{"id":"https://openalex.org/W4393170609","doi":"https://doi.org/10.1109/tifs.2024.3381470","title":"Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization","display_name":"Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4393170609","doi":"https://doi.org/10.1109/tifs.2024.3381470"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3381470","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3381470","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Rongxuan Peng","orcid":"https://orcid.org/0009-0007-3739-652X"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rongxuan Peng","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ),, Shenzhen Institute of Artificial Intelligence and Robotics for Society, China"],"raw_orcid":"https://orcid.org/0009-0007-3739-652X","affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ),, Shenzhen Institute of Artificial Intelligence and Robotics for Society, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023503629","display_name":"Shunquan Tan","orcid":"https://orcid.org/0000-0002-7457-3691"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunquan Tan","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ),, Shenzhen Institute of Artificial Intelligence and Robotics for Society, China"],"raw_orcid":"https://orcid.org/0000-0002-7457-3691","affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ),, Shenzhen Institute of Artificial Intelligence and Robotics for Society, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043791595","display_name":"Xianbo Mo","orcid":"https://orcid.org/0000-0001-9198-5041"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianbo Mo","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","College of Electronic and Information Engineering, Shenzhen University, China"],"raw_orcid":"https://orcid.org/0000-0001-9198-5041","affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":[]},{"raw_affiliation_string":"College of Electronic and Information Engineering, Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365163","display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-2613-5451"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","College of Electronic and Information Engineering, Shenzhen University, China"],"raw_orcid":"https://orcid.org/0000-0002-2613-5451","affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":[]},{"raw_affiliation_string":"College of Electronic and Information Engineering, Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I4388482657","display_name":"Shenzhen MSU-BIT University","ror":"https://ror.org/02q963474","country_code":null,"type":"education","lineage":["https://openalex.org/I4388482657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["Faculty of Engineering, Guangdong Laboratory of Machine Perception and Intelligent Computing, Shenzhen MSU-BIT University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ),, Shenzhen Institute of Artificial Intelligence and Robotics for Society, China","College of Electronic and Information Engineering, Shenzhen University, China"],"raw_orcid":"https://orcid.org/0000-0002-7625-5689","affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Guangdong Laboratory of Machine Perception and Intelligent Computing, Shenzhen MSU-BIT University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961","https://openalex.org/I4388482657"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ),, Shenzhen Institute of Artificial Intelligence and Robotics for Society, China","institution_ids":[]},{"raw_affiliation_string":"College of Electronic and Information Engineering, Shenzhen University, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":1.8335,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85894277,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"4820","last_page":"4834"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9505000114440918,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8149782419204712},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.7196168899536133},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6854655742645264},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5475640296936035},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.49647122621536255},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4157235026359558},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3733067214488983},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33026403188705444}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8149782419204712},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.7196168899536133},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6854655742645264},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5475640296936035},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.49647122621536255},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4157235026359558},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3733067214488983},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33026403188705444},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3381470","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3381470","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3775595010","display