{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:49:52Z","timestamp":1778258992217,"version":"3.51.4"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62272314"],"award-info":[{"award-number":["62272314"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U23B2022"],"award-info":[{"award-number":["U23B2022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3381470","type":"journal-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T19:11:02Z","timestamp":1711393862000},"page":"4820-4834","source":"Crossref","is-referenced-by-count":10,"title":["Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3739-652X","authenticated-orcid":false,"given":"Rongxuan","family":"Peng","sequence":"first","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7457-3691","authenticated-orcid":false,"given":"Shunquan","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9198-5041","authenticated-orcid":false,"given":"Xianbo","family":"Mo","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2613-5451","authenticated-orcid":false,"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7625-5689","authenticated-orcid":false,"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Guangdong Laboratory of Machine Perception and Intelligent Computing, Shenzhen MSU-BIT University, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2021.102028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.278"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073659"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00577"},{"key":"ref5","article-title":"Image inpainting via iteratively decoupled probabilistic modeling","author":"Li","year":"2022","journal-title":"arXiv:2212.02963"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.04.007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123411"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2018.8547093"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3123829"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.05.015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3046240"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.232"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00116"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2895466"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.12.022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3204740"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152362"},{"key":"ref28","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01617-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3070444"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01308"},{"key":"ref32","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mnih"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13001-z"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102943"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.2998401"},{"key":"ref36","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref38","first-page":"203","volume-title":"A data set of authentic and spliced image blocks","author":"Ng","year":"2004"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2265677"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00996"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"ref46","article-title":"GLIDE: Towards photorealistic image generation and editing with text-guided diffusion models","author":"Nichol","year":"2021","journal-title":"arXiv:2112.10741"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref48","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10478835.pdf?arnumber=10478835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T04:45:55Z","timestamp":1715143555000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10478835\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3381470","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}