{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:42:46Z","timestamp":1769283766068,"version":"3.49.0"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T00:00:00Z","timestamp":1646352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61370195"],"award-info":[{"award-number":["61370195"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Joint Funds of the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1536121"],"award-info":[{"award-number":["U1536121"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>\n            With the widespread use of smartphones and the rise of intelligent software, we can manipulate captured photos anytime and anywhere, so the fake photos finally obtained look \u201cReal.\u201d If these intelligent operation methods are maliciously applied to our daily life, then fake news, fake photos, rumors, slander, fraud, threats, and other information security issues around us can happen all the time. Today\u2019s intelligent retouching software can make various modifications to photos, some of which do not change the content that the photos themselves want to express, such as retouching, contrast improvement, and so on. In this article, we mainly study the three operation modes of changing the authenticity of photo contents, which are Copy-move, Splicing, and Removal. Few scholars have done relevant research due to the lack of a corresponding dataset. To address this issue, we elaborately collect a novel dataset, called the multi-realistic scene manipulation dataset (\n            <jats:bold>MSM30K<\/jats:bold>\n            ), which consists of 30,000 images, including three types of tampering methods, and covering 32 different tampering scenes in life. In addition, we propose a unified detection network: the efficient search and recognition network (\n            <jats:bold>ESRNet<\/jats:bold>\n            ) for three tampering methods. It mainly includes four main modules: Efficient feature pyramid network (\n            <jats:bold>EFPN<\/jats:bold>\n            ), Residual receptive field block with attention (\n            <jats:bold>RFBA<\/jats:bold>\n            ), Hierarchical decoding identification (\n            <jats:bold>HDI<\/jats:bold>\n            ), and Cascaded group-reversal attention (\n            <jats:bold>GRA<\/jats:bold>\n            ) blocks. On these three datasets, ESRNet can reach 0.81 on the S-measure, 0.72 on the F-measure, and 0.85 on the E-measure. The inference speed is ~53 fps on a single GPU without I\/O time. ESRNet outperforms various state-of-the-art manipulation detection baselines on three image manipulation datasets.\n          <\/jats:p>","DOI":"10.1145\/3506853","type":"journal-article","created":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T10:31:58Z","timestamp":1646389918000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["ESRNet: Efficient Search and Recognition Network for Image Manipulation Detection"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3807-4916","authenticated-orcid":false,"given":"Ruyong","family":"Ren","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Haidian Qu, Beijing Shi, China"}]},{"given":"Shaozhang","family":"Niu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Haidian Qu, Beijing Shi, China"}]},{"given":"Hua","family":"Ren","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Haidian Qu, Beijing Shi, China"}]},{"given":"Shubin","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Agricultural University, Beijing, China"}]},{"given":"Tengyue","family":"Han","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Haidian Qu, Beijing Shi, China"}]},{"given":"Xiaohai","family":"Tong","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Haidian Qu, Beijing Shi, China"}]}],"member":"320","published-online":{"date-parts":[[2022,3,4]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1877972"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00027"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2337654"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"e_1_3_1_7_2","article-title":"Concealed object detection","volume":"2102","author":"Fan Deng-Ping","year":"2021","unstructured":"Deng-Ping Fan, Ge-Peng Ji, Ming-Ming Cheng, and Ling Shao. 2021. Concealed object detection. CoRR abs\/2102.10274 (2021).","journal-title":"CoRR"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00285"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2996406"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59725-2_26"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4562984"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3152-x"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823898"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00060"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00326"},{"key":"e_1_3_1_19_2","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u201919)","author":"Wang Zhaojin Huang, Lichao Huang, Yongchao Gong, Chang Huang, and Xinggang","year":"2019","unstructured":"Zhaojin Huang, Lichao Huang, Yongchao Gong, Chang Huang, and Xinggang Wang. 2019. Mask scoring R-CNN. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u201919)."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_24"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2902826"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.11.002"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8713202"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818799526"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2837745"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2485163"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.45"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28658-7_55"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3017596"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03011-4"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2976573"},{"issue":"4","key":"e_1_3_1_35_2","first-page":"124:1\u2013124:22","article-title":"Controlling neural learning network with multiple scales for image splicing forgery detection","volume":"16","author":"Wei Yang","year":"2021","unstructured":"Yang Wei, Zhuzhu Wang, Bin Xiao, Ximeng Liu, Zheng Yan, and Jianfeng Ma. 2021. Controlling neural learning network with multiple scales for image splicing forgery detection. ACM Trans. Multim. Comput. Commun. Appl. 16, 4 (2021), 124:1\u2013124:22.","journal-title":"ACM Trans. Multim. Comput. Commun. Appl."},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123411"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00736"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00052"},{"key":"e_1_3_1_42_2","unstructured":"A. N. Yates H. Guan Y. Lee A. P. Delgado D. F. Zhou and J. G. Fiscus. [n.d.]. Nimble challenge 2017 evaluation data and tool. ([n. d.])."},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01458"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3795-2"},{"key":"e_1_3_1_45_2","series-title":"Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14\u201315, 2016","first-page":"1","volume":"14","author":"Zhang Ying","year":"2016","unstructured":"Ying Zhang, Jonathan Goh, Lei Lei Win, and Vrizlynn L. L. Thing. 2016. Image region forgery detection: A deep learning approach. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14\u201315, 2016(Cryptology and Information Security Series, Vol. 14), Aditya Mathur and Abhik Roychoudhury (Eds.). IOS Press, 1\u201311."},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.660"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00887"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00116"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3506853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3506853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:09Z","timestamp":1750188669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3506853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,4]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3506853"],"URL":"https:\/\/doi.org\/10.1145\/3506853","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,4]]},"assertion":[{"value":"2021-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}