_name":null,"funder_award_id":"62272314","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7142034960","display_name":null,"funder_award_id":"U23B2022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W115399891","https://openalex.org/W1522301498","https://openalex.org/W1901129140","https://openalex.org/W1945616565","https://openalex.org/W1982106473","https://openalex.org/W1983586459","https://openalex.org/W2169439181","https://openalex.org/W2518397542","https://openalex.org/W2738588019","https://openalex.org/W2739273633","https://openalex.org/W2752015292","https://openalex.org/W2777769595","https://openalex.org/W2808402081","https://openalex.org/W2888338418","https://openalex.org/W2895129173","https://openalex.org/W2902355450","https://openalex.org/W2904419556","https://openalex.org/W2911605501","https://openalex.org/W2912648825","https://openalex.org/W2948407537","https://openalex.org/W2963420272","https://openalex.org/W2963447079","https://openalex.org/W2964146055","https://openalex.org/W2982058372","https://openalex.org/W3027377338","https://openalex.org/W3030970836","https://openalex.org/W3034779438","https://openalex.org/W3035430204","https://openalex.org/W3043547428","https://openalex.org/W3082623289","https://openalex.org/W3106990721","https://openalex.org/W3118025593","https://openalex.org/W3136675246","https://openalex.org/W3140970613","https://openalex.org/W3154575015","https://openalex.org/W3168686693","https://openalex.org/W3179308556","https://openalex.org/W3189718486","https://openalex.org/W3197106219","https://openalex.org/W3208354318","https://openalex.org/W4226125322","https://openalex.org/W4280529470","https://openalex.org/W4294811247","https://openalex.org/W4310884405","https://openalex.org/W4312497550","https://openalex.org/W4313121508","https://openalex.org/W4386075803","https://openalex.org/W6631190155","https://openalex.org/W6640425456","https://openalex.org/W6692846177","https://openalex.org/W6762718338","https://openalex.org/W6810940779","https://openalex.org/W6847790719"],"related_works":["https://openalex.org/W2366107444","https://openalex.org/W4388145910","https://openalex.org/W2381570729","https://openalex.org/W1976205134","https://openalex.org/W4248336175","https://openalex.org/W2031260042","https://openalex.org/W2391445434","https://openalex.org/W3009369890","https://openalex.org/W4312490297","https://openalex.org/W2062212388"],"abstract_inverted_index":{"The":[0],"widespread":[1],"misuse":[2],"of":[3,17,30,42,71,140,201],"advanced":[4],"image":[5,115,143,162,212],"editing":[6],"tools":[7],"and":[8,40,144,209,222],"deep":[9],"generative":[10],"techniques":[11],"has":[12,33],"led":[13],"to":[14,38,103,112,120,133,183],"a":[15,35,56,84,129,167,199],"proliferation":[16],"images":[18],"with":[19,94],"altered":[20],"content":[21],"in":[22,74,160],"real-life":[23],"scenarios,":[24,164],"often":[25,158],"without":[26],"any":[27],"discernible":[28],"traces":[29],"tampering.":[31],"This":[32,176],"created":[34],"potential":[36],"threat":[37],"security":[39],"credibility":[41],"images.":[43,76],"Image":[44],"forgery":[45,80,108,116,147],"localization":[46,69,81,207],"is":[47,92,157],"an":[48,95],"urgent":[49],"technique.":[50],"In":[51,118],"this":[52],"paper,":[53],"we":[54,127,165],"propose":[55,128],"novel":[57],"reinforcement":[58],"learning-based":[59],"framework":[60],"CoDE":[61],"(Construct":[62],"Decision-making":[63],"Environment)":[64],"that":[65,97,153],"can":[66,179],"provide":[67],"reliable":[68],"result":[70],"tampered":[72,155,174],"area":[73,156],"forged":[75,142],"We":[77],"model":[78],"the":[79,106,122,135,141,154,181,187,192],"task":[82],"as":[83,111],"Markov":[85],"Decision":[86],"Process":[87],"(MDP),":[88],"where":[89],"each":[90],"pixel":[91],"equipped":[93],"agent":[96,182],"performs":[98],"Gaussian":[99],"distribution-based":[100],"continuous":[101],"action":[102],"iteratively":[104],"update":[105],"respective":[107],"probability,":[109],"so":[110],"achieve":[113],"pixel-level":[114],"localization.":[117],"order":[119],"construct":[121],"state":[123,131],"transitions":[124],"within":[125],"MDP,":[126],"twin-flow":[130],"encoder":[132],"handle":[134],"updated":[136],"state,":[137],"which":[138],"consists":[139],"its":[145],"corresponding":[146],"probability":[148],"map.":[149],"What\u2019s":[150],"more,":[151],"considering":[152],"sparse":[159,173],"practical":[161],"tampering":[163],"design":[166],"reward":[168,177],"function":[169,178],"specifically":[170],"for":[171,190],"these":[172],"area.":[175],"guide":[180],"more":[184],"effectively":[185],"learn":[186],"optimal":[188],"strategy":[189],"maximizing":[191],"cumulative":[193],"reward.":[194],"Extensive":[195],"experiments":[196],"conducted":[197],"on":[198],"variety":[200],"benchmark":[202],"datasets":[203],"demonstrate":[204],"CoDE\u2019s":[205],"superior":[206],"accuracy":[208],"robustness":[210],"against":[211],"degradation":[213],"caused":[214],"by":[215],"transmission":[216],"through":[217],"Online":[218],"Social":[219],"Networks":[220],"(OSNs)":[221],"various":[223],"post-processing":[224],"attacks.":[225]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-09T13:55:54.758798","created_date":"2025-10-10T00:00:00"}
