{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:39:35Z","timestamp":1777657175533,"version":"3.51.4"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T00:00:00Z","timestamp":1659571200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T00:00:00Z","timestamp":1659571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972282"],"award-info":[{"award-number":["61972282"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Opening Project of State Key Laboratory of Digital Publishing Technology","award":["Cndplab-2019-Z001"],"award-info":[{"award-number":["Cndplab-2019-Z001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s00371-022-02620-0","type":"journal-article","created":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T17:02:47Z","timestamp":1659632567000},"page":"4721-4735","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A transformer\u2013CNN for deep image inpainting forensics"],"prefix":"10.1007","volume":"39","author":[{"given":"Xinshan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Junyan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Honghao","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Hongquan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4124-9350","authenticated-orcid":false,"given":"Biao","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,4]]},"reference":[{"issue":"11","key":"2620_CR1","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691\u20132706 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2620_CR2","doi-asserted-by":"crossref","unstructured":"Chen, H., Han, Q., Li, Q., Tong, X.: Digital image manipulation detection with weak feature stream. The Vis. Comput. 1\u201315 (2021)","DOI":"10.1007\/s00371-021-02146-x"},{"key":"2620_CR3","first-page":"102506","volume":"53","author":"H Gao","year":"2020","unstructured":"Gao, H., Gao, T., Cheng, R.: Robust detection of median filtering based on data-pair histogram feature and local configuration pattern. J. Inf. Secur. Appl. 53, 102506 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"2620_CR4","doi-asserted-by":"publisher","first-page":"102967","DOI":"10.1016\/j.jvcir.2020.102967","volume":"73","author":"B Chen","year":"2020","unstructured":"Chen, B., Qi, X., Zhou, Y., Yang, G., Zheng, Y., Xiao, B.: Image splicing localization using residual image and residual-based fully convolutional network. J. Vis. Commun. Image Represent. 73, 102967 (2020)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"2620_CR5","doi-asserted-by":"crossref","unstructured":"Huh, M., Liu, A., Owens, A., Efros, A.A.: Fighting fake news: Image splice detection via learned self-consistency. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 101\u2013117 (2018)","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"2620_CR6","doi-asserted-by":"publisher","first-page":"103032","DOI":"10.1016\/j.dsp.2021.103032","volume":"113","author":"J Yang","year":"2021","unstructured":"Yang, J., Liang, Z., Gan, Y., Zhong, J.: A novel copy-move forgery detection algorithm via two-stage filtering. Dig. Sig. Process. 113, 103032 (2021)","journal-title":"Dig. Sig. Process."},{"key":"2620_CR7","doi-asserted-by":"crossref","unstructured":"Bertalmio, M., Sapiro, G., Caselles, V., Ballester, C.: Image inpainting. In: Proceedings of the 27th annual conference on Computer graphics and interactive techniques, pp. 417\u2013424 (2000)","DOI":"10.1145\/344779.344972"},{"issue":"4","key":"2620_CR8","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1006\/jvci.2001.0487","volume":"12","author":"TF Chan","year":"2001","unstructured":"Chan, T.F., Shen, J.: Nontexture inpainting by curvature-driven diffusions. J. Vis. Commun. Image Represent. 12(4), 436\u2013449 (2001)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"4","key":"2620_CR9","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1017\/S0956792502004904","volume":"13","author":"S Esedoglu","year":"2002","unstructured":"Esedoglu, S., Shen, J.: Digital inpainting based on the Mumford-Shah-Euler image model. Eur. J. Appl. Math. 13(4), 353\u2013370 (2002)","journal-title":"Eur. J. Appl. Math."},{"issue":"3","key":"2620_CR10","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1137\/S0036139900368844","volume":"62","author":"J Shen","year":"2002","unstructured":"Shen, J., Chan, T.F.: Mathematical models for local nontexture inpaintings. SIAM J. Appl. Math. 62(3), 1019\u20131043 (2002)","journal-title":"SIAM J. Appl. Math."},{"key":"2620_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhang, H., Liu, L., Tao, J., Zhang, Q., Yang, K., Xia, R., Xie, J.: Research on image inpainting algorithm of improved total variation minimization method. J. Ambient Intell. Humaniz. Comput. 