{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:11:01Z","timestamp":1763341861898,"version":"3.45.0"},"reference-count":30,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061006","type":"journal-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:14:29Z","timestamp":1743048869000},"page":"3451-3469","source":"Crossref","is-referenced-by-count":1,"title":["DDT-Net: Deep Detail Tracking Network for Image Tampering Detection"],"prefix":"10.32604","volume":"83","author":[{"given":"Jim","family":"Wong","sequence":"first","affiliation":[]},{"given":"Zhaoxiang","family":"Zang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","article-title":"Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection","volume":"13","author":"Bayar","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1883","DOI":"10.1049\/ipr2.12763","article-title":"A lightweight image splicing tampering localization method based on MobileNetV2 and SRM","volume":"17","author":"Shi","year":"2023","journal-title":"IET Image Process"},{"key":"ref3","series-title":"Proceeding IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"1053","article-title":"Learning rich features for image manipulation detection","author":"Zhou","year":"2018"},{"key":"ref4","first-page":"100","article-title":"A review on blind detection of digital image tampering","volume":"2022","author":"Zhang","year":"2023","journal-title":"J Inf Secur"},{"key":"ref5","series-title":"Proceeding IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)","first-page":"1055","article-title":"UNet 3+: a full-scale connected UNet for medical image segmentation","author":"Huang","year":"May 2020"},{"key":"ref6","first-page":"795","article-title":"Image splicing forgery detection using feature-based of sonine functions and deep features","volume":"78","author":"Al-Shamasneh","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJAACS.2024.139383","article-title":"Deepfake detection and localisation based on illumination inconsistency","volume":"17","author":"Gu","year":"2024","journal-title":"Int J Auton Adapt Commun Syst"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"120498","DOI":"10.1016\/j.eswa.2023.120498","article-title":"A multi-channel approach for detecting tampering in colour filter images","volume":"230","author":"Gonz\u00e1lez Fern\u00e1ndez","year":"2023","journal-title":"Expert Syst Appl"},{"key":"ref9","first-page":"5026315","article-title":"Multiscale attention network for detection and localization of image splicing forgery","volume":"72","author":"Xu","year":"2023","journal-title":"IEEE Trans Instrum Meas"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s00500-023-08209-6","article-title":"High-performance image forgery detection via adaptive SIFT feature extraction for low-contrast or small or smooth copy-move region images","volume":"28","author":"Sujin","year":"2024","journal-title":"Soft Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"104101","DOI":"10.1016\/j.dsp.2023.104101","article-title":"Hashing-based remote sensing image tamper detection system","volume":"140","author":"Wang","year":"2023","journal-title":"Digit Signal Process"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1007\/s11263-022-01617-5","article-title":"Learning JPEG compression artifacts for image manipulation detection and localization","volume":"130","author":"Kwon","year":"2022","journal-title":"Int J Comput Vis"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1145\/3464388","article-title":"Detecting non-aligned double JPEG compression based on amplitude-angle feature","volume":"17","author":"Wang","year":"2021","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"109778","DOI":"10.1016\/j.patcog.2023.109778","article-title":"A survey on deep learning-based image forgery detection","volume":"144","author":"Mehrjardi","year":"2023","journal-title":"Pattern Recognit"},{"key":"ref15","series-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","first-page":"30","article-title":"RRU-Net: the ringed residual U-Net for image splicing forgery detection","author":"Bi","year":"2019 Jun"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3539","DOI":"10.1109\/TPAMI.2022.3180556","article-title":"MVSS-Net: multi-view multi-scale supervised networks for image manipulation detection","volume":"45","author":"Dong","year":"2023","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref17","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, et al. An image is worth 16x16 words: transformers for image recognition at scale. arXiv:2010.11929. 2020."},{"key":"ref18","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, et al. Attention is all you need. arXiv: 1706.03762. 2017."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"112068","DOI":"10.1016\/j.asoc.2024.112068","article-title":"Image forgery detection by combining visual transformer with variational autoencoder network","volume":"165","author":"Atak","year":"2024","journal-title":"Appl Soft Comput"},{"key":"ref20","series-title":"Proceeding IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"20606","article-title":"Trufor: leveraging all-round clues for trustworthy image forgery detection and localization","author":"Guillaro","year":"2023"},{"key":"ref21","unstructured":"Wu H, Chen Y, Zhou J. Rethinking image forgery detection via contrastive learning and unsupervised clustering. arXiv:2308.09307. 2023."},{"key":"ref22","series-title":"Proceeding 30th International Conference on Multimedia Modeling (MMM 2024)","first-page":"198","article-title":"Exploring multi-modal fusion for image manipulation detection and localization","author":"Triaridis","year":"2024 Jan\u2013Feb"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"6090","DOI":"10.1109\/TMM.2023.3345160","article-title":"CMCF-Net: an end-to-end context multiscale cross-fusion network for robust copy-move forgery detection","volume":"26","author":"Xiong","year":"2024 Dec","journal-title":"IEEE Trans Multimedia"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"5015","DOI":"10.1007\/s00521-021-06329-4","article-title":"DCU-Net: a dual-channel U-shaped network for image splicing forgery detection","volume":"35","author":"Ding","year":"2023","journal-title":"Neural Comput Appl"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"42","DOI":"10.3390\/jimaging10020042","article-title":"Image inpainting forgery detection: a review","volume":"10","author":"Barglazan","year":"2024","journal-title":"J Imaging"},{"key":"ref26","first-page":"3257","article-title":"Efficient forgery detection approaches for digital color images","volume":"71","author":"Baumy","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"104005","DOI":"10.1016\/j.dsp.2023.104005","article-title":"Feature enhancement and supervised contrastive learning for image splicing forgery detection","volume":"136","author":"Xu","year":"2023","journal-title":"Digit Signal Process"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"22611","DOI":"10.1007\/s11042-020-10158-3","article-title":"Encoder-decoder based convolutional neural networks for image forgery detection","volume":"81","author":"El Biach","year":"2022","journal-title":"Multimedia Tools Appl"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","article-title":"PSCC-Net: progressive spatio-channel correlation network for image manipulation detection and localization","volume":"32","author":"Liu","year":"2022","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref30","series-title":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","first-page":"963","article-title":"Noise and edge based dual branch image manipulation detection","author":"Zhang","year":"2023"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_61006\/TSP_CMC_61006.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:05:38Z","timestamp":1763341538000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061006","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}