{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T02:28:54Z","timestamp":1743992934735},"reference-count":68,"publisher":"Hindawi Limited","issue":"5","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1002\/int.22826","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T09:37:09Z","timestamp":1642412229000},"page":"3072-3089","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["MC\u2010Net: Learning mutually\u2010complementary features for image manipulation localization"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8891-0989","authenticated-orcid":false,"given":"Dengyun","family":"Xu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology Jilin University Changchun Jilin China"},{"name":"Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9005-076X","authenticated-orcid":false,"given":"Xuanjing","family":"Shen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology Jilin University Changchun Jilin China"},{"name":"Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2037-6692","authenticated-orcid":false,"given":"Yingda","family":"Lyu","sequence":"additional","affiliation":[{"name":"Center for Computer Fundamental Education Jilin University Changchun Jilin China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4641-1994","authenticated-orcid":false,"given":"Xiaoyu","family":"Du","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5828-9842","authenticated-orcid":false,"given":"Fuli","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Computing National University of Singapore Singapore Singapore"}]}],"member":"98","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2231088"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2187181"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"ZhangH ShangX YangW XuH LuanH ChuaT\u2010S. Online collaborative learning for open\u2010vocabulary visual classifiers. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2016.","DOI":"10.1109\/CVPR.2016.307"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"QiJ NiuY HuangJ ZhangH. Two causal principles for improving visual dialog. 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2020.","DOI":"10.1109\/CVPR42600.2020.01087"},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"YueZ WangT ZhangH SunQ HuaXS. Counterfactual zero\u2010shot and open\u2010set visual recognition. 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2021.","DOI":"10.1109\/CVPR46437.2021.01515"},{"key":"e_1_2_7_7_1","doi-asserted-by":"crossref","unstructured":"DuX YangX QinZ TangJ. Progressive image enhancement under aesthetic guidance. Proceedings of the 2019 on International Conference on Multimedia Retrieval.2019:349\u2010353.","DOI":"10.1145\/3323873.3325055"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"YangX FengF JiW WangM ChuaT\u2010S. Deconfounded video moment retrieval with causal intervention. The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval;2021.","DOI":"10.1145\/3404835.3462823"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2861991"},{"key":"e_1_2_7_10_1","doi-asserted-by":"crossref","unstructured":"MengL ChenL YangX et al. Learning using privileged information for food recognition. Proceedings of the 27th ACM International Conference on Multimedia;2019:557\u2010565.","DOI":"10.1145\/3343031.3350870"},{"issue":"3","key":"e_1_2_7_11_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3375787","article-title":"Deep neighborhood component analysis for visual similarity modeling","volume":"11","author":"Liu X","year":"2020","journal-title":"ACM Trans Intell Syst Technol"},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","unstructured":"YangX LiuX JianM GaoX WangM. Weakly\u2010supervised video object grounding by exploring spatio\u2010temporal contexts. Proceedings of the 28th ACM International Conference on Multimedia; 2020:1939\u20101947.","DOI":"10.1145\/3394171.3413610"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3115658"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2207397"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2185041"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2765836"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3049784"},{"key":"e_1_2_7_18_1","article-title":"Context\u2010aware graph inference with knowledge distillation for visual dialog","author":"Guo D","year":"2021","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2415497"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22458"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22372"},{"key":"e_1_2_7_22_1","first-page":"393","article-title":"Wheel: accelerating CNNs with distributed GPUs via hybrid parallelism and alternate strategy","author":"Du X","year":"2017","journal-title":"ACM Multimedia"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1738-7"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656823"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.04.004"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2272377"},{"key":"e_1_2_7_28_1","unstructured":"YuanR NiJ. A deep learning approach to detection of splicing and copy\u2010move forgeries in images. 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE;2016:1\u20106."},{"key":"e_1_2_7_29_1","doi-asserted-by":"crossref","unstructured":"BunkJ BappyJH MohammedTM et al. Detection and localization of image forgeries using resampling features and deep learning. 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE;2017:1881\u20101889.","DOI":"10.1109\/CVPRW.2017.235"},{"key":"e_1_2_7_30_1","unstructured":"ZhangY GohJ WinLL ThingVLL. Image region forgery detection: a deep learning approach. Proceedings of the Singapore Cyber\u2010Security Conference (SG\u2010CRC). IOS Press;2016:1\u201011."},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2423261"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22499"},{"key":"e_1_2_7_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22577"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22558"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2982705"},{"key":"e_1_2_7_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2957693"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2895466"},{"key":"e_1_2_7_39_1","doi-asserted-by":"crossref","unstructured":"ZhouP HanX MorariuVI DavisLS. Learning rich features for image manipulation detection. 