{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:18:48Z","timestamp":1775913528850,"version":"3.50.1"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>As an important carrier of information transmission in online social networks (OSNs), the authenticity protection of images is of great significance. However, the abuse of image processing technology makes its security questionable. Meantime, lossy operations adopted by OSNs will change the forgery artifacts, which brings challenges to robust image forgery detection. To address this issue, considering the suppression of lossy noise caused by transmission, a novel multi-domain probability estimation network (PRest-Net) is proposed. Firstly, we design a multi-domain probability estimation method to capture the most differentiated regional information from the spatial, residual, and wavelet domains. Since the wavelet coefficient of semantic information is larger than that of lossy noise, and the edge texture can be highlighted in the residual image, the negative effect of lossy noise would be reduced and semantic forgery traces can be exposed more easily. We further design a forgery detector composed of low-level feature extraction, high-level feature extraction, and regional edge difference learning module, which can adaptively learn rich forgery clues. Extensive experimental results are provided to validate the superiority of PRest-Net compared with existing state-of-the-art detectors in the scenarios of detecting forged images transmitted over various OSNs.<\/jats:p>","DOI":"10.1145\/3711930","type":"journal-article","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T16:33:41Z","timestamp":1737131621000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["PRest-Net: Multi-domain Probability Estimation Network for Robust Image Forgery Detection"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2035-6242","authenticated-orcid":false,"given":"Jiaxin","family":"Chen","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China and School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9131-0578","authenticated-orcid":false,"given":"Xin","family":"Liao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5224-6374","authenticated-orcid":false,"given":"Zhenxing","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3210294"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678473"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2129512"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5413549"},{"issue":"3","key":"e_1_3_1_6_2","first-page":"507","article-title":"Bin Yang, and Xingming Sun. 2015. Segmentation-based image copy-move forgery detection scheme","volume":"10","author":"Li Jian","year":"2015","unstructured":"Jian Li, Xiaolong Li, Bin Yang, and Xingming Sun. 2015. Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10, 3 (2015), 507\u2013518.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPhot.2012.6215223"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678883"},{"key":"e_1_3_1_10_2","first-page":"1","volume-title":"ACM Transactions on Multimedia Computing, Communications, and Applications","volume":"21","author":"Li Yuanman","year":"2024","unstructured":"Yuanman Li, Lanhao Ye, Haokun Cao, Wei Wang, and Zhongyun Hua. 2024. Cascaded adaptive graph representation learning for image copy-move forgery detection. ACM Transactions on Multimedia Computing, Communications, and Applications 21, 2 (2024), 1\u201324."},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3234861"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659464"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2752728"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME55011.2023.00397"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3070444"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2893353"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.01.089"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054068"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01476"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3204753"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967288"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3204971"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2445742"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2876837"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3245947"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152362"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924552"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2998476"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3144878"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01308"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000022288.19776.77"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0620-5"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825953"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1080\/15567281.2010.531500"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_1_41_2","unstructured":"NIST. 2016. NIST Manipulation Evaluation Dataset. Retrieved from https:\/\/www.nist.gov\/itl\/iad\/mig\/nimble-challenge-2017-evaluation"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2265677"},{"key":"e_1_3_1_43_2","unstructured":"Columbia. 2004. Image Splicing Detection Evaluation Dataset. Retrieved from http:\/\/www.ee.columbia.edu\/ln\/dvmm\/downloads\/AuthSplicedDataSet\/AuthSplicedDataSet.htm"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446332"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711930","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:10Z","timestamp":1750295890000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711930"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,7]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3711930"],"URL":"https:\/\/doi.org\/10.1145\/3711930","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,7]]},"assertion":[{"value":"2024-08-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}