{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:34:20Z","timestamp":1776922460451,"version":"3.51.2"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902102"],"award-info":[{"award-number":["61902102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LQ19F020004"],"award-info":[{"award-number":["LQ19F020004"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16131-0","type":"journal-article","created":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T07:01:26Z","timestamp":1691046086000},"page":"20587-20604","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["MSA-Net: Multi-scale attention network for image splicing localization"],"prefix":"10.1007","volume":"83","author":[{"given":"Caiping","family":"Yan","sequence":"first","affiliation":[]},{"given":"Huajian","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Lan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8149-9047","authenticated-orcid":false,"given":"Hong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,3]]},"reference":[{"issue":"20","key":"16131_CR1","doi-asserted-by":"publisher","first-page":"20799","DOI":"10.1007\/s11042-016-3964-3","volume":"76","author":"G Bhartiya","year":"2017","unstructured":"Bhartiya G, Jalal AS (2017) Forgery detection using feature-clustering in recompressed jpeg images. Multimedia Tools and Applications 76(20):20799\u201320814","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"16131_CR2","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inf Forensics Secur, 7(3):1003\u20131017","journal-title":"IEEE Trans Inf Forensics Secur,"},{"key":"16131_CR3","doi-asserted-by":"crossref","unstructured":"Bi X, Wei Y, Xiao B, Li W (2019) Rru-net: The ringed residual u-net for image splicing forgery detection. In: 2019 IEEE\/CVF Conf Comput Vis Pattern Recognition Workshops (CVPRW), 30\u201339","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"16131_CR4","doi-asserted-by":"crossref","unstructured":"Charpe J, Bhattacharya A, (2015) Revealing image forgery through image manipulation detection. Glob Conf Commun Technol (GCCT), 723\u2013727","DOI":"10.1109\/GCCT.2015.7342759"},{"key":"16131_CR5","doi-asserted-by":"crossref","unstructured":"Charpe J, Bhattacharya A, (2015) Revealing image forgery through image manipulation detection. Glob Conf Commun Technol (GCCT), 723\u2013727","DOI":"10.1109\/GCCT.2015.7342759"},{"key":"16131_CR6","doi-asserted-by":"crossref","unstructured":"Chen L, Zhang H, Xiao J, Nie L, Shao J, Liu W, Chua TS (2017) Sca-cnn: Spatial and channel-wise attention in convolutional networks for image captioning. Proceedings of the IEEE Conf Comput Vis Pattern Recogn, 5659\u20135667","DOI":"10.1109\/CVPR.2017.667"},{"issue":"4","key":"16131_CR7","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1109\/TIFS.2014.2302078","volume":"9","author":"G Chierchia","year":"2014","unstructured":"Chierchia G, Poggi G, Sansone C, Verdoliva L (2014) A bayesian-mrf approach for prnu-based image forgery detection. IEEE Trans Inf Forensics Secur 9(4):554\u2013567","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"16131_CR8","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2019","unstructured":"Cozzolino D, Verdoliva L (2019) Noiseprint: a cnn-based camera model fingerprint. IEEE Trans Inf Forensics Secur, 15:144\u2013159","journal-title":"IEEE Trans Inf Forensics Secur,"},{"key":"16131_CR9","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Splicebuster: A new blind image splicing detector. IEEE Int Workshop Inf Forensics Secur, (WIFS), 1\u20136","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"16131_CR10","doi-asserted-by":"crossref","unstructured":"Dirik AE, Memon N (2009) Image tamper detection based on demosaicing artifacts. 16th IEEE Int Conf Image Process (ICIP), p 1497\u20131500","DOI":"10.1109\/ICIP.2009.5414611"},{"issue":"5","key":"16131_CR11","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566\u20131577","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"16131_CR12","doi-asserted-by":"crossref","unstructured":"Goularas D, Kamis S (2019) Evaluation of deep learning techniques in sentiment analysis from twitter data. Int Conf Deep Learn Mach Learn Emerg Appli, (Deep-ML), p 12\u201317","DOI":"10.1109\/Deep-ML.2019.00011"},{"key":"16131_CR13","doi-asserted-by":"crossref","unstructured":"Guo J (2022) Research on artificial intelligence: Deep learning to identify plant species. Int Conf Mach Learn Knowl Eng, (MLKE), p 59\u201366","DOI":"10.1109\/MLKE55170.2022.00017"},{"key":"16131_CR14","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. Proceedings of the IEEE Conf Comput Vis Pattern Recogn, 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"issue":"4","key":"16131_CR15","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TIFS.2016.2636089","volume":"12","author":"P