{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:52:54Z","timestamp":1773985974716,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100005270","name":"Fujian Provincial Department of Science and Technology Innovation Strategy Research Project","doi-asserted-by":"publisher","award":["2022R0046"],"award-info":[{"award-number":["2022R0046"]}],"id":[{"id":"10.13039\/501100005270","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3577221","type":"journal-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T17:43:06Z","timestamp":1749231786000},"page":"99659-99671","source":"Crossref","is-referenced-by-count":1,"title":["AGU2-Net: Multi-Scale U<sup>2<\/sup>-Net Enhanced by Attention Gate Mechanism for Image Tampering Localization"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0188-1214","authenticated-orcid":false,"given":"Kefei","family":"Wu","sequence":"first","affiliation":[{"name":"School of Science, Jimei University, Xiamen, China"}]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[{"name":"Computer Engineering College, Jimei University, Xiamen, China"}]},{"given":"Qingyan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Science, Jimei University, Xiamen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.04.007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/jstsp.2020.3002101"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00977"},{"key":"ref4","first-page":"281","article-title":"Image splicing detection using 2D phase congruency and statistical moments of characteristic function","volume-title":"Proc. SPIE","volume":"6505","author":"Chen"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051666"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2139209"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077628"},{"key":"ref8","first-page":"549","article-title":"Detecting image splicing using geometry invariants and camera characteristics consistency","volume-title":"Proc. IEEE Int. Conf. Multimedia Expo","author":"Hsu"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.922456"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.03.019"},{"key":"ref11","first-page":"117","article-title":"Robust hash for detecting and localizing image tampering","volume-title":"Proc. IEEE Int. Conf. Image Process.","author":"Roy"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223680"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/chinasip.2013.6625374"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/wacvw50321.2020.9096940"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-61499-617-0-1"},{"key":"ref16","first-page":"1053","article-title":"Learning rich features for image manipulation detection","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"Zhou"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2982705"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"ref19","first-page":"375","article-title":"CAT-net: Compression artifact tracing network for detection and localization of image splicing","volume-title":"Proc. IEEE Winter Conf. Appl. Comput. Vis. (WACV)","author":"Kwon"},{"key":"ref20","first-page":"14165","article-title":"Image manipulation detection by multi-view multi-scale supervision","volume-title":"Proc. IEEE\/CVF Int. Conf. Comput. Vis. (ICCV)","author":"Chen"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2022.3180274"},{"key":"ref23","first-page":"13430","article-title":"Robust image forgery detection over online social network shared images","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Wu"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tcds.2021.3135948"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128607"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.129129"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00889-5_1"},{"key":"ref29","article-title":"Attention U-net: Learning where to look for the pancreas","author":"Oktay","year":"2018","journal-title":"arXiv:1804.03999"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/icassp40776.2020.9053405"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107404"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2102.04306"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw.2019.00010"},{"key":"ref34","first-page":"2982","article-title":"A dense U-Net with cross-layer intersection for detection and localization of image forgery","volume-title":"Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)","author":"Zhang"},{"key":"ref35","article-title":"D-unet: A dual-encoder U-Net for image splicing forgery detection and localization","author":"Liu","year":"2020","journal-title":"arXiv:2012.01821"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3270629"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06329-4"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3107841"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.106422"},{"key":"ref40","article-title":"Neural machine translation by jointly learning to align and translate","author":"Bahdanau","year":"2014","journal-title":"arXiv:1409.0473"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2022.3212921"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2022.106780"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106359"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.04.015"},{"key":"ref45","first-page":"7132","article-title":"Squeeze-and-excitation networks","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"Hu"},{"key":"ref46","first-page":"3","article-title":"CBAM: Convolutional block attention module","volume-title":"Proc. Eur. Conf. Comput. Vis. (ECCV)","author":"Woo"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.01155"},{"key":"ref48","first-page":"4055","article-title":"Image transformer","volume-title":"Proc. Int. Conf. Mach. Learn. (PMLR)","author":"Parmar"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/wacvw.2019.00018"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00839"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/icme46284.2020.9102825"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.7007"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3180556"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52729.2023.01862"},{"key":"ref55","first-page":"3155","article-title":"Hierarchical fine-grained image forgery detection and localization","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Guo"},{"key":"ref56","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR52729.2023.01974","article-title":"TruFor: Leveraging all-round clues for trustworthy image forgery detection and localization","volume-title":"IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Guillaro"},{"key":"ref57","article-title":"IML-ViT: Benchmarking image manipulation localization by vision transformer","author":"Ma","year":"2023","journal-title":"arXiv:2307.14863"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/icassp48485.2024.10446332"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i7.32754"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11027141.pdf?arnumber=11027141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T17:52:26Z","timestamp":1749837146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11027141\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3577221","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}