{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:36:31Z","timestamp":1763663791138,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["61772571","61702429","U1536204"],"award-info":[{"award-number":["61772571","61702429","U1536204"]}]},{"name":"the special funding for basic scientific research of Sun Yat-sen University","award":["6177060230"],"award-info":[{"award-number":["6177060230"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,14]]},"DOI":"10.1145\/3206004.3206013","type":"proceedings-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T12:12:39Z","timestamp":1529496759000},"page":"91-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Densely Connected Convolutional Neural Network for Multi-purpose Image Forensics under Anti-forensic Attacks"],"prefix":"10.1145","author":[{"given":"Yifang","family":"Chen","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[{"name":"SunYat-sen University, Guangzhou, China"}]},{"given":"Z. Jane","family":"Wang","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Qiong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495488"},{"volume-title":"Proceeding of 17th IEEE Int. Conf. Image Process","year":"2010","author":"Cao G.","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2164791"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2161761"},{"volume-title":"Proceeding of Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA). CA, USA","year":"2012","author":"Kang X.","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2004.924603"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051426"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2170836"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.12.089"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600941"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368606"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2599849"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2013070104"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854237"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32205-1_32"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638217"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2013.6659298"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2008214"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495491"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2119314"},{"volume-title":"Lake Tahoe","year":"2012","author":"Krizhevsky A.","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2437384"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2438008"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2641006"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952537"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-328"},{"volume-title":"Proceedings of 16th International Workshop on Digital Forensics and Watermarking (IWDW)","year":"2016","author":"Zhan Y.","key":"e_1_3_2_2_28_1"},{"volume-title":"Proceedings of 2018 IS&T International Symposium on Electronic Imaging","year":"2018","author":"Boroumand M.","key":"e_1_3_2_2_29_1"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","year":"2018","author":"Chen Y.","key":"e_1_3_2_2_31_1"},{"volume-title":"Densely Connected Convolutional Networks. In Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","year":"2017","author":"Weinberger K. Q.","key":"e_1_3_2_2_32_1"},{"key":"e_1_3_2_2_33_1","unstructured":"J. Yang Y. Shi E. K. Wong and X. Kang. 2017. JPEG Steganalysis Based on DenseNet. arXiv preprint arXiv: 1711.09335 (2017).  J. Yang Y. Shi E. K. Wong and X. Kang. 2017. JPEG Steganalysis Based on DenseNet. arXiv preprint arXiv: 1711.09335 (2017)."}],"event":{"name":"IH&MMSec '18: 6th ACM Workshop on Information Hiding and Multimedia Security","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Innsbruck Austria","acronym":"IH&MMSec '18"},"container-title":["Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206004.3206013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3206004.3206013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:15Z","timestamp":1750208895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206004.3206013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":33,"alternative-id":["10.1145\/3206004.3206013","10.1145\/3206004"],"URL":"https:\/\/doi.org\/10.1145\/3206004.3206013","relation":{},"subject":[],"published":{"date-parts":[[2018,6,14]]},"assertion":[{"value":"2018-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}