{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:27:09Z","timestamp":1761719229423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MoE-CMCC Artificial Intelligence Project","award":["MCM20190701"],"award-info":[{"award-number":["MCM20190701"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3604221","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"963-968","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Noise and Edge Based Dual Branch Image Manipulation Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4680-9011","authenticated-orcid":false,"given":"Zhongyuan","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xi'an Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6486-9713","authenticated-orcid":false,"given":"Yi","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi'an Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5198-0489","authenticated-orcid":false,"given":"Yanxiang","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi'an Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8679-8193","authenticated-orcid":false,"given":"Xiaowei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi'an Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1167-1953","authenticated-orcid":false,"given":"Lin","family":"Zhu","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute, China Mobile, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7033-804X","authenticated-orcid":false,"given":"Jinjin","family":"Wang","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute, China Mobile, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5005-0036","authenticated-orcid":false,"given":"Juan","family":"Zhao","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute, China Mobile, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825953"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.7007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00813"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00060"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_9_1","volume-title":"Casia image tampering detection evaluation database","author":"Dong J.","year":"2010","unstructured":"J. Dong , W. Wang , and T. Tan , \u201c Casia image tampering detection evaluation database ,\u201d 2010 , http:\/\/forensics.idealtest.org J. Dong, W. Wang, and T. Tan, \u201cCasia image tampering detection evaluation database,\u201d 2010, http:\/\/forensics.idealtest.org"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"e_1_3_2_1_12_1","volume-title":"Columbia uncompressed image splicing detection evaluation dataset","author":"Hsu J.","year":"2006","unstructured":"J. Hsu and S. Chang , \u201c Columbia uncompressed image splicing detection evaluation dataset ,\u201d 2006 , https:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/AuthSplicedDataSet\/AuthSplicedDataSet.htm J. Hsu and S. Chang, \u201cColumbia uncompressed image splicing detection evaluation dataset,\u201d 2006, https:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/AuthSplicedDataSet\/AuthSplicedDataSet.htm"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00839"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3070444"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102825"}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3604221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3604221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:06Z","timestamp":1750178766000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3604221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":18,"alternative-id":["10.1145\/3603781.3604221","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3604221","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}