{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T02:14:54Z","timestamp":1773368094006,"version":"3.50.1"},"reference-count":52,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["RS-2023-00213798"],"award-info":[{"award-number":["RS-2023-00213798"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"Institute of Information &amp; Communications Technology Planning &amp; Evaluation","doi-asserted-by":"publisher","award":["RS-2025-02305884"],"award-info":[{"award-number":["RS-2025-02305884"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.neucom.2025.131915","type":"journal-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T18:24:32Z","timestamp":1762539872000},"page":"131915","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Do not overestimate RGB: Improving image manipulation detection and localization via multi-noise-view fusion"],"prefix":"10.1016","volume":"663","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9002-2881","authenticated-orcid":false,"given":"Joonkyo","family":"Shim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6371-7055","authenticated-orcid":false,"given":"Hyunsoo","family":"Yoon","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2025.131915_bib0005","series-title":"International Conference on Machine Learning","first-page":"16784","article-title":"Glide: towards photorealistic image generation and editing with text-guided diffusion models","author":"Nichol","year":"2022"},{"issue":"3","key":"10.1016\/j.neucom.2025.131915_bib0010","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.neucom.2025.131915_bib0015","series-title":"Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security","first-page":"5","article-title":"A DEEP learning approach to universal image manipulation detection using a new convolutional layer","author":"Bayar","year":"2016"},{"key":"10.1016\/j.neucom.2025.131915_bib0020","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"20606","article-title":"Trufor: leveraging all-round clues for trustworthy image forgery detection and localization","author":"Guillaro","year":"2023"},{"key":"10.1016\/j.neucom.2025.131915_bib0025","first-page":"12077","article-title":"SegFormer: simple and efficient design for semantic segmentation with transformers","volume":"34","author":"Xie","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2025.131915_bib0030","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"11976","article-title":"A convnet for the 2020s","author":"Liu","year":"2022"},{"key":"10.1016\/j.neucom.2025.131915_bib0035","author":"Liu"},{"key":"10.1016\/j.neucom.2025.131915_bib0040","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1053","article-title":"Learning rich features for image manipulation detection","author":"Zhou","year":"2018"},{"key":"10.1016\/j.neucom.2025.131915_bib0045","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9543","article-title":"Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features","author":"Wu","year":"2019"},{"key":"10.1016\/j.neucom.2025.131915_bib0050","series-title":"Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXI 16","first-page":"312","article-title":"Span: spatial pyramid attention network for image manipulation localization","author":"Hu","year":"2020"},{"issue":"8","key":"10.1016\/j.neucom.2025.131915_bib0055","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1007\/s11263-022-01617-5","article-title":"Learning JPEG compression artifacts for image manipulation detection and localization","volume":"130","author":"Kwon","year":"2022","journal-title":"Int. J. Comput. Vis."},{"issue":"3","key":"10.1016\/j.neucom.2025.131915_bib0060","doi-asserted-by":"crossref","first-page":"3539","DOI":"10.1109\/TPAMI.2022.3180556","article-title":"MVSS-Net: multi-view multi-scale supervised networks for image manipulation detection","volume":"45","author":"Dong","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.neucom.2025.131915_bib0065","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.neucom.2022.09.060","article-title":"Learning to localize image forgery using end-to-end attention network","volume":"512","author":"Ganapathi","year":"2022","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2025.131915_bib0070","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2023.126263","article-title":"Semantic-agnostic progressive subtractive network for image manipulation detection and localization","volume":"543","author":"Xu","year":"2023","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2025.131915_bib0075","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.128607","article-title":"Image manipulation localization VIA dynamic cross-modality fusion and progressive integration","volume":"610","author":"Jin","year":"2024","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2025.131915_bib0080","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.130255","article-title":"Image