1\u201310 (2021)","DOI":"10.1007\/s12652-020-02778-2"},{"issue":"9","key":"2620_CR12","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TIP.2004.833105","volume":"13","author":"A Criminisi","year":"2004","unstructured":"Criminisi, A., P\u00e9rez, P., Toyama, K.: Region filling and object removal by exemplar-based image inpainting. IEEE Trans. Image Process. 13(9), 1200\u20131212 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"2620_CR13","doi-asserted-by":"crossref","unstructured":"Grossauer, H.: A combined PDE and texture synthesis approach to inpainting. In: European conference on computer vision, pp. 214\u2013224. Springer (2004)","DOI":"10.1007\/978-3-540-24671-8_17"},{"key":"2620_CR14","doi-asserted-by":"crossref","unstructured":"Hays, J., Efros, A.A.: Scene completion using millions of photographs. ACM Trans. Graph. (ToG) 26(3), 4\u2013es (2007)","DOI":"10.1145\/1276377.1276382"},{"issue":"7","key":"2620_CR15","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.1007\/s00371-020-01932-3","volume":"37","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Liu, L., Tao, J., Xia, R., Zhang, Q., Yang, K., Xiong, J., Chen, X.: The improved image inpainting algorithm via encoder and similarity constraint. Vis. Comput. 37(7), 1691\u20131705 (2021)","journal-title":"Vis. Comput."},{"key":"2620_CR16","doi-asserted-by":"crossref","unstructured":"Yu, J., Lin, Z., Yang, J., Shen, X., Lu, X., Huang, T.S.: Free-form image inpainting with gated convolution. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 4471\u20134480 (2019)","DOI":"10.1109\/ICCV.2019.00457"},{"key":"2620_CR17","unstructured":"Zhao, S., Cui, J., Sheng, Y., Dong, Y., Liang, X., Chang, E.I., Xu, Y.: Large scale image completion via co-modulated generative adversarial networks. In: International Conference on Learning Representations (ICLR) (2021)"},{"key":"2620_CR18","doi-asserted-by":"crossref","unstructured":"Zheng, C., Cham, T.J., Cai, J.: Pluralistic image completion. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1438\u20131447 (2019)","DOI":"10.1109\/CVPR.2019.00153"},{"key":"2620_CR19","doi-asserted-by":"crossref","unstructured":"Suvorov, R., Logacheva, E., Mashikhin, A., Remizova, A., Ashukha, A., Silvestrov, A., Kong, N., Goka, H., Park, K., Lempitsky, V.: Resolution-robust large mask inpainting with fourier convolutions. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 2149\u20132159 (2022)","DOI":"10.1109\/WACV51458.2022.00323"},{"issue":"7","key":"2620_CR20","doi-asserted-by":"publisher","first-page":"4367","DOI":"10.1007\/s10489-020-02116-1","volume":"51","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Liu, L., Phonevilay, V., Gu, K., Xia, R., Xie, J., Zhang, Q., Yang, K.: Image super-resolution reconstruction based on feature map attention mechanism. Appl. Intell. 51(7), 4367\u20134380 (2021)","journal-title":"Appl. Intell."},{"key":"2620_CR21","doi-asserted-by":"crossref","unstructured":"Wan, Z., Zhang, J., Chen, D., Liao, J.: High-fidelity pluralistic image completion with transformers. arXiv preprint arXiv:2103.14031 (2021)","DOI":"10.1109\/ICCV48922.2021.00465"},{"issue":"1","key":"2620_CR22","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.imavis.2012.09.002","volume":"31","author":"IC Chang","year":"2013","unstructured":"Chang, I.C., Yu, J.C., Chang, C.C.: A forgery detection algorithm for exemplar-based inpainting images using multi-region relation. Image Vis. Comput. 31(1), 57\u201371 (2013)","journal-title":"Image Vis. Comput."},{"issue":"12","key":"2620_CR23","doi-asserted-by":"publisher","first-page":"3050","DOI":"10.1109\/TIFS.2017.2730822","volume":"12","author":"H Li","year":"2017","unstructured":"Li, H., Luo, W., Huang, J.: Localization of diffusion-based inpainting in digital images. IEEE Trans. Inf. Forensics Secur. 12(12), 3050\u20133064 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"2620_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-6180-2012-1","volume":"2012","author":"XH Li","year":"2012","unstructured":"Li, X.H., Zhao, Y.Q., Liao, M., Shih, F.Y., Shi, Y.Q.: Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP J. Adv. Sig. Process. 2012(1), 1\u201310 (2012)","journal-title":"EURASIP J. Adv. Sig. Process."},{"key":"2620_CR25","doi-asserted-by":"crossref","unstructured":"Li, H., Huang, J.: Localization of deep inpainting using high-pass fully convolutional network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 8301\u20138310 (2019)","DOI":"10.1109\/ICCV.2019.00839"},{"key":"2620_CR26","first-page":"90","volume":"67","author":"X Zhu","year":"2018","unstructured":"Zhu, X., Qian, Y., Zhao, X., Sun, B., Sun, Y.: A deep learning approach to patch-based image inpainting forensics. Sig. Process.: Image Commun. 