (ICIIS). pp.\u00a01\u20136 (2014)","DOI":"10.1109\/ICIINFS.2014.7036519"},{"issue":"10","key":"13_CR17","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries in color filter array interpolated images. IEEE Trans. Signal Process. 53(10), 3948\u20133959 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"13_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-016-0053-0","volume":"2017","author":"D Shullani","year":"2017","unstructured":"Shullani, D., Fontani, M., Iuliani, M., Shaya, O.A., Piva, A.: Vision: a video and image dataset for source identification. EURASIP J. Inf. Secur. 2017(1), 1\u201316 (2017)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"3","key":"13_CR19","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","volume":"5","author":"MC Stamm","year":"2010","unstructured":"Stamm, M.C., Liu, K.R.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 5(3), 492\u2013506 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR20","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I.: Attention is all you need. Advances in neural information processing systems 30 (2017)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., Winkler, S.: Coverage\u2014a novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP). pp. 161\u2013165. IEEE (2016)","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 9543\u20139552 (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"13_CR23","unstructured":"Xie, E., Wang, W., Yu, Z., Anandkumar, A., Alvarez, J.M., Luo, P.: Segformer: Simple and efficient design for semantic segmentation with transformers. In: Neural Information Processing Systems (NeurIPS) (2021)"},{"key":"13_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126263","volume":"543","author":"D Xu","year":"2023","unstructured":"Xu, D., Shen, X., Shi, Z., Ta, N.: Semantic-agnostic progressive subtractive network for image manipulation detection and localization. Neurocomputing 543, 126263 (2023)","journal-title":"Neurocomputing"},{"key":"13_CR25","first-page":"1","volume":"2016","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Goh, J., Win, L.L., Thing, V.L.: Image region forgery detection: A deep learning approach. SG-CRC 2016, 1\u201311 (2016)","journal-title":"SG-CRC"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Zhou, J., Ma, X., Du, X., Alhammadi, A.Y., Feng, W.: Pre-training-free image manipulation localization through non-mutually exclusive contrastive learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV). pp. 22346\u201322356 (October 2023)","DOI":"10.1109\/ICCV51070.2023.02042"},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TIFS.2021.3070444","volume":"16","author":"P Zhuang","year":"2021","unstructured":"Zhuang, P., Li, H., Tan, S., Li, B., Huang, J.: Image tampering localization using a dense fully convolutional network. IEEE Trans. Inf. Forensics Secur. 16, 2986\u20132999 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TIFS.2022.3152362","volume":"17","author":"L Zhuo","year":"2022","unstructured":"Zhuo, L., Tan, S., Li, B., Huang, J.: Self-adversarial training incorporating forgery attention for image forgery localization. IEEE Trans. Inf. Forensics Secur. 17, 819\u2013834 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ACCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0963-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T08:39:28Z","timestamp":1733560768000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0963-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"ISBN":["9789819609628","9789819609635"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0963-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,8]]},"assertion":[{"value":"8 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"accv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}