{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T20:50:46Z","timestamp":1775508646299,"version":"3.50.1"},"reference-count":86,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001821","name":"Sichuan Science and Technology Fund","doi-asserted-by":"publisher","award":["2025ZNSFSC0511"],"award-info":[{"award-number":["2025ZNSFSC0511"]}],"id":[{"id":"10.13039\/501100001821","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong Research Grants Council","award":["21200522"],"award-info":[{"award-number":["21200522"]}]},{"name":"Research Matching Grant Scheme of RGC HK","award":["9229106"],"award-info":[{"award-number":["9229106"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272299"],"award-info":[{"award-number":["62272299"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CityUHK","award":["7006087"],"award-info":[{"award-number":["7006087"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tifs.2026.3677584","type":"journal-article","created":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:54:46Z","timestamp":1774468486000},"page":"3396-3409","source":"Crossref","is-referenced-by-count":0,"title":["Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8130-6989","authenticated-orcid":false,"given":"Keyang","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3958-6489","authenticated-orcid":false,"given":"Chenqi","family":"Kong","sequence":"additional","affiliation":[{"name":"Rapid-Rich Object Search (ROSE) Laboratory, School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore"}]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6630-829X","authenticated-orcid":false,"given":"Bo","family":"Ding","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9758-0579","authenticated-orcid":false,"given":"Xinghao","family":"Jiang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8723-8112","authenticated-orcid":false,"given":"Haoliang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, SAR, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951714546645"},{"key":"ref2","article-title":"The image of truth: Photographic evidence and the power of analogy","volume":"10","author":"Mnookin","year":"1998","journal-title":"Yale JL Human."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/116.00000069"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01764"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2020.110311"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-010-0403-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033749"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01617-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00116"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00839"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3180556"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"ref13","article-title":"Research on splicing image detection algorithms based on natural image statistical characteristics","author":"Xiang","year":"2024","journal-title":"arXiv:2404.16296"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2025.3541028"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169921"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051426"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288878"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368565"},{"issue":"2","key":"ref20","first-page":"63","article-title":"Detection of copy-move forgery in digital images","volume-title":"Proc. Digit. Forensic Res. Workshop","volume":"3","author":"Fridrich"},{"issue":"5","key":"ref21","first-page":"188","article-title":"Fast copy-move forgery detection","volume":"5","author":"Lin","year":"2009","journal-title":"WSEAS Trans. Signal Process."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3075039"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging10020042"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.52202\/075280-1516"},{"key":"ref25","article-title":"Qwen2-VL: Enhancing vision-language model\u2019s perception of the world at any resolution","author":"Wang","year":"2024","journal-title":"arXiv:2409.12191"},{"key":"ref26","article-title":"ForgeryGPT: Multimodal large language model for explainable image forgery detection and localization","author":"Liu","year":"2024","journal-title":"arXiv:2410.10238"},{"key":"ref27","article-title":"FakeShield: Explainable image forgery detection and localization via multi-modal large language models","author":"Xu","year":"2024","journal-title":"arXiv:2410.02761"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.02685"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2024.02.008"},{"key":"ref30","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"139","author":"Radford"},{"key":"ref31","article-title":"FFAA: Multimodal large language model based explainable open-world face forgery analysis assistant","author":"Huang","year":"2024","journal-title":"arXiv:2408.10072"},{"key":"ref32","article-title":"GPT-4 technical report","author":"Achiam","year":"2023","journal-title":"arXiv:2303.08774"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"key":"ref34","volume-title":"Standard Guide for Image Authentication"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2195492"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1117\/12.839034"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2074194"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0688-y"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2106121"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2182191"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623589"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3210379"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547749"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01476"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01862"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00915"},{"key":"ref52","article-title":"Seg-zero: Reasoning-chain guided segmentation via cognitive reinforcement","author":"Liu","year":"2025","journal-title":"arXiv:2503.06520"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.00019"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2025\/1155"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29898"},{"key":"ref56","article-title":"DeepSeek-r1: Incentivizing reasoning capability in LLMs via reinforcement learning","author":"Guo","year":"2025","journal-title":"arXiv:2501.12948"},{"key":"ref57","article-title":"AgentCoder: Multi-agent-based code generation with iterative testing and optimisation","author":"Huang","year":"2023","journal-title":"arXiv:2312.13010"},{"key":"ref58","article-title":"Spider 2.0: Evaluating language models on real-world enterprise text-to-SQL workflows","author":"Lei","year":"2024","journal-title":"arXiv:2411.07763"},{"key":"ref59","article-title":"Internet of Agents: Weaving a web of heterogeneous agents for collaborative intelligence","author":"Chen","year":"2024","journal-title":"arXiv:2407.07061"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00308"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2819624"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00644"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00371"},{"key":"ref65","article-title":"LoRA: Low-rank adaptation of large language models","volume-title":"Proc. ICLR","volume":"1","author":"Hu"},{"key":"ref66","article-title":"MoE-FFD: Mixture of experts for generalized and parameter-efficient face forgery detection","author":"Kong","year":"2024","journal-title":"arXiv:2404.08452"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2026.3669190"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"key":"ref71","article-title":"Columbia uncompressed image splicing detection evaluation dataset","volume":"6","author":"Hsu","year":"2006","journal-title":"Columbia DVMM Res. Lab"},{"key":"ref72","year":"2013","journal-title":"IEEE IFS-TC Image Forensics Challenge Dataset"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506548"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823898"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2699184"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2895466"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/11313711\/11456196.pdf?arnumber=11456196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:55:06Z","timestamp":1775505306000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11456196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":86,"URL":"https:\/\/doi.org\/10.1109\/tifs.2026.3677584","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}