manipulation localization VIA semantic-guided feature enhancement and DEEP multi-scale EDGE supervision","volume":"639","author":"Wang","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2025.131915_bib0085","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.130788","article-title":"MSHRT-net: multi-scale hierarchical residual transfer network for image manipulation detection and localization","volume":"648","author":"Yang","year":"2025","journal-title":"Neurocomputing"},{"issue":"1","key":"10.1016\/j.neucom.2025.131915_bib0090","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/T-C.1974.223784","article-title":"Discrete cosine transform","volume":"100","author":"Ahmed","year":"1974","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.neucom.2025.131915_bib0095","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","article-title":"Noiseprint: a CNN-based camera model fingerprint","volume":"15","author":"Cozzolino","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.neucom.2025.131915_bib0100","series-title":"International Conference on Multimedia Modeling","first-page":"198","article-title":"Exploring multi-modal fusion for image manipulation detection and localization","author":"Triaridis","year":"2024"},{"key":"10.1016\/j.neucom.2025.131915_bib0105","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"12523","article-title":"Unionformer: unified-learning transformer with multi-view representation for image manipulation detection and localization","author":"Li","year":"2024"},{"issue":"12","key":"10.1016\/j.neucom.2025.131915_bib0110","doi-asserted-by":"crossref","first-page":"14679","DOI":"10.1109\/TITS.2023.3300537","article-title":"CMX: cross-modal fusion for RGB-X semantic segmentation with transformers","volume":"24","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"7","key":"10.1016\/j.neucom.2025.131915_bib0115","doi-asserted-by":"crossref","first-page":"3142","DOI":"10.1109\/TIP.2017.2662206","article-title":"Beyond a Gaussian denoiser: residual learning of DEEP CNN for image denoising","volume":"26","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.neucom.2025.131915_bib0120","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"770","article-title":"DEEP residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.neucom.2025.131915_bib0125","author":"Gu"},{"key":"10.1016\/j.neucom.2025.131915_bib0130","author":"Ma"},{"key":"10.1016\/j.neucom.2025.131915_bib0135","series-title":"2013 IEEE China Summit and International Conference on Signal and Information Processing","first-page":"422","article-title":"Casia image tampering detection evaluation database","author":"Dong","year":"2013"},{"key":"10.1016\/j.neucom.2025.131915_bib0140","article-title":"The point where reality meets fantasy: mixed adversarial generators for image splice detection","volume":"32","author":"Kniaz","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2025.131915_bib0145","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops","first-page":"71","article-title":"IMD2020: a large-scale annotated dataset tailored for detecting manipulated images","author":"Novozamsky","year":"2020"},{"key":"10.1016\/j.neucom.2025.131915_bib0150","series-title":"Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part v 13","first-page":"740","article-title":"Microsoft COCO: common objects in context","author":"Lin","year":"2014"},{"key":"10.1016\/j.neucom.2025.131915_bib0155","series-title":"Proceedings of the 6th ACM Multimedia Systems Conference","first-page":"219","article-title":"Raise: a RAW images dataset for digital image forensics","author":"Dang-Nguyen","year":"2015"},{"issue":"9","key":"10.1016\/j.neucom.2025.131915_bib0160","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1109\/34.955109","article-title":"Simplicity: semantics-sensitive integrated matching for picture libraries","volume":"23","author":"Wang","year":"2001","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"7","key":"10.1016\/j.neucom.2025.131915_bib0165","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","article-title":"Exposing digital image forgeries by illumination color classification","volume":"8","author":"De Carvalho","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.neucom.2025.131915_bib0170","series-title":"2006 IEEE International Conference on Multimedia and Expo","first-page":"549","article-title":"Detecting image splicing using geometry invariants and camera characteristics consistency","author":"Hsu","year":"2006"},{"key":"10.1016\/j.neucom.2025.131915_bib0175","series-title":"2016 IEEE International Conference on Image Processing (ICIP)","first-page":"161","article-title":"Coverage\u2013A novel database for copy-move forgery detection","author":"Wen","year":"2016"},{"key":"10.1016\/j.neucom.2025.131915_bib0180","series-title":"2019 