{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:18:14Z","timestamp":1755926294439,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659464","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:11:49Z","timestamp":1552950709000},"page":"1796-1802","source":"Crossref","is-referenced-by-count":7,"title":["Feature Pyramid Deep Matching and Localization Network for Image Forensics"],"prefix":"10.23919","author":[{"given":"Kui","family":"Ye","sequence":"first","affiliation":[]},{"given":"Jing","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Tieniu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2077341.2077345","article-title":"Exposing photo manipulation with inconsistent reflections","volume":"31","author":"o'brien","year":"2012","journal-title":"ACM Trans Graph"},{"journal-title":"Recasting Residualbased Local Descriptors as Convolutional Neural Networks an Application toImage Forgery Detection","year":"2017","author":"cozzolino","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823921"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"ref14","first-page":"1","article-title":"Image Region Forgery Detection: A Deep Learning Approach","volume":"14","author":"zhang","year":"0","journal-title":"Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 Cyber-Security by Design"},{"journal-title":"Rethinking atrous convolution for semantic image segmentation","year":"2017","author":"chen","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539970"},{"key":"ref19","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"lin","year":"2014","journal-title":"European Conference on Computer Vision"},{"key":"ref4","article-title":"Detecting doctored images using camera response normality and consistency","author":"lin","year":"2005","journal-title":"Proceedings of Computer Vision and Pattern Recognition"},{"key":"ref3","first-page":"128","article-title":"Statistical tools for digital forensics","volume":"3200","author":"popescu","year":"2004","journal-title":"IH 2004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855406"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161376"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711437"},{"key":"ref7","first-page":"1y","article-title":"Detecting digital image forgeries using sensor pattern noise","volume":"6072","author":"luk","year":"2006","journal-title":"Proc SPIE Electronic Imaging Security Steganography and Watermarking of Multimedia Contents VIII"},{"key":"ref2","article-title":"Detection of copy-move forgery in digital images","author":"fridrich","year":"2003","journal-title":"Proceedings of Digital Forensic Research Workshop"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/2487228.2487236","article-title":"Exposing photo manipulation with inconsistent shadows","volume":"32","author":"kee","year":"2013","journal-title":"ACM Trans Graph (TOG)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123411"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.449"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-16435-4_5","article-title":"Detection of copy-rotate-move forgery using zernike moments","author":"ryu","year":"2010","journal-title":"International Workshop on Information Hiding"},{"key":"ref21","first-page":"746","article-title":"Robust detection of regionduplication forgery in digital image","volume":"4","author":"luo","year":"0","journal-title":"Pattern Recognition ICPR 2006 18th International Conference on"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5413549"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2018,11,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659464.pdf?arnumber=8659464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:34:03Z","timestamp":1598240043000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659464","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}