{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:35:32Z","timestamp":1743143732364,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819985395"},{"type":"electronic","value":"9789819985401"}],"license":[{"start":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T00:00:00Z","timestamp":1703462400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T00:00:00Z","timestamp":1703462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8540-1_16","type":"book-chapter","created":{"date-parts":[[2023,12,24]],"date-time":"2023-12-24T18:01:32Z","timestamp":1703440892000},"page":"195-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bi-stream Multiscale Hamhead Networks with\u00a0Contrastive Learning for\u00a0Image Forgery Localization"],"prefix":"10.1007","author":[{"given":"Guo","family":"Li","sequence":"first","affiliation":[]},{"given":"Runjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenchao","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Yirong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuifa","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,25]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.jvcir.2018.12.022","volume":"58","author":"L Zheng","year":"2019","unstructured":"Zheng, L., Zhang, Y., Thing, V.L.: A survey on image tampering and its detection in real-world photos. J. Vis. Commun. Image Represent. 58, 380\u2013399 (2019)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P.: Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9543\u20139552 (2019)","DOI":"10.1109\/CVPR.2019.00977"},{"key":"16_CR3","doi-asserted-by":"publisher","unstructured":"Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: SPAN: spatial pyramid attention network for image manipulation localization. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12366, pp. 312\u2013328. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58589-1_19","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"16_CR4","unstructured":"Geng, Z., Guo, M.H., Chen, H., Li, X., Wei, K., Lin, Z.: Is attention better than matrix decomposition? arXiv preprint arXiv:2109.04553 (2021)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1053\u20131061 (2018)","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"11","key":"16_CR6","doi-asserted-by":"publisher","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","volume":"32","author":"X Liu","year":"2022","unstructured":"Liu, X., Liu, Y., Chen, J., Liu, X.: PSCC-net: progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Trans. Circuits Syst. Video Technol. 32(11), 7505\u20137517 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Chen, X., Dong, C., Ji, J., Cao, J., Li, X.: Image manipulation detection by multi-view multi-scale supervision. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 14185\u201314193 (2021)","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Kwon, M.J., Yu, I.J., Nam, S.H., Lee, H.K.: Cat-net: compression artifact tracing network for detection and localization of image splicing. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 375\u2013384 (2021)","DOI":"10.1109\/WACV48630.2021.00042"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Objectformer for image manipulation detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2364\u20132373 (2022)","DOI":"10.1109\/CVPR52688.2022.00240"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Hao, J., Zhang, Z., Yang, S., Xie, D., Pu, S.: Transforensics: image forgery localization with dense self-attention. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 15055\u201315064 (2021)","DOI":"10.1109\/ICCV48922.2021.01478"},{"key":"16_CR11","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"16_CR12","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607. PMLR (2020)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhou, T., Yu, F., Dai, J., Konukoglu, E., Van Gool, L.: Exploring cross-image pixel contrast for semantic segmentation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7303\u20137313 (2021)","DOI":"10.1109\/ICCV48922.2021.00721"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Niloy, F.F., Bhaumik, K.K., Woo, S.S.: CFL-Net: image forgery localization using contrastive learning. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 4642\u20134651 (2023)","DOI":"10.1109\/WACV56688.2023.00462"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., Feichtenhofer, C., Darrell, T., Xie, S.: A convnet for the 2020s. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11976\u201311986 (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp. 422\u2013426. IEEE (2013)","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Guan, H., et al.: MFC datasets: large-scale benchmark datasets for media forensic challenge evaluation. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 63\u201372. IEEE (2019)","DOI":"10.1109\/WACVW.2019.00018"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Novozamsky, A., Mahdian, B., Saic, S.: IMD 2020: a large-scale annotated dataset tailored for detecting manipulated images. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops, pp. 71\u201380 (2020)","DOI":"10.1109\/WACVW50321.2020.9096940"},{"issue":"4","key":"16_CR19","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"LC Chen","year":"2017","unstructured":"Chen, L.C., Papandreou, G., Kokkinos, I., Murphy, K., Yuille, A.L.: Deeplab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans. Pattern Anal. Mach. Intell. 40(4), 834\u2013848 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"He, T., Li, Z., Gong, Y., Yao, Y., Nie, X., Yin, Y.: Exploring linear feature disentanglement for neural networks. In: 2022 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136. IEEE (2022)","DOI":"10.1109\/ICME52920.2022.9859978"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8540-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,24]],"date-time":"2023-12-24T18:03:40Z","timestamp":1703441020000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8540-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,25]]},"ISBN":["9789819985395","9789819985401"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8540-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,25]]},"assertion":[{"value":"25 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/prcv2023.xmu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1420","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"532","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,78","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,69","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}