{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:29Z","timestamp":1750220909962,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Laboratory Project of the Education Department of Shaanxi Province","award":["17JS098"],"award-info":[{"award-number":["17JS098"]}]},{"name":"National Natural Science Foundation of China","award":["61772416"],"award-info":[{"award-number":["61772416"]}]},{"name":"Shaanxi province technology innovation guiding project","award":["2018XNCG-G-02"],"award-info":[{"award-number":["2018XNCG-G-02"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3381271.3381274","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T15:59:45Z","timestamp":1582905585000},"page":"86-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Finer-grained image splicing localization method based on noise level estimation"],"prefix":"10.1145","author":[{"given":"XiaoFeng","family":"Wang","sequence":"first","affiliation":[{"name":"Xi'an University of Technology, Xi'an, Shaanxi"}]},{"given":"ChunTao","family":"Jiang","sequence":"additional","affiliation":[{"name":"Xi'an University of Technology, Xi'an, Shaanxi"}]},{"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi'an University of Technology, Xi'an, Shaanxi"}]}],"member":"320","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.09.001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73417-8_11"},{"volume-title":"Communications, Signal Processing, and Systems","author":"Zhang Y.","key":"e_1_3_2_1_3_1","unstructured":"Zhang , Y. , Zhao , C. , Pi , Y. 2012. Revealing image splicing forgery using local binary patterns of DCT coefficients . In Communications, Signal Processing, and Systems , Springer , New York, NY , 181--189. Zhang, Y., Zhao, C., Pi, Y. 2012. Revealing image splicing forgery using local binary patterns of DCT coefficients. In Communications, Signal Processing, and Systems, Springer, New York, NY, 181--189."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736863"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41939-3_49"},{"volume-title":"Exposing digital forgeries from JPEG ghosts","author":"Farid H.","key":"e_1_3_2_1_6_1","unstructured":"Farid , H. 2009. Exposing digital forgeries from JPEG ghosts . IEEE transactions on information forensics and security, 4(1), 154--160. Farid, H. 2009. Exposing digital forgeries from JPEG ghosts. IEEE transactions on information forensics and security, 4(1), 154--160."},{"key":"e_1_3_2_1_7_1","volume-title":"the First Asian Conference on Pattern Recognition, IEEE, 169--173","author":"Zuo J.","year":"2011","unstructured":"Zuo , J. , Pan , S. , Liu , B. 2011 . Tampering detection for composite images based on re-sampling and JPEG compression . In the First Asian Conference on Pattern Recognition, IEEE, 169--173 . Zuo, J., Pan, S., Liu, B. 2011. Tampering detection for composite images based on re-sampling and JPEG compression. In the First Asian Conference on Pattern Recognition, IEEE, 169--173."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084318"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.05.011"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2095111"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2005.855406"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2394231"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Lyu S. Pan X. Zhang X. 2014. Exposing region splicing forgeries with blind local noise estimation. International journal of computer vision 110(2) 202--221.  Lyu S. Pan X. Zhang X. 2014. Exposing region splicing forgeries with blind local noise estimation. International journal of computer vision 110(2) 202--221.","DOI":"10.1007\/s11263-013-0688-y"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037252.2037256"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412062"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3712-8"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3660-3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073884"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.07.012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6115828"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Immerkaer J. 1996. Fast noise variance estimation. Computer vision and image understanding 64(2) 300--30.  Immerkaer J. 1996. Fast noise variance estimation. Computer vision and image understanding 64(2) 300--30.","DOI":"10.1006\/cviu.1996.0060"}],"event":{"name":"ICMIP 2020: 2020 5th International Conference on Multimedia and Image Processing","sponsor":["NJU Nanjing University"],"location":"Nanjing China","acronym":"ICMIP 2020"},"container-title":["Proceedings of the 5th International Conference on Multimedia and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381271.3381274","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3381271.3381274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:59Z","timestamp":1750203899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381271.3381274"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":22,"alternative-id":["10.1145\/3381271.3381274","10.1145\/3381271"],"URL":"https:\/\/doi.org\/10.1145\/3381271.3381274","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-02-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}