67, 90\u201399 (2018)","journal-title":"Sig. Process.: Image Commun."},{"key":"2620_CR27","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, Y., Chen, J., Liu, X.: PSCC-Net: progressive spatio-channel correlation network for image manipulation detection and localization. arXiv preprint arXiv:2103.10596 (2021)","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"2620_CR28","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I.: Attention is all you need. In: Adv. Neural Inf. Process. Syst. 5998\u20136008 (2017)"},{"key":"2620_CR29","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., et\u00a0al.: An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"2620_CR30","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z., Lin, S., Guo, B.: Swin transformer: hierarchical vision transformer using shifted windows. In: International Conference on Computer Vision (ICCV) (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2620_CR31","doi-asserted-by":"crossref","unstructured":"Zheng, S., Lu, J., Zhao, H., Zhu, X., Luo, Z., Wang, Y., Fu, Y., Feng, J., Xiang, T., Torr, P.H., et\u00a0al.: Rethinking semantic segmentation from a sequence-to-sequence perspective with transformers. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6881\u20136890 (2021)","DOI":"10.1109\/CVPR46437.2021.00681"},{"key":"2620_CR32","doi-asserted-by":"crossref","unstructured":"Wu, Q., Sun, S.J., Zhu, W., Li, G.H., Tu, D.: Detection of digital doctoring in exemplar-based inpainted images. In: 2008 International Conference on Machine Learning and Cybernetics, vol.\u00a03, pp. 1222\u20131226. IEEE (2008)","DOI":"10.1109\/ICMLC.2008.4620591"},{"key":"2620_CR33","doi-asserted-by":"crossref","unstructured":"Bacchuwar, K.S., Ramakrishnan, K., et\u00a0al.: A jump patch-block match algorithm for multiple forgery detection. In: 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), pp. 723\u2013728. IEEE (2013)","DOI":"10.1109\/iMac4s.2013.6526502"},{"issue":"3","key":"2620_CR34","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","volume":"5","author":"MC Stamm","year":"2010","unstructured":"Stamm, M.C., Liu, K.R.: Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 5(3), 492\u2013506 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"2620_CR35","doi-asserted-by":"publisher","first-page":"11823","DOI":"10.1007\/s11042-017-4829-0","volume":"77","author":"D Zhang","year":"2018","unstructured":"Zhang, D., Liang, Z., Yang, G., Li, Q., Li, L., Sun, X.: A robust forgery detection algorithm for object removal by exemplar-based image inpainting. Multimed. Tools Appl. 77(10), 11823\u201311842 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"16","key":"2620_CR36","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1016\/j.ijleo.2012.08.018","volume":"124","author":"YQ Zhao","year":"2013","unstructured":"Zhao, Y.Q., Liao, M., Shih, F.Y., Shi, Y.Q.: Tampered region detection of inpainting JPEG images. Optik 124(16), 2487\u20132492 (2013)","journal-title":"Optik"},{"key":"2620_CR37","doi-asserted-by":"crossref","unstructured":"Liu, Q., Sung, A.H., Zhou, B., Qiao, M.: Exposing inpainting forgery in JPEG images under recompression attacks. In: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 164\u2013169. IEEE (2016)","DOI":"10.1109\/ICMLA.2016.0035"},{"key":"2620_CR38","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/LSP.2020.2966888","volume":"27","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Liao, Y., Zhu, X., Wang, H., Ding, J.: A deep learning approach in the discrete cosine transform domain to median filtering forensics. IEEE Sig. Process. Lett. 27, 276\u2013280 (2020)","journal-title":"IEEE Sig. Process. Lett."},{"key":"2620_CR39","doi-asserted-by":"crossref","unstructured":"Nair, G., Venkatesh, K., Sen, D., Sonkusare, R.: Identification of multiple copy-move attacks in digital images using FFT and CNN. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/ICCCNT51525.2021.9580052"},{"key":"2620_CR40","doi-asserted-by":"crossref","unstructured":"Amerini, I., Uricchio, T., Ballan, L., Caldelli, R.: Localization of JPEG double compression through multi-domain convolutional neural networks. In: 2017 IEEE Conference on computer vision and pattern recognition workshops (CVPRW), pp. 1865\u20131871. IEEE (2017)","DOI":"10.1109\/CVPRW.2017.233"},{"key":"2620_CR41","doi-asserted-by":"crossref","unstructured":"Chen, H., Han, Q., Li, Q., Tong, X.: A novel general blind detection model for image forensics based on DNN. The Vis. Comput. 