{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:52:07Z","timestamp":1775170327460,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wifs.2016.7823911","type":"proceedings-article","created":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T03:34:46Z","timestamp":1484883286000},"page":"1-6","source":"Crossref","is-referenced-by-count":365,"title":["A deep learning approach to detection of splicing and copy-move forgeries in images"],"prefix":"10.1109","author":[{"given":"Yuan","family":"Rao","sequence":"first","affiliation":[]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Exploring Strategies for Training Deep Neural Networks","volume":"10 10","author":"hugo","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref12","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2325781"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2438008"},{"key":"ref15","first-page":"1","article-title":"Image Region Forgery Detection: A Deep Learning Approach","volume":"14","author":"ying","year":"2016","journal-title":"Proceedings of Singapore Cyber Security Conference (SG-CRC)"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2909827.2930786","article-title":"A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer","author":"bayar","year":"2016","journal-title":"Proc ACM Int Workshop on Information Hiding and Multimedia Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref18","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning"},{"key":"ref19","first-page":"2559","article-title":"Learning mid-level features for recognition","author":"ylan","year":"2010","journal-title":"Computer Vision and Pattern Recognition (CVPR) 2010 IEEE Conference on"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.05.014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288878"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0688-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2347513"},{"key":"ref8","author":"dong","year":"2011","journal-title":"CASIA Tampered Image Detection Evaluation (TIDE) Database V1 0 and V2 0"},{"key":"ref7","first-page":"1","article-title":"Image forgery detection using steerable pyramid transform and local binary pattern","author":"muhammad","year":"2013","journal-title":"Machine Vision and Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818358"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"ref9","article-title":"Sparse deep belief net model for visual area V2","volume":"20","author":"lee","year":"2008","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084319"},{"key":"ref22","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"xavier","year":"2010","journal-title":"Proc JMLR W&CP Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics (AISTATS 2010)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"ref23","author":"ng","year":"0","journal-title":"Columbia Image Splicing Detection Evaluation Dataset"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"}],"event":{"name":"2016 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2016,12,4]]},"end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7811906\/7823570\/07823911.pdf?arnumber=7823911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T07:01:45Z","timestamp":1658473305000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7823911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wifs.2016.7823911","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}