{"id":"https://openalex.org/W7091354775","doi":"https://doi.org/10.1109/tce.2025.3621056","title":"Precise and Privacy-Preserving Tampering Detection Model for Document Images","display_name":"Precise and Privacy-Preserving Tampering Detection Model for Document Images","publication_year":2025,"publication_date":"2025-10-15","ids":{"openalex":"https://openalex.org/W7091354775","doi":"https://doi.org/10.1109/tce.2025.3621056"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2025.3621056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3621056","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Bowen Xing","orcid":"https://orcid.org/0009-0006-2938-8506"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bowen Xing","raw_affiliation_strings":["College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Junqing Le","orcid":"https://orcid.org/0000-0003-2240-5263"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junqing Le","raw_affiliation_strings":["College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Feifei Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feifei Zhu","raw_affiliation_strings":["College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dong Li","orcid":"https://orcid.org/0009-0000-3221-2671"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Li","raw_affiliation_strings":["College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yu Zhou","orcid":"https://orcid.org/0009-0000-7602-3493"},"institutions":[{"id":"https://openalex.org/I4210136169","display_name":"Chongqing Construction Engineering Investment Holding (China)","ror":"https://ror.org/04f63ne57","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136169"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhou","raw_affiliation_strings":["Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China","institution_ids":["https://openalex.org/I4210136169"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wei Wang","orcid":"https://orcid.org/0009-0006-0357-7026"},"institutions":[{"id":"https://openalex.org/I4210136169","display_name":"Chongqing Construction Engineering Investment Holding (China)","ror":"https://ror.org/04f63ne57","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136169"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China","institution_ids":["https://openalex.org/I4210136169"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yi Wang","orcid":"https://orcid.org/0000-0002-9013-7232"},"institutions":[{"id":"https://openalex.org/I4210136169","display_name":"Chongqing Construction Engineering Investment Holding (China)","ror":"https://ror.org/04f63ne57","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136169"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Wang","raw_affiliation_strings":["Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China","institution_ids":["https://openalex.org/I4210136169"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yi Liu","orcid":"https://orcid.org/0009-0008-9668-7076"},"institutions":[{"id":"https://openalex.org/I4210136169","display_name":"Chongqing Construction Engineering Investment Holding (China)","ror":"https://ror.org/04f63ne57","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136169"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Liu","raw_affiliation_strings":["Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Chongqing Ant Consumer Finance Company Ltd., Chongqing, China","institution_ids":["https://openalex.org/I4210136169"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xiaofeng Liao","orcid":"https://orcid.org/0000-0002-3566-8161"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Liao","raw_affiliation_strings":["College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and the Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.55314248,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"71","issue":"4","first_page":"9889","last_page":"9903"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.6148999929428101,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.6148999929428101,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.09830000251531601,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.07320000231266022,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5303000211715698},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.525600016117096},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5221999883651733},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.47530001401901245},{"id":"https://openalex.org/keywords/ticket","display_name":"Ticket","score":0.46309998631477356},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4625999927520752},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.44440001249313354},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4431000053882599},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.42260000109672546}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7986000180244446},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5303000211715698},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.525600016117096},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5221999883651733},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.47530001401901245},{"id":"https://openalex.org/C2776540713","wikidata":"https://www.wikidata.org/wiki/Q7800647","display_name":"Ticket","level":2,"score":0.46309998631477356},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4625999927520752},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4456999897956848},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.44440001249313354},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4431000053882599},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