{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T19:10:07Z","timestamp":1745608207481,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":52,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819658084","type":"print"},{"value":"9789819658091","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5809-1_16","type":"book-chapter","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T18:33:54Z","timestamp":1745606034000},"page":"295-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["$${M}^{3}$$: Manipulation Mask Manufacturer for\u00a0Arbitrary-Scale Super-Resolution Mask"],"prefix":"10.1007","author":[{"given":"Xinyu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaochen","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xuekang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Du","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Su","sequence":"additional","affiliation":[]},{"given":"Bingkui","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Zeyu","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Jizhe","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,26]]},"reference":[{"issue":"3","key":"16_CR1","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099\u20131110 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Andreadis, I., Amanatiadis, A.: Digital image scaling. In: 2005 IEEE Instrumentation and Measurement Technology Conference Proceedings, vol.\u00a03, pp. 2028\u20132032. IEEE (2005)","DOI":"10.1109\/IMTC.2005.1604529"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Bandara, W.G.C., Patel, V.M.: A transformer-based SIAMESE network for change detection. In: IGARSS 2022 - 2022 IEEE International Geoscience and Remote Sensing Symposium, pp. 207\u2013210 (2022)","DOI":"10.1109\/IGARSS46834.2022.9883686"},{"issue":"2\u20133","key":"16_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1006\/jsbi.1999.4097","volume":"125","author":"T Boudier","year":"1999","unstructured":"Boudier, T., Shotton, D.M.: Video on the internet: an introduction to the digital encoding, compression, and transmission of moving image data. J. Struct. Biol. 125(2\u20133), 133\u2013155 (1999)","journal-title":"J. Struct. Biol."},{"key":"16_CR5","unstructured":"Castleman, K.R.: Digital Image Processing. Prentice Hall Press (1996)"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TGRS.2020.3034752","volume":"60","author":"H Chen","year":"2021","unstructured":"Chen, H., Qi, Z., Shi, Z.: Remote sensing image change detection with transformers. IEEE Trans. Geosci. Remote Sens. 60, 1\u201314 (2021)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Chen, H.-W., Xu, Y.-S., Hong, M.-F., Tsai, Y.-M., Kuo, H.-K., Lee, C.-Y.: Cascaded local implicit transformer for arbitrary-scale super-resolution. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18257\u201318267 (2023)","DOI":"10.1109\/CVPR52729.2023.01751"},{"issue":"6","key":"16_CR8","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"V Christlein","year":"2012","unstructured":"Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841\u20131854 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"16_CR9","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TIP.2004.833105","volume":"13","author":"A Criminisi","year":"2004","unstructured":"Criminisi, A., P\u00e9rez, P., Toyama, K.: Region filling and object removal by exemplar-based image inpainting. IEEE Trans. Image Process. 13(9), 1200\u20131212 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Dang-Nguyen, D.-T., Pasquini, C., Conotter, V., Boato, G.: Raise: a raw images dataset for digital image forensics. In: Proceedings of the 6th ACM Multimedia Systems Conference, pp. 219\u2013224 (2015)","DOI":"10.1145\/2713168.2713194"},{"issue":"12","key":"16_CR11","doi-asserted-by":"publisher","first-page":"2024","DOI":"10.1109\/29.45551","volume":"37","author":"G Demoment","year":"1989","unstructured":"Demoment, G.: Image reconstruction and restoration: overview of common estimation structures and problems. IEEE Trans. Acoust. Speech Signal Process. 37(12), 2024\u20132036 (1989)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"issue":"3","key":"16_CR12","doi-asserted-by":"publisher","first-page":"3539","DOI":"10.1109\/TPAMI.2022.3180556","volume":"45","author":"C Dong","year":"2022","unstructured":"Dong, C., Chen, X., Ruohan, H., Cao, J., Li, X.: MVSS-Net: multi-view multi-scale supervised networks for image manipulation detection. IEEE Trans. Pattern Anal. Mach. Intell. 45(3), 3539\u20133553 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp. 422\u2013426. IEEE (2013)","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1007\/s11063-019-10163-0","volume":"51","author":"O Elharrouss","year":"2020","unstructured":"Elharrouss, O., Almaadeed, N., Al-Maadeed, S., Akbari, Y.: Image inpainting: a review. Neural Process. Lett. 51, 2007\u20132028 (2020)","journal-title":"Neural Process. Lett."