{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T01:00:20Z","timestamp":1769562020671,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771168"],"award-info":[{"award-number":["61771168"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21327-1","type":"journal-article","created":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T11:58:43Z","timestamp":1769515123000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel video region tampering detection method based on deep neural network"],"prefix":"10.1007","volume":"85","author":[{"given":"Hao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,27]]},"reference":[{"key":"21327_CR1","doi-asserted-by":"publisher","unstructured":"Chen H, Han Q, Li Q, Tong X (2021) Image steganalysis with multi-scale residual network. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-021-11611-7","DOI":"10.1007\/s11042-021-11611-7"},{"key":"21327_CR2","unstructured":"Sahoo SR (2020) Defending multimedia content embedded in online social networks (osns) using digital watermarking"},{"issue":"9\u201310","key":"21327_CR3","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/s12243-017-0605-4","volume":"72","author":"BB Gupta","year":"2017","unstructured":"Gupta BB, Akhtar T (2017) A survey on smart power grid: frameworks, tools, security issues, and solutions. Ann Telecommun 72(9\u201310):517\u2013549","journal-title":"Ann Telecommun"},{"key":"21327_CR4","doi-asserted-by":"crossref","unstructured":"Quamara M, Gupta BB (2018) A dynamic security policies generation model for access control in smart card based applications. In: 10th International Symposium on Cyberspace Safety and Security, CSS 2018","DOI":"10.1007\/978-3-030-01689-0_11"},{"key":"21327_CR5","first-page":"1","volume":"20","author":"NA Shelke","year":"2020","unstructured":"Shelke NA, Kasana SS (2020) A comprehensive survey on passive techniques for digital video forgery detection. Multimed Tools Appl 20:1\u201364","journal-title":"Multimed Tools Appl"},{"key":"21327_CR6","unstructured":"Psr A, Sks B (2021) Real time object-based video forgery detection using yolo (v2). Forensic Science International"},{"key":"21327_CR7","doi-asserted-by":"crossref","unstructured":"Su Y, Xia H, Liang Q, Nie W (2021) Exposing deepfake videos using attention based convolutional lstm network. Neural Processing Letters (5)","DOI":"10.1007\/s11063-021-10588-6"},{"issue":"6","key":"21327_CR8","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2017","unstructured":"Ren S, He K, Girshick R, Sun J (2017) Faster r-cnn: Towards real-time object detection with region proposal networks. IEEE Trans Pattern Anal Mach Intell 39(6):1137\u20131149","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"21327_CR9","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Deep residual learning for image recognition. CoRR arXiv:1512.03385","DOI":"10.1109\/CVPR.2016.90"},{"key":"21327_CR10","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. In: 2018 IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","DOI":"10.1109\/CVPR.2018.00116"},{"key":"21327_CR11","doi-asserted-by":"publisher","unstructured":"Wei X, Wu Y, Dong F, Zhang J, Sun S (2019) Developing an image manipulation detection algorithm based on edge detection and faster r-cnn. Symmetry 11(10). https:\/\/doi.org\/10.3390\/sym11101223. https:\/\/www.mdpi.com\/2073-8994\/11\/10\/1223","DOI":"10.3390\/sym11101223"},{"issue":"4","key":"21327_CR12","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TIFS.2010.2074194","volume":"5","author":"M Kobayashi","year":"2010","unstructured":"Kobayashi M, Okabe T, Sato Y (2010) Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans Inf Forensics Secur 5(4):883\u2013892","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"21327_CR13","doi-asserted-by":"crossref","unstructured":"Bestagini P, Milani S, Tagliasacchi M, Tubaro S (2013) Local tampering detection in video sequences. In: Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on","DOI":"10.1109\/MMSP.2013.6659337"},{"key":"21327_CR14","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.forsciint.2013.12.022","volume":"236","author":"C Richao","year":"2014","unstructured":"Richao C, Gaobo Y, Ningbo Z (2014) Detection of object-based manipulation by the statistical features of object contour. Forensic Sci Int 236:164\u2013169","journal-title":"Forensic Sci Int"},{"key":"21327_CR15","doi-asserted-by":"crossref","unstructured":"Bidokhti A, Ghaemmaghami S (2015) Detection of regional copy\/move forgery in mpeg videos using optical flow. In: International symposium on artificial intelligence and