{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T22:16:56Z","timestamp":1773958616682,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:00:00Z","timestamp":1773878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:00:00Z","timestamp":1773878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Multimed Info Retr"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s13735-026-00399-7","type":"journal-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T18:26:15Z","timestamp":1773944775000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EGA-Net: An enhanced gated attention network for pixel-level image tampering localization"],"prefix":"10.1007","volume":"15","author":[{"given":"Yunxue","family":"Shao","sequence":"first","affiliation":[]},{"given":"Chuanyu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,19]]},"reference":[{"key":"399_CR1","doi-asserted-by":"crossref","unstructured":"Ojha U, Li Y, Lee YJ (2023) Towards universal fake image detectors that generalize across generative models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 24480\u201324489","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"399_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113033","volume":"310","author":"R Bai","year":"2025","unstructured":"Bai R (2025) Weakly-supervised cross-contrastive learning network for image manipulation detection and localization. Knowl-Based Syst 310:113033","journal-title":"Knowl-Based Syst"},{"key":"399_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2025.105114","volume":"161","author":"L Dou","year":"2025","unstructured":"Dou L, Chen M, Qiu J, Wang J (2025) Msf-net: Multi-stream fusion network for image manipulation detection and localization. Digital Signal Processing 161:105114","journal-title":"Digital Signal Processing"},{"key":"399_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111656","volume":"293","author":"Q Hao","year":"2024","unstructured":"Hao Q, Ren R, Wang K, Niu S, Zhang J, Wang M (2024) Ec-net: General image tampering localization network based on edge distribution guidance and contrastive learning. Knowl-Based Syst 293:111656","journal-title":"Knowl-Based Syst"},{"key":"399_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111992","volume":"164","author":"Y Luo","year":"2024","unstructured":"Luo Y, Liang C, Qin S, Liu J, Fu Q, Yang S (2024) A two-branch encoder-decoder network for image tampering localization. Appl Soft Comput 164:111992","journal-title":"Appl Soft Comput"},{"key":"399_CR6","doi-asserted-by":"crossref","unstructured":"Wu K, Li L, Li Q (2025) Agu2-net: Multi-scale $$u^{2}$$-net enhanced by attention gate mechanism for image tampering localization. IEEE Access","DOI":"10.1109\/ACCESS.2025.3577221"},{"key":"399_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2024.104901","volume":"157","author":"F Deng","year":"2025","unstructured":"Deng F, Yu H, Liu T, Yang R (2025) Mitd-net: Multi-scale iterative tamper detection network for image manipulation localization. Digital Signal Processing 157:104901","journal-title":"Digital Signal Processing"},{"issue":"3","key":"399_CR8","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inf Forensics Secur 7(3):1003\u20131017","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"399_CR9","doi-asserted-by":"publisher","first-page":"2492","DOI":"10.1016\/j.patcog.2009.03.019","volume":"42","author":"Z Lin","year":"2009","unstructured":"Lin Z, He J, Tang X, Tang C-K (2009) Fast, automatic and fine-grained tampered jpeg image detection via dct coefficient analysis. Pattern Recogn 42(11):2492\u20132501","journal-title":"Pattern Recogn"},{"issue":"3","key":"399_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2487228.2487236","volume":"32","author":"E Kee","year":"2013","unstructured":"Kee E, O\u2019Brien JF, Farid H (2013) Exposing photo manipulation with inconsistent shadows. ACM Transactions on Graphics (ToG) 32(3):1\u201312","journal-title":"ACM Transactions on Graphics (ToG)"},{"key":"399_CR11","doi-asserted-by":"crossref","unstructured":"Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th Workshop on Multimedia and Security, 1\u201310","DOI":"10.1145\/1073170.1073171"},{"key":"399_CR12","doi-asserted-by":"crossref","unstructured":"Fan W, Wang K, Cayre F (2015) General-purpose image forensics using patch likelihood under image statistical models. