{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T11:45:34Z","timestamp":1769946334850,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fundamental Theory and Cutting Edge Technology Research Program of IIE CAS","award":["Y7Z0371102"],"award-info":[{"award-number":["Y7Z0371102"]}]},{"name":"National Key Technology R&D Program","award":["2016QY15Z2500"],"award-info":[{"award-number":["2016QY15Z2500"]}]},{"name":"National Key Technology R&D Program","award":["2016YFB0801003"],"award-info":[{"award-number":["2016YFB0801003"]}]},{"name":"NSFC","award":["U1536105"],"award-info":[{"award-number":["U1536105"]}]},{"name":"NSFC","award":["U1736214"],"award-info":[{"award-number":["U1736214"]}]},{"name":"NSFC","award":["U1636102"],"award-info":[{"award-number":["U1636102"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,14]]},"DOI":"10.1145\/3206004.3206010","type":"proceedings-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T12:12:39Z","timestamp":1529496759000},"page":"85-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["Image Forgery Localization based on Multi-Scale Convolutional Neural Networks"],"prefix":"10.1145","author":[{"given":"Yaqi","family":"Liu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Qingxiao","family":"Guan","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yun","family":"Cao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.120"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.60"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2438008"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026073"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083247"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084315"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"e_1_3_2_1_13_1","volume-title":"The 1st IEEE IFS-TC Image Forensics Challenge","author":"IFS-TC","unstructured":"IFS-TC . 2013. The 1st IEEE IFS-TC Image Forensics Challenge . http:\/\/ifc.recod.ic.unicamp.br\/fc.website\/index.py. (2013). IFS-TC . 2013. The 1st IEEE IFS-TC Image Forensics Challenge. http:\/\/ifc.recod.ic.unicamp.br\/fc.website\/index.py. (2013)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"e_1_3_2_1_15_1","volume-title":"Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization Proc. of IEEE Int. Workshop on Inf. Forensics and Security.","author":"Korus Pawe\u0142","year":"2016","unstructured":"Pawe\u0142 Korus and Jiwu Huang . 2016 . Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization Proc. of IEEE Int. Workshop on Inf. Forensics and Security. Pawe\u0142 Korus and Jiwu Huang . 2016. Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization Proc. of IEEE Int. Workshop on Inf. Forensics and Security."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636089"},{"key":"e_1_3_2_1_17_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton . 2012. Imagenet classification with deep convolutional neural networks Advances in neural information processing systems. 1097--1105.   Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton . 2012. Imagenet classification with deep convolutional neural networks Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656823"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.06.008"},{"key":"e_1_3_2_1_20_1","volume-title":"A deep learning approach to detection of splicing and copy-move forgeries in images IEEE International Workshop on Information Forensics and Security (WIFS)","author":"Rao Yuan","unstructured":"Yuan Rao and Jiangqun Ni . 2016. A deep learning approach to detection of splicing and copy-move forgeries in images IEEE International Workshop on Information Forensics and Security (WIFS) . IEEE , 1--6. Yuan Rao and Jiangqun Ni . 2016. A deep learning approach to detection of splicing and copy-move forgeries in images IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1--6."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"}],"event":{"name":"IH&MMSec '18: 6th ACM Workshop on Information Hiding and Multimedia Security","location":"Innsbruck Austria","acronym":"IH&MMSec '18","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206004.3206010","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3206004.3206010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:15Z","timestamp":1750208895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206004.3206010"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":21,"alternative-id":["10.1145\/3206004.3206010","10.1145\/3206004"],"URL":"https:\/\/doi.org\/10.1145\/3206004.3206010","relation":{},"subject":[],"published":{"date-parts":[[2018,6,14]]},"assertion":[{"value":"2018-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}