{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:10:03Z","timestamp":1755821403112,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1145\/3581783.3613839","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T07:26:54Z","timestamp":1698391614000},"page":"8225-8232","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secondary Labeling: A Novel Labeling Strategy for Image Manipulation Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5068-1439","authenticated-orcid":false,"given":"Yang","family":"Wei","sequence":"first","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8469-5302","authenticated-orcid":false,"given":"Bin","family":"Xiao","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3134-217X","authenticated-orcid":false,"given":"Xiuli","family":"Bi","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9476-6386","authenticated-orcid":false,"given":"Zhuoran","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6276-1468","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6023-2864","authenticated-orcid":false,"given":"Zhuo","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection. In CVPR Workshops. 0-0.","author":"Bi Xiuli","year":"2019","unstructured":"Xiuli Bi, Yang Wei, Bin Xiao, and Weisheng Li. 2019. RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection. In CVPR Workshops. 0-0."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Liang-Chieh Chen Yukun Zhu George Papandreou Florian Schroff and Hartwig Adam. 2018. Encoder-decoder with atrous separable convolution for semantic image segmentation. In ECCV. 801--818.","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Xinru Chen Chengbo Dong Jiaqi Ji Juan Cao and Xirong Li. 2021. Image Manipulation Detection by Multi-View Multi-Scale Supervision. In ICCV. 14185--14193.","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"e_1_3_2_1_4_1","volume-title":"Philip HS Torr, and Shi-Min Hu","author":"Cheng Ming-Ming","year":"2014","unstructured":"Ming-Ming Cheng, Niloy J Mitra, Xiaolei Huang, Philip HS Torr, and Shi-Min Hu. 2014. Global contrast based salient region detection. IEEE transactions on pattern analysis and machine intelligence, Vol. 37, 3 (2014), 569--582."},{"key":"e_1_3_2_1_5_1","unstructured":"Jing Dong Wei Wang and Tieniu Tan. 2010. Casia image tampering detection evaluation database. In http:\/\/forensics.idealtest.org\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.563"},{"volume-title":"Detecting image splicing using geometry invariants and camera characteristics consistency","author":"Hsu Yu-Feng","key":"e_1_3_2_1_7_1","unstructured":"Yu-Feng Hsu and Shih-Fu Chang. 2006. Detecting image splicing using geometry invariants and camera characteristics consistency. In ICME. IEEE, 549--552."},{"key":"e_1_3_2_1_8_1","volume-title":"SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization","author":"Hu Xuefeng","year":"2020","unstructured":"Xuefeng Hu, Zhihan Zhang, Zhenye Jiang, Syomantak Chaudhuri, Zhenheng Yang, and Ram Nevatia. 2020. SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization. In ECCV. Springer, 312--328."},{"key":"e_1_3_2_1_9_1","first-page":"2","article-title":"A Picture's Worth: Digital Image Analysis and Forensics","volume":"6","author":"Krawetz Neal","year":"2007","unstructured":"Neal Krawetz and Hacker Factor Solutions. 2007. A Picture's Worth: Digital Image Analysis and Forensics. Hacker Factor Solutions, Vol. 6 (2007), 2.","journal-title":"Hacker Factor Solutions"},{"volume-title":"A Simple Pooling-Based Design for Real-Time Salient Object Detection","author":"Liu Jiang-Jiang","key":"e_1_3_2_1_10_1","unstructured":"Jiang-Jiang Liu, Qibin Hou, Ming-Ming Cheng, Jiashi Feng, and Jianmin Jiang. 2019. A Simple Pooling-Based Design for Real-Time Salient Object Detection. In IEEE CVPR."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Jonathan Long Evan Shelhamer and Trevor Darrell. 2015. Fully convolutional networks for semantic segmentation. In CVPR. 3431--3440.","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"e_1_3_2_1_13_1","volume-title":"When does label smoothing help? arXiv preprint arXiv:1906.02629","author":"M\u00fcller Rafael","year":"2019","unstructured":"Rafael M\u00fcller, Simon Kornblith, and Geoffrey Hinton. 2019. When does label smoothing help? arXiv preprint arXiv:1906.02629 (2019)."},{"key":"e_1_3_2_1_14_1","volume-title":"NIST: Nist nimble 2016 datasets","author":"NIST.","year":"2016","unstructured":"NIST. 2016. NIST: Nist nimble 2016 datasets (2016). In https:\/\/www.nist.gov\/itl\/iad\/mig\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247743"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10867651.2004.10487596"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"e_1_3_2_1_18_1","volume-title":"Busternet: Detecting copy-move image forgery with source\/target localization. In ECCV. 168--184.","author":"Wu Yue","year":"2018","unstructured":"Yue Wu, Wael Abd-Almageed, and Prem Natarajan. 2018. Busternet: Detecting copy-move image forgery with source\/target localization. In ECCV. 168--184."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Yue Wu Wael AbdAlmageed and Premkumar Natarajan. 2019. ManTra-Net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In CVPR. 9543--9552.","DOI":"10.1109\/CVPR.2019.00977"},{"volume-title":"Constrained R-CNN: A general image manipulation detection model","author":"Yang Chao","key":"e_1_3_2_1_20_1","unstructured":"Chao Yang, Huizhou Li, Fangting Lin, Bin Jiang, and Hao Zhao. 2020. Constrained R-CNN: A general image manipulation detection model. In ICME. IEEE, 1--6."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Peng Zhou Xintong Han Vlad I Morariu and Larry S Davis. 2018. Learning rich features for image manipulation detection. In CVPR. 1053--1061.","DOI":"10.1109\/CVPR.2018.00116"}],"event":{"name":"MM '23: The 31st ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Ottawa ON Canada","acronym":"MM '23"},"container-title":["Proceedings of the 31st ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3613839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581783.3613839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T23:54:54Z","timestamp":1755820494000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3613839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":21,"alternative-id":["10.1145\/3581783.3613839","10.1145\/3581783"],"URL":"https:\/\/doi.org\/10.1145\/3581783.3613839","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"2023-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}