{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T21:37:39Z","timestamp":1772314659610,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072106"],"award-info":[{"award-number":["62072106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2020J01168"],"award-info":[{"award-number":["2020J01168"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2022J01188"],"award-info":[{"award-number":["2022J01188"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2022J01190"],"award-info":[{"award-number":["2022J01190"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University-industry Cooperation Project of Fujian Science and Technology Department","award":["2021H6004"],"award-info":[{"award-number":["2021H6004"]}]},{"name":"Educational Research Project for Young and Middle aged Teachers of Fujian Provincial Department of Education","award":["JAT210053"],"award-info":[{"award-number":["JAT210053"]}]},{"name":"Educational Research Project for Young and Middle aged Teachers of Fujian Provincial Department of Education","award":["JAT210051"],"award-info":[{"award-number":["JAT210051"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s13042-023-02031-0","type":"journal-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T11:02:12Z","timestamp":1701860532000},"page":"2323-2335","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["DSSE-net: dual stream skip edge-enhanced network with forgery loss for image forgery localization"],"prefix":"10.1007","volume":"15","author":[{"given":"Aokun","family":"Zheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0531-1759","authenticated-orcid":false,"given":"Tianqiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Liqing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,6]]},"reference":[{"key":"2031_CR1","doi-asserted-by":"crossref","unstructured":"Ghanim TM, Nabil AM (2018) Offline signature verification and forgery detection approach. Proceeding of the 2018 13th International Conference on computer Engineering and Systems (ICCES), 293\u2013298","DOI":"10.1109\/ICCES.2018.8639420"},{"issue":"5","key":"2031_CR2","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Selected Topics Signal Process 14(5):910\u2013932","journal-title":"IEEE J Selected Topics Signal Process"},{"key":"2031_CR3","doi-asserted-by":"publisher","first-page":"106685","DOI":"10.1016\/j.compeleceng.2020.106685","volume":"85","author":"WD Ferreira","year":"2020","unstructured":"Ferreira WD, Ferreira CB, Cruz J\u00fanior G, Soares F (2020) A review of digital image forensics. Comput Electrical Eng 85:106685","journal-title":"Comput Electrical Eng"},{"issue":"2","key":"2031_CR4","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1007\/s10462-022-10211-7","volume":"56","author":"G Kaur","year":"2023","unstructured":"Kaur G, Singh N, Kumar M (2023) Image forgery techniques: a review. Artif Intell Rev 56(2):1577\u20131625","journal-title":"Artif Intell Rev"},{"issue":"3","key":"2031_CR5","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1109\/TIFS.2011.2139209","volume":"6","author":"Q Liu","year":"2011","unstructured":"Liu Q, Cao X, Deng C, Guo X (2011) Identifying image composites through shadow matte consistency. IEEE Trans Inf Forensics Secur 6(3):1111\u20131122","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2031_CR6","doi-asserted-by":"publisher","first-page":"13215","DOI":"10.1007\/s11042-020-10326-5","volume":"80","author":"V Itier","year":"2021","unstructured":"Itier V, Strauss O, Morel L, Puech W (2021) Color noise correlation-based splicing detection for image forensics. Multimedia Tools Appl 80:13215\u201313233","journal-title":"Multimedia Tools Appl"},{"key":"2031_CR7","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s10044-020-00930-4","volume":"24","author":"AK Jaiswal","year":"2021","unstructured":"Jaiswal AK, Srivastava R (2021) Forensic image analysis using inconsistent noise pattern. Pattern Anal Appl 24:655\u2013667","journal-title":"Pattern Anal Appl"},{"issue":"5","key":"2031_CR8","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566\u20131577","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"2031_CR9","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TIFS.2011.2170836","volume":"7","author":"T Bianchi","year":"2011","unstructured":"Bianchi T, Piva A (2011) Detection of nonaligned double jpeg compression based on integer periodicity maps. IEEE Trans Inf Forensics Secur 