},{"key":"16_CR15","first-page":"1","volume":"19","author":"S Fang","year":"2022","unstructured":"Fang, S., Li, K., Shao, J., Li, Z.: SNUNET-CD: A densely connected SIAMESE network for change detection of VHR images. IEEE Geosci. Remote Sens. Lett. 19, 1\u20135 (2022)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"issue":"2","key":"16_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.931079","volume":"26","author":"H Farid","year":"2009","unstructured":"Farid, H.: Image forgery detection. IEEE Signal Process. Mag. 26(2), 16\u201325 (2009)","journal-title":"IEEE Signal Process. Mag."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Fitzpatrick, N.: Media manipulation 2.0: the impact of social media on news, competition, and accuracy (2018)","DOI":"10.30958\/ajmmc.4.1.3"},{"key":"16_CR18","unstructured":"GIMP GIMP. Gimp. P\u00e1gina Principal. Dispon\u00edvel em, 6 (2013)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Ginsberg, R.H.: Image rotation. Appl. Opt. 33(34), 8105_1\u20138108 (1994)","DOI":"10.1364\/AO.33.8105_1"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Glasbey, C.A., Mardia, K.V.: A review of image-warping methods. J. Appl. Stat. 25(2), 155\u2013171 (1998)","DOI":"10.1080\/02664769823151"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Guan, H., et al.: MFC datasets: large-scale benchmark datasets for media forensic challenge evaluation. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 63\u201372. IEEE (2019)","DOI":"10.1109\/WACVW.2019.00018"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Guillaro, F., Cozzolino, D., Sud, A., Dufour, N., Verdoliva, L.: Trufor: leveraging all-round clues for trustworthy image forgery detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20606\u201320615 (2023)","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Hsu, Y.-F., Chang, S.-F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 549\u2013552. IEEE (2006)","DOI":"10.1109\/ICME.2006.262447"},{"issue":"11","key":"16_CR24","doi-asserted-by":"publisher","first-page":"3365","DOI":"10.1109\/TVCG.2019.2921336","volume":"26","author":"Y Jing","year":"2019","unstructured":"Jing, Y., Yang, Y., Feng, Z., Ye, J., Yizhou, Yu., Song, M.: Neural style transfer: a review. IEEE Trans. Visual Comput. Graphics 26(11), 3365\u20133385 (2019)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"issue":"8","key":"16_CR25","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s11263-022-01617-5","volume":"130","author":"M-J Kwon","year":"2022","unstructured":"Kwon, M.-J., Nam, S.-H., In-Jae, Yu., Lee, H.-K., Kim, C.: Learning jpeg compression artifacts for image manipulation detection and localization. Int. J. Comput. Vision 130(8), 1875\u20131895 (2022)","journal-title":"Int. J. Comput. Vision"},{"key":"16_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"issue":"11","key":"16_CR27","doi-asserted-by":"publisher","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","volume":"32","author":"X Liu","year":"2022","unstructured":"Liu, X., Liu, Y., Chen, J., Liu, X.: PSCC-net: progressive SPATIO-channel correlation network for image manipulation detection and localization. IEEE Trans. Circuits Syst. Video Technol. 32(11), 7505\u20137517 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3431\u20133440 (2015)","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"16_CR29","unstructured":"Long, M., Cao, Y., Wang, J., Jordan, M.: Learning transferable features with deep adaptation networks. In: International Conference on Machine Learning, pp. 97\u2013105. PMLR (2015)"},{"issue":"12","key":"16_CR30","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1080\/0143116031000139863","volume":"25","author":"L Dengsheng","year":"2004","unstructured":"Dengsheng, L., Mausel, P., Brondizio, E., Moran, E.: Change detection techniques. Int. J. Remote Sens. 25(12), 2365\u20132401 (2004)","journal-title":"Int. J. Remote Sens."},{"key":"16_CR31","unstructured":"Ma, X., Du, B., Liu, X., Al Hammadi, A.Y., Zhou, J.: IML-VIT: image manipulation localization by vision transformer. arXiv preprint arXiv:2307.14863 (2023)"},{"key":"16_CR32","unstructured":"Ma, X., et\u00a0al.: IMDL-BENCO: a comprehensive benchmark and codebase for image manipulation detection & localization. arXiv preprint arXiv:2406.10580 (2024)"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Mahfoudi, G., Tajini, B., Retraint, F., Morain-Nicolier, F., Dugelay, J.L., PIC Marc: Defacto: image and face manipulation dataset. In: 2019 27Th European Signal Processing Conference (EUSIPCO), pp. 1\u20135. IEEE (2019)","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"issue":"1","key":"16_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425780","volume":"54","author":"Y Mirsky","year":"2021","unstructured":"Mirsky, Y., Lee, W.: The creation and detection of deepfakes: a survey. ACM Comput. Surv. (CSUR) 54(1), 1\u201341 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Novozamsky, A., Mahdian, B., Saic, S.: Imd2020: a large-scale annotated dataset tailored for detecting manipulated images. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops, pp. 71\u201380 (2020)","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Petrou, M.M.P., Petrou, C.: Image Processing: The Fundamentals. Wiley (2010)","DOI":"10.1002\/9781119994398"},{"issue":"1","key":"16_CR37","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1146\/annurev.psych.53.100901.135125","volume":"53","author":"RA Rensink","year":"2002","unstructured":"Rensink, R.A.: Change detection. Ann. Rev. Psychol. 