2018 (IEEE)\/(CVF) Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2018:1053\u20101061.","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"7","key":"e_1_2_7_40_1","first-page":"13058","article-title":"Generate, segment, and refine: towards generic manipulation segmentation","volume":"34","author":"Zhou P","year":"2020","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3045903"},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825953"},{"key":"e_1_2_7_43_1","doi-asserted-by":"crossref","unstructured":"WuY AbdAlmageedW NatarajanP. ManTra\u2010Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. 2019 (IEEE)\/(CVF) Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2019:9535\u20109544.","DOI":"10.1109\/CVPR.2019.00977"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"e_1_2_7_45_1","doi-asserted-by":"crossref","unstructured":"BappyJH Roy\u2010ChowdhuryAK BunkJ NatarajL ManjunathBS. Exploiting spatial structure for localizing manipulated image regions. 2017 (IEEE)\/(CVF) International Conference on Computer Vision (ICCV). IEEE;2017:4980\u20104989.","DOI":"10.1109\/ICCV.2017.532"},{"key":"e_1_2_7_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.3026954"},{"key":"e_1_2_7_47_1","unstructured":"MazaheriG MithunNC BappyJH Roy\u2010ChowdhuryAK. a skip connection architecture for localization of image manipulations. 2019 (IEEE)\/(CVF) Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2019:119\u2010129."},{"key":"e_1_2_7_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2902826"},{"key":"e_1_2_7_49_1","doi-asserted-by":"crossref","unstructured":"YangC LiH LinF JiangB ZhaoH. Constrained r\u2010CNN: A general image manipulation detection model. 2020 IEEE International conference on multimedia and expo (ICME). IEEE;2020.","DOI":"10.1109\/ICME46284.2020.9102825"},{"key":"e_1_2_7_50_1","doi-asserted-by":"crossref","unstructured":"LiH HuangJ. Localization of deep inpainting using high\u2010pass fully convolutional network. In: 2019 (IEEE)\/(CVF) International Conference on Computer Vision (ICCV). IEEE;2019:8300\u20108309.","DOI":"10.1109\/ICCV.2019.00839"},{"key":"e_1_2_7_51_1","doi-asserted-by":"crossref","unstructured":"WooS ParkJ LeeJY KweonIS. CBAM: convolutional block attention module. 2018 European Conference on Computer Vision (ECCV).Springer;2018:3\u201019.","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"e_1_2_7_52_1","doi-asserted-by":"crossref","unstructured":"LiY ChenX ZhuZ et al. Attention\u2010guided unified network for panoptic segmentation. 2019 (IEEE)\/(CVF) Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2019:7026\u20107035.","DOI":"10.1109\/CVPR.2019.00719"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59725-2_25"},{"key":"e_1_2_7_54_1","doi-asserted-by":"crossref","unstructured":"ZhangY XiangT HospedalesTM LuH. Deep mutual learning. 2018 (IEEE)\/(CVF) Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2018:4320\u20104328.","DOI":"10.1109\/CVPR.2018.00454"},{"key":"e_1_2_7_55_1","doi-asserted-by":"crossref","unstructured":"WuS LiJ LiuC YuZ WongHS. Mutual learning of complementary networks via residual correction for improving semi\u2010supervised classification. 2019 (IEEE)\/(CVF) Conference on Computer Vision and Pattern Recognition (CVPR). IEEE;2019:6500\u20106509.","DOI":"10.1109\/CVPR.2019.00666"},{"key":"e_1_2_7_56_1","doi-asserted-by":"crossref","unstructured":"HouS LiuX WangZ. DualNet: learn complementary features for image recognition. 2017 (IEEE)\/(CVF) International Conference on Computer Vision (ICCV). IEEE;2017:502\u2010510.","DOI":"10.1109\/ICCV.2017.62"},{"key":"e_1_2_7_57_1","unstructured":"NIST.Nimble media forensics challenge datasets;2016.https:\/\/www.nist.gov\/itl\/iad\/mig\/media-forensics-challenge"},{"key":"e_1_2_7_58_1","doi-asserted-by":"crossref","unstructured":"WenB ZhuY SubramanianR NgTT WinklerS. A novel database for copy\u2010move forgery detection. 2016 IEEE International Conference on Image Processing (ICIP). IEEE;2016:161\u2010165.","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"e_1_2_7_59_1","doi-asserted-by":"crossref","unstructured":"DongJ WangW TanT. Casia image tampering detection evaluation database. 2013 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). IEEE;2013:422\u2010426.","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"e_1_2_7_60_1","doi-asserted-by":"crossref","unstructured":"NovozamskyA MahdianB SaicS. IMD2020: A large\u2010scale annotated dataset tailored for detecting manipulated images. 2020 IEEE Winter Applications of Computer Vision Workshops (WACVW). IEEE;2020:71\u201080.","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"e_1_2_7_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/15567281.2010.531500"},{"key":"e_1_2_7_62_1","doi-asserted-by":"crossref","unstructured":"LinTY MaireM BelongieS et al. Microsoft coco: common objects in context. 2014 European Conference on Computer Vision (ECCV). Springer;2014:740\u2010755.","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_2_7_63_1","unstructured":"PaszkeA GrossS MassaF et al. Pytorch: an imperative style high\u2010performance deep learning library. 33rd Conference on Neural Information Processing Systems (NeurIPS). 2019;32."},{"key":"e_1_2_7_64_1","unstructured":"KingmaDP BaJ. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980;2014."},{"key":"e_1_2_7_65_1","unstructured":"KrawetzN SolutionsHF. A picture's worth. Hacker Factor Solutions.2017;6(2):2."},{"key":"e_1_2_7_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"},{"key":"e_1_2_7_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"e_1_2_7_68_1","unstructured":"BoisV.ManTra\u2010Net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. [CP\/OL].https:\/\/github.com\/BoisV\/MantraNet_pytorch"},{"key":"e_1_2_7_69_1","doi-asserted-by":"crossref","unstructured":"YueW Abd\u2010AlmageedW NatarajanP. BusterNet: detecting copy\u2010move image forgery with source\/target localization. 2018 European conference on computer vision (ECCV).Springer;2018:170\u2010186.","DOI":"10.1007\/978-3-030-01231-1_11"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22826","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.22826","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:33:56Z","timestamp":1675956836000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.22826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":68,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["10.1002\/int.22826"],"URL":"https:\/\/doi.org\/10.1002\/int.22826","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"2021-07-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}