signal processing","DOI":"10.1109\/AISP.2015.7123529"},{"key":"21327_CR16","doi-asserted-by":"crossref","unstructured":"Wan W, Jiang X, Wang S, Meng W, Sun T (2013) Identifying video forgery process using optical flow. In: 12th International Workshop on Digital-Forensics and Watermarking (IWDW)","DOI":"10.1007\/978-3-662-43886-2_18"},{"issue":"11","key":"21327_CR17","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1109\/TCSVT.2015.2473436","volume":"26","author":"S Chen","year":"2016","unstructured":"Chen S, Tan S, Li B, Huang J (2016) Automatic detection of object-based forgery in advanced video. IEEE Trans Circ Syst Video Technol 26(11):2138\u20132151","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"21327_CR18","doi-asserted-by":"crossref","unstructured":"Raskar PS, Shah SK (2022) Vfdhsog: Copy-move video forgery detection using histogram of second order gradients. Wireless Personal Communications, pp 1\u201338","DOI":"10.1007\/s11277-021-08964-5"},{"issue":"11","key":"21327_CR19","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen J, Kang X, Ye L, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849\u20131853","journal-title":"IEEE Signal Process Lett"},{"key":"21327_CR20","doi-asserted-by":"crossref","unstructured":"Rota P, Sangineto E, Conotter V, Pramerdorfer C (2016) Bad teacher or unruly student: Can deep learning say something in image forensics analysis?. In: 2016 23rd International conference on pattern recognition (ICPR) (2016)","DOI":"10.1109\/ICPR.2016.7900012"},{"key":"21327_CR21","doi-asserted-by":"crossref","unstructured":"Bappy M, Roy-Chowdhury AK, Bunk J, Nataraj L, Manjunath BS (2017) Exploiting spatial structure for localizing manipulated image regions. In: IEEE international conference on computer vision","DOI":"10.1109\/ICCV.2017.532"},{"key":"21327_CR22","doi-asserted-by":"crossref","unstructured":"Fridrich J (2012) Rich models for steganalysis of digital images. IEEE transactions on information forensics and security","DOI":"10.1109\/TIFS.2012.2190402"},{"issue":"1167","key":"21327_CR23","first-page":"187","volume":"207","author":"D Marr","year":"1980","unstructured":"Marr D, Hildreth E (1980) Theory of edge detection. Proc R Soc Lond 207(1167):187\u2013217","journal-title":"Proc R Soc Lond"},{"key":"21327_CR24","unstructured":"Prewitt (1970) Object enhancement and extraction. Pict. Process, Psychopictorics"},{"key":"21327_CR25","doi-asserted-by":"crossref","unstructured":"Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"21327_CR26","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: IEEE workshop on information forensic and security","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"21327_CR27","doi-asserted-by":"crossref","unstructured":"Zhong Z, Jin L, Huang S (2016) Deeptext: A unified framework for text proposal generation and text detection in natural images. In: IEEE international conference on acoustics, pp 1208\u20131212","DOI":"10.1109\/ICASSP.2017.7952348"},{"key":"21327_CR28","unstructured":"Vfdd2.1 dataset. http:\/\/www2.scut.edu.cn\/misip\/2019\/0117\/c5384a303961\/page.htm"},{"key":"21327_CR29","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Hays J, Zitnick CL (2014) Microsoft coco: Common objects in context. Springer International Publishing","DOI":"10.1007\/978-3-319-10602-1_48"},{"issue":"012","key":"21327_CR30","first-page":"57","volume":"045","author":"YJ Hu","year":"2017","unstructured":"Hu YJ, Salman A, Wang YF, Liu FB, Li M (2017) Construction and testing of video tampering detection database. J South China Univ Technol 045(012):57\u201364","journal-title":"J South China Univ Technol"},{"issue":"002","key":"21327_CR31","first-page":"347","volume":"036","author":"JC Li","year":"2018","unstructured":"Li JC, Hu YJ, Mohammed AA, Xiong YC, Wen DX, Ren YY, Liao GJ (2018) Expansion of video forgery detection database and validation of its effectiveness. J Appl Sci 036(002):347\u2013361","journal-title":"J Appl Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21327-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21327-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21327-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T11:58:48Z","timestamp":1769515128000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21327-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,27]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["21327"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21327-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,27]]},"assertion":[{"value":"7 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"34"}}