{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:46:44Z","timestamp":1765309604062,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172233"],"award-info":[{"award-number":["62172233"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3755264","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:26:38Z","timestamp":1761377198000},"page":"8038-8047","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MADPHash: Manipulation-Aware Deep Perceptual Hashing using Feature Consistency"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1604-7690","authenticated-orcid":false,"given":"Lizhi","family":"Xiong","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0056-4300","authenticated-orcid":false,"given":"Peipeng","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2108-7910","authenticated-orcid":false,"given":"Yue","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"volume-title":"The Wavelet hashing algorithm","year":"2016","key":"e_1_3_2_1_1_1","unstructured":"2016. The Wavelet hashing algorithm 2016. https:\/\/fullstackml.com\/waveletimage-hash-in-python-3504fdd282b5 (2016)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10135-w"},{"key":"e_1_3_2_1_3_1","unstructured":"Hossein Aboutalebi Dayou Mao Rongqi Fan Carol Xu Chris He and Alexander Wong. 2024. DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection. arXiv:2306.01272 [cs.CV] https:\/\/arxiv.org\/abs\/2306.01272"},{"key":"e_1_3_2_1_4_1","unstructured":"Anish Athalye. 2021. NeuralHash Collider. https:\/\/github.com\/anishathalye\/ neural-hash-collider."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01764"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3572777"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3145159"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670327"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08736-6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2023.3280669"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_17"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"e_1_3_2_1_17_1","volume-title":"International Journal of Computer Vision","author":"Guo Xiao","year":"2024","unstructured":"Xiao Guo, Xiaohong Liu, Iacopo Masi, and Xiaoming Liu. 2024. Language-guided hierarchical fine-grained image forgery detection and localization. International Journal of Computer Vision (2024), 1-22."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02255-9"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15300-5"},{"key":"e_1_3_2_1_20_1","volume-title":"HDF-Net: Capturing homogeny difference features to localize the tampered image","author":"Han Ruidong","year":"2024","unstructured":"Ruidong Han, Xiaofeng Wang, Ningning Bai, Yihang Wang, Jianpeng Hou, and Jianru Xue. 2024. HDF-Net: Capturing homogeny difference features to localize the tampered image. IEEE Transactions on Pattern Analysis and Machine Intelligence (2024)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3652583.3658014"},{"key":"e_1_3_2_1_22_1","first-page":"850","article-title":"Cryptographic hashing from strong one-way functions (or: One-way product functions and their applications). In 2018 IEEE 59th annual symposium on Foundations of Computer Science (FOCS)","author":"Holmgren Justin","year":"2018","unstructured":"Justin Holmgren and Alex Lombardi. 2018. Cryptographic hashing from strong one-way functions (or: One-way product functions and their applications). In 2018 IEEE 59th annual symposium on Foundations of Computer Science (FOCS). IEEE, 850-858.","journal-title":"IEEE"},{"key":"e_1_3_2_1_23_1","volume-title":"SPAN: Spatial pyramid attention network for image manipulation localization. In Computer Vision-ECCV 2020: 16th European Conference","author":"Hu Xuefeng","year":"2020","unstructured":"Xuefeng Hu, Zhihan Zhang, Zhenye Jiang, Syomantak Chaudhuri, Zhenheng Yang, and Ram Nevatia. 2020. SPAN: Spatial pyramid attention network for image manipulation localization. In Computer Vision-ECCV 2020: 16th European Conference, Glasgow, UK, August 23-28, 2020, Proceedings, Part XXI 16. Springer, 312-328."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.02685"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3027001"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2999188"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3136163"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3393512"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564246.3585225"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01617-5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3533906"},{"key":"e_1_3_2_1_32_1","volume-title":"Robust Image Hashing with Weighted Saliency Map and Laplacian Eigenmaps","author":"Liang Xiaoping","year":"2024","unstructured":"Xiaoping Liang, Zhenjun Tang, Xianquan Zhang, Xinpeng Zhang, and Ching- Nung Yang. 2024. Robust Image Hashing with Weighted Saliency Map and Laplacian Eigenmaps. IEEE Transactions on Information Forensics and Security (2024)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109026"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. 4642-4651","author":"Niloy Fahim Faisal","year":"2023","unstructured":"Fahim Faisal Niloy, Kishor Kumar Bhaumik, and Simon S Woo. 2023. CFLNet: image forgery localization using contrastive learning. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. 4642-4651."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2016.09.003"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3047142"},{"key":"e_1_3_2_1_37_1","volume-title":"A2SPPNet: Attentive Atrous Spatial Pyramid Pooling Network for Salient Object Detection","author":"Qiu Yu","year":"2022","unstructured":"Yu Qiu, Yun Liu, Yanan Chen, Jianwen Zhang, Jinchao Zhu, and Jing Xu. 2022. A2SPPNet: Attentive Atrous Spatial Pyramid Pooling Network for Salient Object Detection. IEEE Transactions on Multimedia (2022)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612386"},{"key":"e_1_3_2_1_39_1","first-page":"461","article-title":"Cryptographic hash functions: a review","volume":"9","author":"Sobti Rajeev","year":"2012","unstructured":"Rajeev Sobti and Ganesan Geetha. 2012. Cryptographic hash functions: a review. International Journal of Computer Science Issues (IJCSI) 9, 2 (2012), 461.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"e_1_3_2_1_40_1","volume-title":"International conference on machine learning. PMLR, 6105-6114","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le. 2019. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning. PMLR, 6105-6114."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1179\/1743131X11Y.0000000039"},{"key":"e_1_3_2_1_42_1","volume-title":"Robust image hashing with ring partition and invariant vector distance","author":"Tang Zhenjun","year":"2015","unstructured":"Zhenjun Tang, Xianquan Zhang, Xianxian Li, and Shichao Zhang. 2015. Robust image hashing with ring partition and invariant vector distance. IEEE transactions on information forensics and security 11, 1 (2015), 200-214."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00240"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2025.3557272"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3289321"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3190273"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01213"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 22390-22400","author":"Zhai Yuanhao","year":"2023","unstructured":"Yuanhao Zhai, Tianyu Luan, David Doermann, and Junsong Yuan. 2023. Towards Generic Image Manipulation Detection withWeakly-Supervised Self-Consistency Learning. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 22390-22400."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01137"},{"key":"e_1_3_2_1_51_1","volume-title":"Dual defense: Adversarial, traceable, and invisible robust watermarking against face swapping","author":"Zhang Yunming","year":"2024","unstructured":"Yunming Zhang, Dengpan Ye, Caiyun Xie, Long Tang, Xin Liao, Ziyi Liu, Chuanxi Chen, and Jiacheng Deng. 2024. Dual defense: Adversarial, traceable, and invisible robust watermarking against face swapping. IEEE Transactions on Information Forensics and Security (2024)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2023.3298990"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00116"},{"key":"e_1_3_2_1_55_1","volume-title":"A Survey of Perceptual Hashing for Multimedia. ACM Transactions on Multimedia Computing, Communications and Applications","author":"Zhou Yuanding","year":"2025","unstructured":"Yuanding Zhou, Xinran Li, Cheng Xiong, Heng Yao, and Chuan Qin. 2025. A Survey of Perceptual Hashing for Multimedia. ACM Transactions on Multimedia Computing, Communications and Applications (2025)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28608"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3755264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:43:29Z","timestamp":1765309409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3755264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":56,"alternative-id":["10.1145\/3746027.3755264","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3755264","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}