.42260000109672546},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4207000136375427},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.40059998631477356},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39320001006126404},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.36739999055862427},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.34619998931884766},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3395000100135803},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.33709999918937683},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.336899995803833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3158000111579895},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.3086000084877014},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2962000072002411},{"id":"https://openalex.org/C93959086","wikidata":"https://www.wikidata.org/wiki/Q6888345","display_name":"Model selection","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.2809999883174896},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.2754000127315521},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2655999958515167},{"id":"https://openalex.org/C81293917","wikidata":"https://www.wikidata.org/wiki/Q4189534","display_name":"System deployment","level":3,"score":0.2623000144958496},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2572000026702881},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3621056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3621056","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7342199087142944,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W2021549453","https://openalex.org/W2053637704","https://openalex.org/W2930926105","https://openalex.org/W2948407537","https://openalex.org/W2963062476","https://openalex.org/W2963378725","https://openalex.org/W2964881778","https://openalex.org/W2965545961","https://openalex.org/W2970408908","https://openalex.org/W2971544778","https://openalex.org/W2981336898","https://openalex.org/W3003484198","https://openalex.org/W3011768388","https://openalex.org/W3034530968","https://openalex.org/W3040384242","https://openalex.org/W3111919937","https://openalex.org/W3118971208","https://openalex.org/W3136675246","https://openalex.org/W3140970613","https://openalex.org/W3180811329","https://openalex.org/W3217374154","https://openalex.org/W4205366980","https://openalex.org/W4210485920","https://openalex.org/W4220692145","https://openalex.org/W4225554547","https://openalex.org/W4283208007","https://openalex.org/W4296709152","https://openalex.org/W4309120609","https://openalex.org/W4312349930","https://openalex.org/W4312443924","https://openalex.org/W4316660683","https://openalex.org/W4317796249","https://openalex.org/W4384499048","https://openalex.org/W4386076109","https://openalex.org/W4386076222","https://openalex.org/W4386076493","https://openalex.org/W4387490649","https://openalex.org/W4389252489","https://openalex.org/W4390769608","https://openalex.org/W4391952588","https://openalex.org/W4392309159","https://openalex.org/W4405022709","https://openalex.org/W4405786115","https://openalex.org/W4408358233","https://openalex.org/W4409261523","https://openalex.org/W4409426360"],"related_works":[],"abstract_inverted_index":{"Document":[0],"images,":[1],"which":[2,179],"are":[3],"crucial":[4],"vital":[5],"for":[6,35,101,188],"information":[7,22],"dissemination,":[8],"often":[9],"contain":[10],"sensitive":[11],"data":[12,48,67],"such":[13],"as":[14],"ID":[15],"and":[16,37,96,113,125,146,165,185],"bank":[17],"card":[18],"numbers.":[19],"If":[20],"this":[21,90],"is":[23,119,173,186],"tampered":[24,128],"with":[25,155],"or":[26],"leaked,":[27],"it":[28],"will":[29],"lead":[30],"to":[31,121,151],"severe":[32],"economic":[33],"losses":[34],"individuals":[36],"businesses.":[38],"Moreover,":[39],"the":[40,160,163,170,181],"private":[41,74],"nature":[42],"of":[43,127],"these":[44],"images":[45,76,103],"results":[46],"in":[47,175,190],"silos":[49],"that":[50,138,169],"hinder":[51],"model":[52,64,79,100,118],"learning.":[53],"Federated":[54],"learning":[55],"(FL)":[56],"provides":[57],"a":[58,94,111,133,147],"good":[59],"solution":[60],"by":[61],"enabling":[62],"collaborative":[63],"training":[65],"without":[66],"sharing,":[68],"but":[69],"attackers":[70],"can":[71],"still":[72],"infer":[73],"document":[75,102],"from":[77,86],"local":[78],"gradients":[80],"using":[81],"methods":[82],"like":[83],"Deep":[84],"Leakage":[85],"Gradients":[87],"(DLG).":[88],"Towards":[89],"end,":[91],"we":[92,131],"propose":[93],"Precise":[95],"Privacy-preserving":[97],"Tampering":[98],"Detection":[99],"under":[104],"FL":[105],"framework,":[106],"named":[107],"PPTD.":[108],"In":[109],"PPTD,":[110],"multi-scale":[112],"multi-domain":[114],"image":[115],"tampering":[116],"detection":[117,124,157],"designed":[120],"achieve":[122],"precise":[123],"localization":[126],"regions.":[129],"Besides,":[130],"construct":[132],"fine-grained":[134],"differential":[135],"privacy":[136,142],"scheme":[137],"combines":[139],"an":[140],"adaptive":[141],"budget":[143],"allocation":[144],"strategy":[145,150],"client":[148],"selection":[149],"prevent":[152],"gradient":[153],"leakage":[154],"high":[156],"accuracy.":[158],"Finally,":[159],"experiments":[161],"on":[162],"T-SROIE":[164],"DocTamper":[166],"datasets":[167],"demonstrate":[168],"proposed":[171],"PPTD":[172],"effective":[174],"resisting":[176],"DLG":[177],"attacks,":[178],"addresses":[180],"ticket":[182],"fraud":[183],"issues,":[184],"suitable":[187],"deployment":[189],"real":[191],"financial":[192],"scenarios.":[193]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-16T00:00:00"}