IEEE Winter Applications of Computer Vision Workshops (WACVW)","first-page":"63","article-title":"MFC datasets: large-scale benchmark datasets for media forensic challenge evaluation","author":"Guan","year":"2019"},{"key":"10.1016\/j.neucom.2025.131915_bib0185","doi-asserted-by":"crossref","first-page":"2179","DOI":"10.1109\/LSP.2025.3570240","article-title":"A lightweight and effective image tampering localization network with vision Mamba","volume":"32","author":"Guo","year":"2025","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.neucom.2025.131915_bib0190","series-title":"ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"1","article-title":"KLMN: knowledge distillation based lightweight multi-clue image forgery detection and localization","author":"Huang","year":"2025"},{"key":"10.1016\/j.neucom.2025.131915_bib0195","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"893","article-title":"Autosplice: a text-prompt manipulated image dataset for media forensics","author":"Jia","year":"2023"},{"key":"10.1016\/j.neucom.2025.131915_bib0200","series-title":"2025 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)","first-page":"7659","article-title":"A semantically impactful image manipulation dataset: characterizing image manipulations using semantic significance","author":"Chen","year":"2025"},{"key":"10.1016\/j.neucom.2025.131915_bib0205","unstructured":"A. Ramesh, P. Dhariwal, A. Nichol, C. Chu, M. Chen, Hierarchical text-conditional image generation with clip latents, arXiv preprint arXiv:2204.06125, 2022 1 (2) 3."},{"key":"10.1016\/j.neucom.2025.131915_bib0210","unstructured":"H. Face, Runwayml stable diffusion v1. 5 (2024)."},{"issue":"5","key":"10.1016\/j.neucom.2025.131915_bib0215","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1109\/JSTSP.2020.3001516","article-title":"Exposing fake images with forensic similarity graphs","volume":"14","author":"Mayer","year":"2020","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"10.1016\/j.neucom.2025.131915_bib0220","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"375","article-title":"CAT-Net: compression artifact tracing network for detection and localization of image splicing","author":"Kwon","year":"2021"},{"issue":"11","key":"10.1016\/j.neucom.2025.131915_bib0225","doi-asserted-by":"crossref","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","article-title":"PSCC-Net: progressive spatio-channel correlation network for image manipulation detection and localization","volume":"32","author":"Liu","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.neucom.2025.131915_bib0230","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1109\/LSP.2023.3245947","article-title":"Learning traces by yourself: blind image forgery localization VIA anomaly detection with ViT-VAE","volume":"30","author":"Chen","year":"2023","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.neucom.2025.131915_bib0235","author":"Yang"},{"key":"10.1016\/j.neucom.2025.131915_bib0240","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"3155","article-title":"Hierarchical fine-grained image forgery detection and localization","author":"Guo","year":"2023"},{"key":"10.1016\/j.neucom.2025.131915_bib0245","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"13440","article-title":"Robust image forgery detection over online social network shared images","author":"Wu","year":"2022"},{"key":"10.1016\/j.neucom.2025.131915_bib0250","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"2364","article-title":"Objectformer for image manipulation detection and localization","author":"Wang","year":"2022"},{"key":"10.1016\/j.neucom.2025.131915_bib0255","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops","article-title":"RRU-Net: the ringed residual U-Net for image splicing forgery detection","author":"Bi","year":"2019"},{"key":"10.1016\/j.neucom.2025.131915_bib0260","series-title":"2025 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)","first-page":"1734","article-title":"Sigma: siamese mamba network for multi-modal semantic segmentation","author":"Wan","year":"2025"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231225025871?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231225025871?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:26:12Z","timestamp":1773325572000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231225025871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":52,"alternative-id":["S0925231225025871"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2025.131915","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Do not overestimate RGB: Improving image manipulation detection and localization via multi-noise-view fusion","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2025.131915","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"131915"}}