{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:28:36Z","timestamp":1770222516518,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T00:00:00Z","timestamp":1625443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T00:00:00Z","timestamp":1625443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007957","name":"Chongqing Municipal Education Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007957","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,5]]},"DOI":"10.1109\/icme51207.2021.9428466","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:14:21Z","timestamp":1623273261000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Multi-Task Wavelet Corrected Network for Image Splicing Forgery Detection and Localization"],"prefix":"10.1109","author":[{"given":"Xiuli","family":"Bi","sequence":"first","affiliation":[{"name":"Chongqing University of Post and Telecommunications,Department of Computer Science and Technology,China"}]},{"given":"Zhipeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chongqing University of Post and Telecommunications,Department of Computer Science and Technology,China"}]},{"given":"Yanbin","family":"Liu","sequence":"additional","affiliation":[{"name":"Chongqing University of Post and Telecommunications,Department of Computer Science and Technology,China"}]},{"given":"Bin","family":"Xiao","sequence":"additional","affiliation":[{"name":"Chongqing University of Post and Telecommunications,Department of Computer Science and Technology,China"}]},{"given":"Weisheng","family":"Li","sequence":"additional","affiliation":[{"name":"Chongqing University of Post and Telecommunications,Department of Computer Science and Technology,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009877"},{"key":"ref13","article-title":"Noiseprint: a cnn-based camera model fingerprint","author":"cozzolino","year":"2018","journal-title":"arXiv preprint arXiv 1808 08951"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054068"},{"key":"ref15","first-page":"1","article-title":"Image region forgery detection: A deep learning approach","volume":"2016","author":"zhang","year":"2016","journal-title":"SG-CRC"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.099"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00116"},{"key":"ref18","first-page":"386","article-title":"Universal style transfer via feature transforms","volume":"30","author":"li","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/17M1141771"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"ref3","first-page":"9543","article-title":"Mantranet: Manipulation tracing network for detection and localization of image forgeries with anomalous features","author":"wu","year":"2019","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"ref5","first-page":"2","article-title":"A picture&#x2019;s worth","volume":"6","author":"krawetz","year":"2007","journal-title":"Hacker Factor Solutions"},{"key":"ref8","first-page":"1","article-title":"Markov-based image splicing detection in the dct high frequency region","author":"yildirim","year":"2018","journal-title":"2018 International Conference on Artificial Intelligence and Data Processing (IDAP)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636089"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.038"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.03.019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2895466"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/16M1091447"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00660"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2006.262447"},{"key":"ref26","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv preprint arXiv 1412 6980"},{"key":"ref25","first-page":"215","article-title":"The point where reality meets fantasy: Mixed adversarial generators for image splice detection","author":"kniaz","year":"2019","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2021 IEEE International Conference on Multimedia and Expo (ICME)","location":"Shenzhen, China","start":{"date-parts":[[2021,7,5]]},"end":{"date-parts":[[2021,7,9]]}},"container-title":["2021 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9428049\/9428068\/09428466.pdf?arnumber=9428466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T18:27:42Z","timestamp":1682965662000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9428466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icme51207.2021.9428466","relation":{},"subject":[],"published":{"date-parts":[[2021,7,5]]}}}