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), 1\u20136. IEEE","DOI":"10.1109\/WIFS.2015.7368606"},{"issue":"2","key":"399_CR13","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/s11263-013-0688-y","volume":"110","author":"S Lyu","year":"2014","unstructured":"Lyu S, Pan X, Zhang X (2014) Exposing region splicing forgeries with blind local noise estimation. Int J Comput Vision 110(2):202\u2013221","journal-title":"Int J Comput Vision"},{"key":"399_CR14","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1053\u20131061","DOI":"10.1109\/CVPR.2018.00116"},{"key":"399_CR15","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","volume":"51","author":"R Salloum","year":"2018","unstructured":"Salloum R, Ren Y, Kuo C-CJ (2018) Image splicing localization using a multi-task fully convolutional network (mfcn). J Vis Commun Image Represent 51:201\u2013209","journal-title":"J Vis Commun Image Represent"},{"key":"399_CR16","doi-asserted-by":"crossref","unstructured":"Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 9543\u20139552","DOI":"10.1109\/CVPR.2019.00977"},{"key":"399_CR17","doi-asserted-by":"crossref","unstructured":"Kwon M-J, Yu I-J, Nam S-H, Lee H-K (2021) Cat-net: Compression artifact tracing network for detection and localization of image splicing. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, 375\u2013384","DOI":"10.1109\/WACV48630.2021.00042"},{"issue":"3","key":"399_CR18","doi-asserted-by":"publisher","first-page":"3539","DOI":"10.1109\/TPAMI.2022.3180556","volume":"45","author":"C Dong","year":"2022","unstructured":"Dong C, Chen X, Hu R, Cao J, Li X (2022) Mvss-net: Multi-view multi-scale supervised networks for image manipulation detection. IEEE Trans Pattern Anal Mach Intell 45(3):3539\u20133553","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"11","key":"399_CR19","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1007\/s11760-025-04407-x","volume":"19","author":"R Thakur","year":"2025","unstructured":"Thakur R, Rohilla R (2025) Mdlformer: multi-modal global context-based swin transformer for image manipulation detection and localization. SIViP 19(11):880","journal-title":"SIViP"},{"issue":"3","key":"399_CR20","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/s11760-025-03839-9","volume":"19","author":"Z Mao","year":"2025","unstructured":"Mao Z, Lu T (2025) Dual-stream network with complementary fusion and hierarchical attention for image tampering localization. SIViP 19(3):258","journal-title":"SIViP"},{"key":"399_CR21","doi-asserted-by":"crossref","unstructured":"Hu X, Zhang Z, Jiang Z, Chaudhuri S, Yang Z, Nevatia R (2020) Span: Spatial pyramid attention network for image manipulation localization. In: European Conference on Computer Vision, 312\u2013328. Springer","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"399_CR22","unstructured":"Liang W-Y, Xu J, Jin X (2022) Tripinet: Tripartite progressive integration network for image manipulation localization. arXiv preprint arXiv:2212.12841"},{"key":"399_CR23","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/TIFS.2022.3169921","volume":"17","author":"C Kong","year":"2022","unstructured":"Kong C, Chen B, Li H, Wang S, Rocha A, Kwong S (2022) Detect and locate: Exposing face manipulation by semantic-and noise-level telltales. IEEE Trans Inf Forensics Secur 17:1741\u20131756","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"399_CR24","doi-asserted-by":"crossref","unstructured":"Kong C, Luo A, Wang S, Li H, Rocha A, Kot AC (2025) Pixel-inconsistency modeling for image manipulation localization. IEEE Transactions on Pattern Analysis and Machine Intelligence","DOI":"10.1109\/TPAMI.2025.3541028"},{"key":"399_CR25","doi-asserted-by":"crossref","unstructured":"Kong C, Luo A, Bao P, Yu Y, Li H, Zheng Z, Wang S, Kot AC (2025) Moe-ffd: Mixture of experts for generalized and parameter-efficient face forgery detection. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2025.3604443"},{"key":"399_CR26","unstructured":"Zhang K, Kong C, Liu H, Ding B, Jiang X, Li H (2025) Propose and rectify: A forensics-driven mllm framework for image manipulation localization. arXiv preprint arXiv:2508.17976"},{"key":"399_CR27","unstructured":"Peng R, Tan S, Kong C, Luo A, Kot AC, Huang J (2025) Forensicssam: Toward robust and unified image forgery detection and localization resisting to adversarial attack. arXiv preprint arXiv:2508.07402"},{"key":"399_CR28","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/LSP.2024.3378104","volume":"31","author":"J Zhou","year":"2024","unstructured":"Zhou J, Zhuang J, Zheng Y, Chang Y, Mazhar S (2024) Hifi-net: a novel network for enhancement to underwater optical images. IEEE Signal Process Lett 31:885\u2013889","journal-title":"IEEE Signal Process Lett"},{"key":"399_CR29","unstructured":"Bahdanau D, Cho K, Bengio Y (2014) Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473"},{"key":"399_CR30","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"399_CR31","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee J-Y, Kweon IS (2018) Cbam: Convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), 3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"399_CR32","doi-asserted-by":"crossref","unstructured":"Wang Q, Wu B, Zhu P, Li P, Zuo W, Hu Q (2020) Eca-net: Efficient channel attention for deep convolutional neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 11534\u201311542","DOI":"10.1109\/CVPR42600.2020.01155"},{"key":"399_CR33","unstructured":"Parmar N, Vaswani A, Uszkoreit J, Kaiser L, Shazeer N, Ku A, Tran D (2018) Image transformer. In: International Conference on Machine Learning, 4055\u20134064. PMLR"},{"issue":"8","key":"399_CR34","doi-asserted-by":"publisher","first-page":"2626","DOI":"10.1109\/TMI.2020.2996645","volume":"39","author":"D-P Fan","year":"2020","unstructured":"Fan D-P, Zhou T, Ji G-P, Zhou Y, Chen G, Fu H, Shen J, Shao L (2020) Inf-net: Automatic covid-19 lung infection segmentation from ct images. IEEE Trans Med Imaging 39(8):2626\u20132637","journal-title":"IEEE Trans Med Imaging"},{"key":"399_CR35","doi-asserted-by":"publisher","first-page":"1049555","DOI":"10.3389\/fbioe.2023.1049555","volume":"11","author":"Z Xu","year":"2023","unstructured":"Xu Z, Li T, Liu Y, Zhan Y, Chen J, Lukasiewicz T (2023) Pac-net: Multi-pathway fpn with position attention guided connections and vertex distance iou for 3d medical image detection. Frontiers in Bioengineering and Biotechnology 11:1049555","journal-title":"Frontiers in Bioengineering and Biotechnology"},{"key":"399_CR36","doi-asserted-by":"crossref","unstructured":"Yang C, Li H, Lin F, Jiang B, Zhao H (2019) Constrained r-cnn: A general image manipulation detection model. arXiv preprint arXiv:1911.08217","DOI":"10.1109\/ICME46284.2020.9102825"},{"key":"399_CR37","doi-asserted-by":"crossref","unstructured":"Rao Y, Ni J (2021) Self-supervised domain adaptation for forgery localization of jpeg compressed images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 15034\u201315043","DOI":"10.1109\/ICCV48922.2021.01476"},{"issue":"6","key":"399_CR38","doi-asserted-by":"publisher","first-page":"3270","DOI":"10.1109\/TAI.2023.3347178","volume":"5","author":"X Xu","year":"2023","unstructured":"Xu X, Lv W, Wang W, Zhang Y, Chen J (2023) Empowering semantic segmentation with selective frequency enhancement and attention mechanism for tampering detection. IEEE Transactions on Artificial Intelligence 5(6):3270\u20133283","journal-title":"IEEE Transactions on Artificial Intelligence"},{"key":"399_CR39","doi-asserted-by":"crossref","unstructured":"Yang C, Wang Z, Shen H, Li H, Jiang B (2021) Multi-modality image manipulation detection. In: 2021 IEEE International Conference on Multimedia and Expo (ICME), 1\u20136. IEEE Computer Society","DOI":"10.1109\/ICME51207.2021.9428232"},{"key":"399_CR40","doi-asserted-by":"crossref","unstructured":"Li H, Huang J (2019) Localization of deep inpainting using high-pass fully convolutional network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 8301\u20138310","DOI":"10.1109\/ICCV.2019.00839"},{"issue":"11","key":"399_CR41","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar B, Stamm MC (2018) Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection. IEEE Trans Inf Forensics Secur 13(11):2691\u20132706","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"399_CR42","doi-asserted-by":"crossref","unstructured":"Zhou P, Chen B-C, Han X, Najibi M, Shrivastava A, Lim S-N, Davis L (2020) Generate, segment, and refine: Towards generic manipulation segmentation. In: Proceedings of the AAAI Conference on Artificial Intelligence, 34:13058\u201313065","DOI":"10.1609\/aaai.v34i07.7007"},{"key":"399_CR43","doi-asserted-by":"crossref","unstructured":"Zhuang P, Li H, Tan S, Li B, Huang J (2021) Image tampering localization using a dense fully convolutional network. IEEE Trans Inf Forensics Secur 16:2986\u20132999","DOI":"10.1109\/TIFS.2021.3070444"}],"container-title":["International Journal of Multimedia Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13735-026-00399-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13735-026-00399-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13735-026-00399-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T18:26:21Z","timestamp":1773944781000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13735-026-00399-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,19]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["399"],"URL":"https:\/\/doi.org\/10.1007\/s13735-026-00399-7","relation":{},"ISSN":["2192-6611","2192-662X"],"issn-type":[{"value":"2192-6611","type":"print"},{"value":"2192-662X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,19]]},"assertion":[{"value":"25 December 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"10"}}