{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:11:28Z","timestamp":1743059488056,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819714162"},{"type":"electronic","value":"9789819714179"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1417-9_31","type":"book-chapter","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T07:05:03Z","timestamp":1716275103000},"page":"335-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fusing Multi-scale Attention and Transformer for Detection and Localization of Image Splicing Forgery"],"prefix":"10.1007","author":[{"given":"Yanzhi","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jiangbin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Chenyu","family":"Shao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,22]]},"reference":[{"issue":"4","key":"31_CR1","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1109\/TIFS.2015.2506548","volume":"11","author":"T Carvalho","year":"2015","unstructured":"Carvalho, T., et al.: Illuminant-based transformed spaces for image forensics. IEEE Trans. Inf. Forensics Secur. 11(4), 720\u2013733 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2506548","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.jvcir.2018.05.011","volume":"54","author":"C Iakovidou","year":"2018","unstructured":"Iakovidou, C., et al.: Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. Vis. Commun. Image Represent. 54, 155\u2013170 (2018). https:\/\/doi.org\/10.1016\/j.jvcir.2018.05.011","journal-title":"J. Vis. Commun. Image Represent."},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-642-04431-1_18","volume-title":"Information hiding","author":"Z Qu","year":"2009","unstructured":"Qu, Z., Qiu, G., Huang, J.: Detect digital image splicing with visual cues. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 247\u2013261. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04431-1_18"},{"key":"31_CR4","doi-asserted-by":"publisher","unstructured":"Fang, Z., Wang, S., Zhang, X.: Image splicing detection using color edge inconsistency. In: 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 923\u2013926 (2010). https:\/\/doi.org\/10.1109\/MINES.2010.196","DOI":"10.1109\/MINES.2010.196"},{"issue":"5","key":"31_CR5","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara, P., Bianchi, T., De Rosa, A., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7(5), 1566\u20131577 (2012). https:\/\/doi.org\/10.1109\/TIFS.2012.2202227","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"31_CR6","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TIFS.2016.2636089","volume":"12","author":"P Korus","year":"2016","unstructured":"Korus, P., Huang, J.: Multi-scale analysis strategies in PRNU-based tampering localization. IEEE Trans. Inf. Forensics Secur. 12(4), 809\u2013824 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2636089","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.ins.2019.09.038","volume":"511","author":"B Xiao","year":"2020","unstructured":"Xiao, B., Wei, Y., Bi, X., Li, W., Ma, J.: Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Inf. Sci. 511, 172\u2013191 (2020). https:\/\/doi.org\/10.1016\/j.ins.2019.09.038","journal-title":"Inf. Sci."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.ins.2020.03.099","volume":"526","author":"B Liu","year":"2020","unstructured":"Liu, B., Pun, C.M.: Exposing splicing forgery in realistic scenes using deep fusion network. Inf. Sci. 526, 133\u2013150 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.03.099","journal-title":"Inf. Sci."},{"issue":"7","key":"31_CR9","doi-asserted-by":"publisher","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","volume":"28","author":"JH Bappy","year":"2019","unstructured":"Bappy, J.H., Simons, C., Nataraj, L., Manjunath, B.S., Roy-Chowdhury, A.K.: Hybrid LSTM and encoder-decoder architecture for detection of image forgeries. IEEE Trans. Image Process. 28(7), 3286\u20133300 (2019). https:\/\/doi.org\/10.1109\/TIP.2019.2895466","journal-title":"IEEE Trans. Image Process."},{"key":"31_CR10","doi-asserted-by":"publisher","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9543\u20139552 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00977","DOI":"10.1109\/CVPR.2019.00977"},{"key":"31_CR11","doi-asserted-by":"publisher","unstructured":"Ye, S., Sun, Q., Chang, E.C.: Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: 2007 IEEE International Conference on Multimedia and Expo (ICME), pp. 12\u201315 (2007). https:\/\/doi.org\/10.1109\/ICME.2007.4284574","DOI":"10.1109\/ICME.2007.4284574"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.patcog.2018.02.004","volume":"79","author":"Y Yan","year":"2018","unstructured":"Yan, Y., Ren, J., Sun, G., et al.: Unsupervised image saliency detection with Gestalt-laws guided optimization and visual attention-based refinement. Pattern Recogn. 79, 65\u201378 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2018.02.004","journal-title":"Pattern Recogn."},{"key":"31_CR13","doi-asserted-by":"publisher","unstructured":"Bi, X., Wei, Y., Xiao, B., & Li, W.: RRU-Net: the ringed residual U-Net for image splicing forgery detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 30\u201339 (2019). https:\/\/doi.org\/10.1109\/CVPRW.2019.00010","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"31_CR14","doi-asserted-by":"publisher","unstructured":"Bi, X., Zhang, Z., Xiao, B.: Reality transform adversarial generators for image splicing forgery detection and localization. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 14294\u201314303 (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.01403","DOI":"10.1109\/ICCV48922.2021.01403"},{"key":"31_CR15","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1007\/s12559-021-09952-4","volume":"14","author":"J Ren","year":"2022","unstructured":"Ren, J., Wang, Z., Ren, J.: PS-Net: progressive selection network for salient object detection. Cogn. Comput. 14, 794\u2013804 (2022). https:\/\/doi.org\/10.1007\/s12559-021-09952-4","journal-title":"Cogn. Comput."},{"key":"31_CR16","doi-asserted-by":"publisher","unstructured":"Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), pp. 422\u2013426 (2013). https:\/\/doi.org\/10.1109\/ChinaSIP.2013.6625374","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"31_CR17","doi-asserted-by":"publisher","unstructured":"Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE International Conference on Multimedia and Expo (ICME), pp. 549\u2013552 (2006). https:\/\/doi.org\/10.1109\/ICME.2006.262447","DOI":"10.1109\/ICME.2006.262447"},{"key":"31_CR18","doi-asserted-by":"publisher","unstructured":"Guan, H., et al.: MFC datasets: large-scale benchmark datasets for media forensic challenge evaluation. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 63\u201372 (2019). https:\/\/doi.org\/10.1109\/WACVW.2019.00018","DOI":"10.1109\/WACVW.2019.00018"},{"issue":"4","key":"31_CR19","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1007\/s11042-016-3795-2","volume":"76","author":"M Zampoglou","year":"2017","unstructured":"Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Large-scale evaluation of splicing localization algorithms for web images. Multimed. Tools. Appl. 76(4), 4801\u20134834 (2017). https:\/\/doi.org\/10.1007\/s11042-016-3795-2","journal-title":"Multimed. Tools. Appl."},{"key":"31_CR20","unstructured":"Oktay, O., Schlemper, J., Folgoc, L.: Attention U-net: learning where to look for the pancreas (2018). https:\/\/arxiv.org\/abs\/1804.03999v3"},{"key":"31_CR21","doi-asserted-by":"publisher","unstructured":"Mahfoudi, G., Tajini, B., Retraint, F., Morain-Nicolier, F., Pic, M.: Defacto: image and face manipulation dataset. In: 27th European Signal Processing Conference (EUSIPCO), pp. 1\u20135 (2019). https:\/\/doi.org\/10.23919\/EUSIPCO.2019.8903181","DOI":"10.23919\/EUSIPCO.2019.8903181"}],"container-title":["Lecture Notes in Computer Science","Advances in Brain Inspired Cognitive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1417-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T07:10:58Z","timestamp":1716275458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1417-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819714162","9789819714179"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1417-9_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Brain Inspired Cognitive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kuala Lumpur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}