7(2):842\u2013848","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"2031_CR10","doi-asserted-by":"publisher","first-page":"2257","DOI":"10.1109\/TIFS.2015.2424195","volume":"10","author":"V Conotter","year":"2015","unstructured":"Conotter V, Comesana P, Perez-Gonzalez F (2015) Forensic detection of processing operator chains: Recovering the history of filtered jpeg images. IEEE Trans Inf Forensics Secur 10(11):2257\u20132269","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2031_CR11","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2019","unstructured":"Cozzolino D, Verdoliva L (2019) Noiseprint: A cnn-based camera model fingerprint. IEEE Trans Inf Forensics Secur 15:144\u2013159","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"2031_CR12","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang J, Qiu G (2010) Jpeg error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Secur 5(3):480\u2013491","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"2031_CR13","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2031_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.patrec.2021.01.014","volume":"145","author":"F Bellavia","year":"2021","unstructured":"Bellavia F, Fanfani M, Colombo C, Piva A (2021) Experiencing with electronic image stabilization and prnu through scene content image registration. Pattern Recogn Lett 145:8\u201315","journal-title":"Pattern Recogn Lett"},{"issue":"1","key":"2031_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-020-0101-7","volume":"2020","author":"D Cozzolino","year":"2020","unstructured":"Cozzolino D, Marra F, Gragnaniello D, Poggi G, Verdoliva L (2020) Combining prnu and noiseprint for robust and efficient device source identification. EURASIP J Inf Secur 2020(1):1\u201312","journal-title":"EURASIP J Inf Secur"},{"key":"2031_CR16","doi-asserted-by":"crossref","unstructured":"Liu K, Li J, Hussain\u00a0Bukhari SS (2022) Overview of image inpainting and forensic technology. Security Commun Netw 2022","DOI":"10.1155\/2022\/9291971"},{"key":"2031_CR17","first-page":"609","volume":"2","author":"S Avidan","year":"2023","unstructured":"Avidan S, Shamir A (2023) Seam carving for content-aware image resizing. Seminal Graphics Papers: Pushing the Boundaries 2:609\u2013617","journal-title":"Seminal Graphics Papers: Pushing theBoundaries"},{"key":"2031_CR18","first-page":"1053","volume-title":"An efficient androbust method for detecting copy-move forgery","author":"S Bayram","year":"2009","unstructured":"Bayram S, Sencar HT, Memon N (2009) An efficient androbust method for detecting copy-move forgery. Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, pp 1053\u20131056"},{"issue":"1","key":"2031_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-015-0028-6","volume":"2016","author":"Q Wang","year":"2016","unstructured":"Wang Q, Zhang R (2016) Double jpeg compression forensics based on a convolutional neural network. EURASIP J Inf Secur 2016(1):1\u201312","journal-title":"EURASIP J Inf Secur"},{"key":"2031_CR20","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1053\u20131061","DOI":"10.1109\/CVPR.2018.00116"},{"key":"2031_CR21","doi-asserted-by":"crossref","unstructured":"Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 9543\u20139552","DOI":"10.1109\/CVPR.2019.00977"},{"key":"2031_CR22","doi-asserted-by":"crossref","unstructured":"Hu X, Zhang Z, Jiang Z, Chaudhuri S, Yang Z, Nevatia R (2020) Span: Spatial pyramid attention network for image manipulation localization. Proceedings of the Computer Vision\u2013ECCV 2020: 16th European Conference, 312\u2013328","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"2031_CR23","doi-asserted-by":"crossref","unstructured":"Niloy FF, Bhaumik KK, Woo SS (2023) Cfl-net: Image forgery localization using contrastive learning. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, 4642\u20134651","DOI":"10.1109\/WACV56688.2023.00462"},{"key":"2031_CR24","doi-asserted-by":"crossref","unstructured":"Das S, Islam M, Amin M, et al. (2022) Gca-net: utilizing gated context attention for improving image forgery localization and detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 81\u201390","DOI":"10.1109\/CVPRW56347.2022.00018"},{"key":"2031_CR25","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inform Process Syst 30:5998\u20136008"},{"key":"2031_CR26","doi-asserted-by":"crossref","unstructured":"Hao J, Zhang Z, Yang S, Xie D, Pu S (2021) Transforensics: image forgery localization with dense self-attention. Proceedings of the IEEE\/CVF International Conference on Computer Vision 15055\u201315064","DOI":"10.1109\/ICCV48922.2021.01478"},{"key":"2031_CR27","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TIFS.2022.3152362","volume":"17","author":"L Zhuo","year":"2022","unstructured":"Zhuo L, Tan S, Li B, Huang J (2022) Self-adversarial training incorporating forgery attention for image forgery localization. IEEE Trans Inf Forensics Secur 17:819\u2013834","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2031_CR28","doi-asserted-by":"crossref","unstructured":"Milletari F, Navab N, Ahmadi S-A (2016) V-net: Fully convolutional neural networks for volumetric medical image segmentation. Proceedings of the 2016 Fourth International Conference on 3D Vision, 565\u2013571","DOI":"10.1109\/3DV.2016.79"},{"key":"2031_CR29","doi-asserted-by":"crossref","unstructured":"Shrivastava A, Gupta A, Girshick R (2016) Training region-based object detectors with online hard example mining. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 761\u2013769","DOI":"10.1109\/CVPR.2016.89"},{"key":"2031_CR30","doi-asserted-by":"crossref","unstructured":"Lin T-Y, Goyal P, Girshick R, He K, Doll\u00e1r P (2017) Focal loss for dense object detection. Proceedings of the IEEE International Conference on Computer Vision 2980\u20132988","DOI":"10.1109\/ICCV.2017.324"},{"key":"2031_CR31","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: Convolutional networks for biomedical image segmentation. Proceedings of the Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18, 234\u2013241","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"2031_CR32","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"2031_CR33","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"2031_CR34","doi-asserted-by":"crossref","unstructured":"Guan H, Kozak M, Robertson E, Lee Y, Yates AN, Delgado A, Zhou D, Kheyrkhah T, Smith J, Fiscus J (2019) Mfc datasets: Large-scale benchmark datasets for media forensic challenge evaluation. Proceedings of the 2019 IEEE Winter Applications of Computer Vision Workshops, 63\u201372","DOI":"10.1109\/WACVW.2019.00018"},{"key":"2031_CR35","doi-asserted-by":"crossref","unstructured":"Hsu Y-F, Chang S-F (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 549\u2013552","DOI":"10.1109\/ICME.2006.262447"},{"issue":"7","key":"2031_CR36","doi-asserted-by":"publisher","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","volume":"28","author":"JH Bappy","year":"2019","unstructured":"Bappy JH, Simons C, Nataraj L, Manjunath B, Roy-Chowdhury AK (2019) Hybrid lstm and encoder-decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286\u20133300","journal-title":"IEEE Trans Image Process"},{"key":"2031_CR37","doi-asserted-by":"crossref","unstructured":"Lin T-Y, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Doll\u00e1r P, Zitnick CL (2014) Microsoft coco: Common objects in context. Proceedings of the Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, 740\u2013755","DOI":"10.1007\/978-3-319-10602-1_48"},{"issue":"2","key":"2031_CR38","first-page":"2","volume":"6","author":"N Krawetz","year":"2007","unstructured":"Krawetz N, Solutions HF (2007) A picture\u2019s worth. Hacker Factor. Solutions 6(2):2","journal-title":"Solutions"},{"issue":"10","key":"2031_CR39","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497\u20131503","journal-title":"Image Vis Comput"},{"key":"2031_CR40","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TIFS.2022.3144878","volume":"17","author":"H Wu","year":"2022","unstructured":"Wu H, Zhou J, Tian J, Liu J, Qiao Y (2022) Robust image forgery detection against transmission over online social networks. IEEE Trans Inf Forensics Secur 17:443\u2013456","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-023-02031-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-023-02031-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-023-02031-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T05:27:57Z","timestamp":1716442077000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-023-02031-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2031"],"URL":"https:\/\/doi.org\/10.1007\/s13042-023-02031-0","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,6]]},"assertion":[{"value":"12 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}