Korus","year":"2016","unstructured":"Korus P, Huang J (2016) Multi-scale analysis strategies in prnu-based tampering localization. IEEE Trans Inf Forensics Secur 12(4):809\u2013824","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"16131_CR16","first-page":"2","volume":"6","author":"N Krawetz","year":"2007","unstructured":"Krawetz N, Solutions HF (2007) A picture\u2019s worth. Hacker Factor Solutions 6(2):2","journal-title":"Hacker Factor Solutions"},{"issue":"2","key":"16131_CR17","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TCSVT.2011.2160750","volume":"22","author":"CT Li","year":"2011","unstructured":"Li CT, Li Y (2011) Color-decoupled photo response non-uniformity for digital image forensics. IEEE Trans Circ Syst Vid Technol 22(2):260\u2013271","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"issue":"11","key":"16131_CR18","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin Z, He J, Tang X, Tang CK (2009) Fast, automatic, and fine-grained tampered jpeg image detection via dct coefficient analysis. Pattern Recogn. 42(11):2492\u20132501","journal-title":"Pattern Recogn."},{"key":"16131_CR19","doi-asserted-by":"crossref","unstructured":"Lin Z, He J, Tang X, Tang CK Fast, automatic and fine-grained tampered jpeg image detection via dct coefficient analysis. Pattern Recogn, 42(11):2492\u20132501","DOI":"10.1016\/j.patcog.2009.03.019"},{"key":"16131_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.ins.2020.03.099","volume":"526","author":"B Liu","year":"2020","unstructured":"Liu B, Pun CM (2020) Exposing splicing forgery in realistic scenes using deep fusion network. Inf Sc, 526:133\u2013150","journal-title":"Inf Sc,"},{"issue":"3","key":"16131_CR21","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang J, Qiu G (2010) Jpeg error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Secur, 5(3):480\u2013491","journal-title":"IEEE Trans Inf Forensics Secur,"},{"issue":"2","key":"16131_CR22","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/s11263-013-0688-y","volume":"110","author":"S Lyu","year":"2014","unstructured":"Lyu S, Pan X, Zhang X (2014) Exposing region splicing forgeries with blind local noise estimation. Int J of Comput Vis, 110(2):202\u2013221","journal-title":"Int J of Comput Vis,"},{"issue":"10","key":"16131_CR23","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vision Comput, 27(10):1497\u20131503","journal-title":"Image Vision Comput,"},{"key":"16131_CR24","doi-asserted-by":"publisher","first-page":"133488","DOI":"10.1109\/ACCESS.2020.3009877","volume":"8","author":"F Marra","year":"2020","unstructured":"Marra F, Gragnaniello D, Verdoliva L, Poggi G (2020) A full-image full-resolution end-to-end-trainable cnn framework for image forgery detection. IEEE Access 8:133488\u2013133502","journal-title":"IEEE Access"},{"key":"16131_CR25","doi-asserted-by":"publisher","first-page":"133488","DOI":"10.1109\/ACCESS.2020.3009877","volume":"8","author":"F Marra","year":"2020","unstructured":"Marra F, Gragnaniello D, Verdoliva L, Poggi G (2020) A full-image full-resolution end-to-end-trainable cnn framework for image forgery detection. IEEE Access 8:133488\u2013133502","journal-title":"IEEE Access"},{"key":"16131_CR26","doi-asserted-by":"crossref","unstructured":"Meena KB, Tyagi V (2021) Image splicing forgery detection using noise level estimation. Multimedia Tools and Applications, 1\u201318","DOI":"10.1007\/s11042-021-11483-x"},{"key":"16131_CR27","doi-asserted-by":"crossref","unstructured":"Popescu AC, Farid H (2004) Statistical tools for digital forensics. Int Workshop Inf Hiding, p 128\u2013147","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"16131_CR28","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: Convolutional networks for biomedical image segmentation. International Conference on Medical Image Computing and Computer-assisted Intervention, p 234\u2013241, Springer","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"16131_CR29","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum R, Ren Y, Kuo CCJ (2018) Image splicing localization using a multi-task fully convolutional network (mfcn). J Vis Commun Image Represent, 51:201\u2013209","journal-title":"J Vis Commun Image Represent,"},{"key":"16131_CR30","unstructured":"Springenberg JT, Dosovitskiy A, Brox T, Riedmiller MA (2015) Striving for simplicity: The all convolutional net. CoRR abs arxiv:1412.6806"},{"issue":"8","key":"16131_CR31","doi-asserted-by":"publisher","first-page":"2736","DOI":"10.1109\/TCSVT.2019.2922309","volume":"30","author":"J Wang","year":"2019","unstructured":"Wang J, Wang H, Li J, Luo X, Shi YQ, Jha SK (2019) Detecting double jpeg compressed color images with the same quantization matrix in spherical coordinates. IEEE Trans Circ Syst Vid Technol, 30(8):2736\u20132749","journal-title":"IEEE Trans Circ Syst Vid Technol,"},{"key":"16131_CR32","doi-asserted-by":"crossref","unstructured":"Wang X, Girshick R, Gupta A, He K (2018) Non-local neural networks. IEEE\/CVF Conf Comput Vis Pattern Recog, p 7794\u20137803","DOI":"10.1109\/CVPR.2018.00813"},{"key":"16131_CR33","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee JY, Kweon IS (2018) Cbam: Convolutional block attention module. Proceedings of the European Conference on Computer Vision (ECCV), p 3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"16131_CR34","doi-asserted-by":"crossref","unstructured":"Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. Proceedings of the IEEE\/CVF Conf Comput Vis Pattern Recognit, 9543\u20139552","DOI":"10.1109\/CVPR.2019.00977"},{"key":"16131_CR35","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.ins.2019.09.038","volume":"511","author":"B Xiao","year":"2020","unstructured":"Xiao B, Wei Y, Bi X, Li W, Ma J (2020) Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Inf Sci 511:172\u2013191","journal-title":"Inf Sci"},{"issue":"11","key":"16131_CR36","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1109\/TIFS.2014.2359368","volume":"9","author":"J Yang","year":"2014","unstructured":"Yang J, Xie J, Zhu G, Kwong S, Shi YQ (2014) An effective method for detecting double jpeg compression with the same quantization matrix. IEEE Trans Inf Forensics Secur, 9(11):1933\u20131942","journal-title":"IEEE Trans Inf Forensics Secur,"},{"issue":"4","key":"16131_CR37","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1109\/TCSVT.2020.3003653","volume":"31","author":"J Yang","year":"2020","unstructured":"Yang J, Zhang Y, Zhu G, Kwong S (2020) A clustering-based framework for improving the performance of jpeg quantization step estimation. IEEE Trans Circ Syst Vid Technol, 31(4):1661\u20131672","journal-title":"IEEE Trans Circ Syst Vid Technol,"},{"key":"16131_CR38","doi-asserted-by":"crossref","unstructured":"YILDIRIM EO, ULUTAS G (2018) Markov-based image splicing detection in the dct high frequency region. Int Conf Artif Intell Data Process (IDAP), pp. 1\u20134 . IEEE","DOI":"10.1109\/IDAP.2018.8620870"},{"key":"16131_CR39","doi-asserted-by":"publisher","first-page":"478","DOI":"10.3390\/app8040478","volume":"8","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Wang H, Liu S, Durrani T (2018) Deep activation pooling for blind image quality assessment. Appl Sci, 8:478","journal-title":"Appl Sci,"},{"issue":"7","key":"16131_CR40","doi-asserted-by":"publisher","first-page":"4828","DOI":"10.1109\/TCSVT.2021.3123829","volume":"32","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Zhu G, Wu L, Kwong S, Zhang H, Zhou Y (2022) Multi-task se-network for image splicing localization. IEEE Trans Circ Syst Vid Technol, 32(7):4828\u20134840","journal-title":"IEEE Trans Circ Syst Vid Technol,"},{"key":"16131_CR41","unstructured":"Zhang Y, Goh J, Win LL, Thing VL (2016) Image region forgery detection: A deep learning approach. SG-CRC, 1\u201311"},{"key":"16131_CR42","doi-asserted-by":"crossref","unstructured":"Zhang R, Ni J (2020) A dense u-net with cross-layer intersection for detection and localization of image forgery. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2982\u20132986","DOI":"10.1109\/ICASSP40776.2020.9054068"},{"key":"16131_CR43","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. Proceedings of the IEEE Conf Comput Vis Pattern Recognit, 1053\u20131061","DOI":"10.1109\/CVPR.2018.00116"},{"key":"16131_CR44","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TIFS.2021.3070444","volume":"16","author":"P Zhuang","year":"2021","unstructured":"Zhuang P, Li H, Tan S, Li B, Huang J (2021) Image tampering localization using a dense fully convolutional network. IEEE Trans Inf Forensics Secur, 16:2986\u20132999","journal-title":"IEEE Trans Inf Forensics Secur,"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16131-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16131-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16131-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T16:15:41Z","timestamp":1729872941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16131-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,3]]},"references-count":44,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["16131"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16131-0","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,3]]},"assertion":[{"value":"30 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests\/Competing interests"}}]}}