{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:08:48Z","timestamp":1769630928057,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902102"],"award-info":[{"award-number":["61902102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LQ19F020004"],"award-info":[{"award-number":["LQ19F020004"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3413709","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T18:16:45Z","timestamp":1718302605000},"page":"90511-90524","source":"Crossref","is-referenced-by-count":5,"title":["Dual-Stream Intermediate Fusion Network for Image Forgery Localization"],"prefix":"10.1109","volume":"12","author":[{"given":"Caiping","family":"Yan","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Renhai","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8149-9047","authenticated-orcid":false,"given":"Hong","family":"Li","sequence":"additional","affiliation":[{"name":"Hangzhou InsVision Technology Company Ltd., Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jinghui","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haojie","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"ref2","article-title":"Columbia image splicing detection evaluation dataset","author":"Ng","year":"2009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2345479"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3070444"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3180556"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3123829"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00116"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00240"},{"key":"ref19","first-page":"1140","article-title":"Segnext: Rethinking convolutional attention design for semantic segmentation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Guo"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01166"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-023-0364-2"},{"key":"ref22","first-page":"38020","article-title":"Intermediate prototype mining transformer for few-shot semantic segmentation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"LIU"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1807.06521"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026073"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPhot.2012.6215223"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0688-y"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.09.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"issue":"2","key":"ref31","first-page":"2","article-title":"A picture\u2019s worth","volume":"6","author":"Krawetz","year":"2007","journal-title":"Hacker Factor Solutions"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref33","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00462"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152362"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00813"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3007032"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00326"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.05.012"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4284852"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2017.7916505"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2699184"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.660"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67558-9_28"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10556523.pdf?arnumber=10556523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T05:15:27Z","timestamp":1721279727000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10556523\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3413709","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}