{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T12:47:06Z","timestamp":1769777226247,"version":"3.49.0"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100018877","name":"Graduate Research and Innovation Foundation of Chongqing","doi-asserted-by":"publisher","award":["CYB25038"],"award-info":[{"award-number":["CYB25038"]}],"id":[{"id":"10.13039\/501100018877","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2022YFB3103500"],"award-info":[{"award-number":["2022YFB3103500"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932006"],"award-info":[{"award-number":["61932006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202071"],"award-info":[{"award-number":["62202071"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"crossref","award":["CSTB2023NSCQ-LZX0149"],"award-info":[{"award-number":["CSTB2023NSCQ-LZX0149"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2023CDJKYJH019"],"award-info":[{"award-number":["2023CDJKYJH019"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018735","name":"Ant Group","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tce.2025.3621056","type":"journal-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:38:01Z","timestamp":1760549881000},"page":"9889-9903","source":"Crossref","is-referenced-by-count":0,"title":["Precise and Privacy-Preserving Tampering Detection Model for Document Images"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2938-8506","authenticated-orcid":false,"given":"Bowen","family":"Xing","sequence":"first","affiliation":[{"name":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2240-5263","authenticated-orcid":false,"given":"Junqing","family":"Le","sequence":"additional","affiliation":[{"name":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"}]},{"given":"Feifei","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3221-2671","authenticated-orcid":false,"given":"Dong","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7602-3493","authenticated-orcid":false,"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0357-7026","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9013-7232","authenticated-orcid":false,"given":"Yi","family":"Wang","sequence":"additional","affiliation":[{"name":"Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9668-7076","authenticated-orcid":false,"given":"Yi","family":"Liu","sequence":"additional","affiliation":[{"name":"Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3566-8161","authenticated-orcid":false,"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[{"name":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00575"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14242-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3204390"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3367947"},{"key":"ref6","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3090260"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3351648"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796721"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref11","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Geiping"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3323206"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2981379"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3146448"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3338464"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3371928"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3216981"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3131258"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3295949"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-011-0181-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3180556"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3070444"},{"key":"ref26","article-title":"BEiT: BERT pre-training of image transformers","author":"Bao","year":"2021","journal-title":"arXiv:2106.08254"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01170"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00042"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3237367"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3239007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3510694"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3005909"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2019.00047"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3157592"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3559004"},{"key":"ref37","article-title":"Differentially private federated learning: A systematic review","author":"Fu","year":"2024","journal-title":"arXiv:2405.08299"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3550777"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2939713"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2952146"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3138611"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/iMETA62882.2024.10807869"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2017.2685505"},{"issue":"3","key":"ref45","first-page":"29","article-title":"Tampered text detection via RGB and frequency relationship modeling","volume":"8","author":"Wang","year":"2022","journal-title":"Chin. J. Netw. Inf. Secur."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2019.00244"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01548"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01385"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3560360"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11306167\/11204546.pdf?arnumber=11204546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:23:37Z","timestamp":1769721817000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11204546\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":51,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3621056","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}