{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:14:13Z","timestamp":1740132853944,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"DARPA and Air Force Research Laboratory","award":["FA8750-16-2-0173"],"award-info":[{"award-number":["FA8750-16-2-0173"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/lsp.2019.2913530","type":"journal-article","created":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T04:13:31Z","timestamp":1556338411000},"page":"976-980","source":"Crossref","is-referenced-by-count":8,"title":["Unsupervised Image Manipulation Localization With Non-Binary Label Attribution"],"prefix":"10.1109","volume":"26","author":[{"given":"Morteza Darvish Morshedi","family":"Hosseini","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3379-7522","authenticated-orcid":false,"given":"Matthias","family":"Kirchner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Noiseprint: A CNN-based camera model fingerprint","year":"2018","author":"cozzolino","key":"ref32"},{"journal-title":"NIST (2017) Media Forensics Challenge 2018 Evaluation Plan","year":"2018","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-119"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656823"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-333"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68548-9_52"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995347"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7_12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2806742"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/53.3-4.325"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.05.014"},{"journal-title":"NIST (2016) Media Forensics Challenge","year":"2018","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0688-y"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084315"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368606"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053202"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267641"},{"key":"ref1","first-page":"231","article-title":"Media forensics","author":"b\u00f6hme","year":"2016","journal-title":"Information Hiding"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084319"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2599849"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823921"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2006.262447"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/97\/8715731\/08700232.pdf?arnumber=8700232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:49:15Z","timestamp":1657745355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8700232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":32,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/lsp.2019.2913530","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"type":"print","value":"1070-9908"},{"type":"electronic","value":"1558-2361"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}