{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T06:40:19Z","timestamp":1741243219520,"version":"3.38.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3545830","type":"journal-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T19:00:59Z","timestamp":1740596459000},"page":"38325-38341","source":"Crossref","is-referenced-by-count":0,"title":["DSNI-Net: Forensic Network for Detecting Splicing in Salt-and-Pepper Noisy Images"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3689-1728","authenticated-orcid":false,"given":"Wuyang","family":"Shan","sequence":"first","affiliation":[{"name":"College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7373-5772","authenticated-orcid":false,"given":"Yijie","family":"Xie","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7375-8222","authenticated-orcid":false,"given":"Pengbo","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3639-4146","authenticated-orcid":false,"given":"Deng","family":"Zou","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9909-1620","authenticated-orcid":false,"given":"Junying","family":"Qiu","sequence":"additional","affiliation":[{"name":"College of Fashion and Design Arts, Sichuan Normal University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8251-191X","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"22","article-title":"SISL: Self-supervised image signature learning for splicing detection & localization","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW)","author":"Agrawal"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3359991"},{"key":"ref3","first-page":"1","article-title":"Image splice detection based on illumination inconsistency principle and machine learning algorithms for forensic applications","volume-title":"Proc. Smart Technol., Commun. Robot. (STCR)","volume":"2021","author":"Kasiselvanathan"},{"key":"ref4","article-title":"A novel framework for image forgery localization","author":"Cozzolino","year":"2013","journal-title":"arXiv:1311.6932"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2022.0131069"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icip.2009.5414611"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.03.019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13699-x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/wacv48630.2021.00042"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010136"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026072"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1117\/12.2083479"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103417"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00462"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3247607"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.11.011"},{"key":"ref20","article-title":"MissMarple: A novel socio-inspired feature-transfer learning deep network for image splicing detection","author":"Gokhale","year":"2021","journal-title":"arXiv:2112.08018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/12.640109"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1063\/5.0027442"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13569-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-09148-y"},{"key":"ref27","article-title":"Adaptive noise reduction scheme for salt and pepper","author":"Gebreyohannes","year":"2012","journal-title":"arXiv:1201.2050"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1979.1163188"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.0398"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/00949655.2017.1340474"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1799-2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5201\/ipol.2016.161"},{"key":"ref33","article-title":"When image denoising meets high-level vision tasks: A deep learning approach","author":"Liu","year":"2017","journal-title":"arXiv:1706.04284"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6521-4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414733"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3093396"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102043"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIPA45851.2019.8977756"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.02.010"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774427"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-331"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0067-2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2265677"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823898"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01862"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.05.011"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01420"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924552"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10904222.pdf?arnumber=10904222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T06:03:58Z","timestamp":1741241038000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10904222\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3545830","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}