53(1), 245\u2013277 (2002)","journal-title":"Ann. Rev. Psychol."},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Sejdinovic, D., Sriperumbudur, B., Gretton, A., Fukumizu, K.: Equivalence of distance-based and RKHS-based statistics in hypothesis testing. Ann. Stat. 2263\u20132291 (2013)","DOI":"10.1214\/13-AOS1140"},{"issue":"8","key":"16_CR39","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/34.868688","volume":"22","author":"J Shi","year":"2000","unstructured":"Shi, J., Malik, J.: Normalized cuts and image segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 22(8), 888\u2013905 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Su, L., Ma, X., Zhu, X., Niu, C., Lei, Z., Zhou, J.-Z.: Can we get rid of handcrafted feature extractors? sparsevit: nonsemantics-centered, parameter-efficient image manipulation localization through spare-coding transformer. arXiv preprint arXiv:2412.14598 (2024)","DOI":"10.1609\/aaai.v39i7.32754"},{"issue":"12","key":"16_CR41","doi-asserted-by":"publisher","first-page":"4291","DOI":"10.1109\/TPAMI.2020.2997007","volume":"43","author":"Y Tan","year":"2020","unstructured":"Tan, Y., et al.: CrossNet++: cross-scale large-parallax warping for reference-based super-resolution. IEEE Trans. Pattern Anal. Mach. Intell. 43(12), 4291\u20134305 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR42","unstructured":"Adobe\u00a0Creative Team, Gyncild, B.: Adobe Photoshop CC. Pearson Education (2013)"},{"key":"16_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2020.110311","volume":"312","author":"R Thakur","year":"2020","unstructured":"Thakur, R., Rohilla, R.: Recent advances in digital image manipulation detection techniques: a brief review. Forensic Sci. Int. 312, 110311 (2020)","journal-title":"Forensic Sci. Int."},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Objectformer for image manipulation detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2364\u20132373 (2022)","DOI":"10.1109\/CVPR52688.2022.00240"},{"key":"16_CR45","doi-asserted-by":"crossref","unstructured":"Wang, W., Dong, J., Tan, T.: A survey of passive image tampering detection. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) Digital Watermarking, pp. 308\u2013322. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-03688-0_27"},{"key":"16_CR46","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.-T., Shen, X., Winkler, S.: Coverage-a novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 161\u2013165. IEEE (2016)","DOI":"10.1109\/ICIP.2016.7532339"},{"issue":"8\u20139","key":"16_CR47","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s003710050148","volume":"14","author":"G Wolberg","year":"1998","unstructured":"Wolberg, G.: Image morphing: a survey. Vis. Comput. 14(8\u20139), 360\u2013372 (1998)","journal-title":"Vis. Comput."},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9543\u20139552 (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"16_CR49","doi-asserted-by":"crossref","unstructured":"Yang, X., Zhou, J.: Manipulation mask generator: high-quality image manipulation mask generation method based on modified total variation noise reduction. In: 2023 IEEE 4th International Conference on Pattern Recognition and Machine Learning (PRML), pp. 218\u2013223. IEEE (2023)","DOI":"10.1109\/PRML59573.2023.10348368"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Zhou, J., Ma, X., Du, X., Alhammadi, A.Y., Feng, W.: Pre-training-free image manipulation localization through non-mutually exclusive contrastive learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22346\u201322356 (2023)","DOI":"10.1109\/ICCV51070.2023.02042"},{"key":"16_CR51","unstructured":"Zhu, X., et al.: Mesoscopic insights: orchestrating multi-scale & hybrid architecture for image manipulation localization. arXiv preprint arXiv:2412.13753 (2024)"},{"key":"16_CR52","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TIFS.2021.3070444","volume":"16","author":"P Zhuang","year":"2021","unstructured":"Zhuang, P., Li, H., Tan, S., Li, B., Huang, J.: Image tampering localization using a dense fully convolutional network. IEEE Trans. Inf. Forensics Secur. 16, 2986\u20132999 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Computational Visual Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5809-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T18:34:11Z","timestamp":1745606051000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5809-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819658084","9789819658091"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5809-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"26 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CVM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Visual Media","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong SAR","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cvm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccvm.org\/2025\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}