1\u201316 (2021)","DOI":"10.1007\/s00371-021-02310-3"},{"key":"2620_CR42","doi-asserted-by":"crossref","unstructured":"Khan, M.J., Khan, M.J., Siddiqui, A.M., Khurshid, K.: An automated and efficient convolutional architecture for disguise-invariant face recognition using noise-based data augmentation and deep transfer learning. The Vis. Comput. 1\u201315 (2021)","DOI":"10.1007\/s00371-020-02031-z"},{"issue":"8","key":"2620_CR43","doi-asserted-by":"publisher","first-page":"2369","DOI":"10.1007\/s00371-020-01992-5","volume":"37","author":"V Vinolin","year":"2021","unstructured":"Vinolin, V., Sucharitha, M.: Dual adaptive deep convolutional neural network for video forgery detection in 3D lighting environment. Vis. Comput. 37(8), 2369\u20132390 (2021)","journal-title":"Vis. Comput."},{"issue":"5","key":"2620_CR44","doi-asserted-by":"publisher","first-page":"858","DOI":"10.3390\/electronics9050858","volume":"9","author":"M Lu","year":"2020","unstructured":"Lu, M., Niu, S.: A detection approach using LSTM-CNN for object removal caused by exemplar-based image inpainting. Electronics 9(5), 858 (2020)","journal-title":"Electronics"},{"issue":"3","key":"2620_CR45","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1109\/TCSVT.2021.3075039","volume":"32","author":"H Wu","year":"2021","unstructured":"Wu, H., Zhou, J.: IID-Net: Image inpainting detection network via neural architecture search and attention. IEEE Trans. Circuits Syst. Video Technol. 32(3), 1172\u201385 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2620_CR46","doi-asserted-by":"crossref","unstructured":"Wang, X., Wang, H., Niu, S.: An image forensic method for AI inpainting using faster R-CNN. In: International Conference on Artificial Intelligence and Security, pp. 476\u2013487. Springer (2019)","DOI":"10.1007\/978-3-030-24271-8_43"},{"key":"2620_CR47","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: Towards real-time object detection with region proposal networks. Adv. Neural Inf. Process. Systems 28 (2015)"},{"key":"2620_CR48","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"1","key":"2620_CR49","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1080\/02564602.2020.1782274","volume":"38","author":"X Wang","year":"2021","unstructured":"Wang, X., Niu, S., Wang, H.: Image inpainting detection based on multi-task deep learning network. IETE Tech. Rev. 38(1), 149\u2013157 (2021)","journal-title":"IETE Tech. Rev."},{"key":"2620_CR50","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask R-CNN. In: Proceedings of the IEEE international conference on computer vision, pp. 2961\u20132969 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"issue":"3","key":"2620_CR51","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2620_CR52","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1053\u20131061 (2018)","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"6","key":"2620_CR53","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1109\/TPAMI.2017.2723009","volume":"40","author":"B Zhou","year":"2017","unstructured":"Zhou, B., Lapedriza, A., Khosla, A., Oliva, A., Torralba, A.: Places: A 10 million image database for scene recognition. IEEE Trans. Pattern Anal. Mach. Intell. 40(6), 1452\u20131464 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"2620_CR54","doi-asserted-by":"publisher","first-page":"4237","DOI":"10.1007\/s11042-020-09887-2","volume":"80","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Liu, L., Tao, J., Chen, X., Xia, R., Zhang, Q., Xiong, J., Yang, K., Xie, J.: The image annotation algorithm using convolutional features from intermediate layer of deep learning. Multimed. Tools Appl. 80(3), 4237\u20134261 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"2620_CR55","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In: Proceedings of the IEEE international conference on computer vision, pp. 1026\u20131034 (2015)","DOI":"10.1109\/ICCV.2015.123"},{"key":"2620_CR56","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. In: International Conference on Learning Representations (2018)"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02620-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-022-02620-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02620-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T19:17:43Z","timestamp":1727723863000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-022-02620-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,4]]},"references-count":56,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["2620"],"URL":"https:\/\/doi.org\/10.1007\/s00371-022-02620-0","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,4]]},"assertion":[{"value":"7 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}