{"id":"https://openalex.org/W4407737494","doi":"https://doi.org/10.1109/whispers65427.2024.10876504","title":"Remote Sensing Image Forgery Detection Using Split and Merge Input U-Net","display_name":"Remote Sensing Image Forgery Detection Using Split and Merge Input U-Net","publication_year":2024,"publication_date":"2024-12-09","ids":{"openalex":"https://openalex.org/W4407737494","doi":"https://doi.org/10.1109/whispers65427.2024.10876504"},"language":"en","primary_location":{"id":"doi:10.1109/whispers65427.2024.10876504","is_oa":false,"landing_page_url":"https://doi.org/10.1109/whispers65427.2024.10876504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 14th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051150988","display_name":"Deepti Patole","orcid":"https://orcid.org/0000-0001-5712-8177"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Deepti Patole","raw_affiliation_strings":["Ramrao Adik Institute of Technology, Computer Engineering, D. Y. Patil, Deemed to be University"],"affiliations":[{"raw_affiliation_string":"Ramrao Adik Institute of Technology, Computer Engineering, D. Y. Patil, Deemed to be University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079108746","display_name":"Himali Patil","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Himali Patil","raw_affiliation_strings":["Ramrao Adik Institute of Technology, Computer Engineering, D. Y. Patil, Deemed to be University"],"affiliations":[{"raw_affiliation_string":"Ramrao Adik Institute of Technology, Computer Engineering, D. Y. Patil, Deemed to be University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103139066","display_name":"Sangita Chaudhari","orcid":"https://orcid.org/0000-0002-2152-225X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sangita Chaudhari","raw_affiliation_strings":["Ramrao Adik Institute of Technology, Computer Science and Engineering, D. Y. Patil, Deemed to be University"],"affiliations":[{"raw_affiliation_string":"Ramrao Adik Institute of Technology, Computer Science and Engineering, D. Y. Patil, Deemed to be University","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051150988"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2617,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59289692,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9556000232696533,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9307000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/merge","display_name":"Merge (version control)","score":0.8097503781318665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6536791324615479},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4558067321777344},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41294509172439575},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.3414928615093231},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.060316622257232666}],"concepts":[{"id":"https://openalex.org/C197129107","wikidata":"https://www.wikidata.org/wiki/Q1921621","display_name":"Merge (version control)","level":2,"score":0.8097503781318665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6536791324615479},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4558067321777344},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41294509172439575},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.3414928615093231},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.060316622257232666}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/whispers65427.2024.10876504","is_oa":false,"landing_page_url":"https://doi.org/10.1109/whispers65427.2024.10876504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 14th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2772917594","https://openalex.org/W2036807459","https://openalex.org/W2058170566","https://openalex.org/W2755342338","https://openalex.org/W2166024367","https://openalex.org/W3116076068","https://openalex.org/W2229312674","https://openalex.org/W2951359407","https://openalex.org/W2079911747","https://openalex.org/W1969923398"],"abstract_inverted_index":{"Remote":[0],"sensing":[1,49],"images":[2,113],"are":[3],"indispensable":[4],"tools":[5],"in":[6,47,93],"critical":[7],"domains":[8],"such":[9,74],"as":[10,75],"environmental":[11],"monitoring,":[12],"urban":[13],"planning,":[14],"and":[15,34,57,79,85,96,99],"national":[16],"security.":[17],"However,":[18],"the":[19,58,83,91,108],"integrity":[20],"of":[21,87,111],"these":[22],"data":[23,69],"sources":[24],"can":[25],"be":[26],"compromised":[27],"due":[28],"to":[29,32,106],"forgery,":[30],"leading":[31],"mis-information":[33],"potentially":[35],"harmful":[36],"consequences.":[37],"This":[38],"paper":[39],"presents":[40],"a":[41],"novel":[42],"approach":[43],"for":[44],"detecting":[45],"forgery":[46,72],"remote":[48],"images.":[50],"Through":[51],"extensive":[52],"experimentation":[53],"on":[54],"benchmark":[55],"datasets":[56],"RSICD":[59],"(Remote":[60],"Sensing":[61],"Image":[62],"Capturing":[63],"Dataset)":[64],"[1],":[65],"augmented":[66],"with":[67,97],"synthetic":[68],"created":[70],"using":[71],"techniques":[73],"copy-move,":[76],"resizing,":[77],"rotation":[78],"splicing,":[80],"we":[81],"demonstrate":[82],"effectiveness":[84],"scalability":[86],"our":[88,102],"approach.":[89],"With":[90],"variations":[92],"U-Net":[94],"model":[95],"split":[98],"merge":[100],"operations":[101],"method":[103],"is":[104],"able":[105],"locate":[107],"forged":[109],"regions":[110],"input":[112],"efficiently.":[114]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
