
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Spatiotemporal Trident Networks: Detection and Localization of Object Removal Tampering in Video Passive Forensics
Quanxin Yang, Dongjin Yu, Zhuxi Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 10, pp. 4131-4144
Closed Access | Times Cited: 36
Quanxin Yang, Dongjin Yu, Zhuxi Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 10, pp. 4131-4144
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
PSCC-Net: Progressive Spatio-Channel Correlation Network for Image Manipulation Detection and Localization
Xiaohong Liu, Yaojie Liu, Jun Chen, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 11, pp. 7505-7517
Open Access | Times Cited: 172
Xiaohong Liu, Yaojie Liu, Jun Chen, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 11, pp. 7505-7517
Open Access | Times Cited: 172
Edge-aware Regional Message Passing Controller for Image Forgery Localization
Dong Li, Jiaying Zhu, Menglu Wang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023)
Closed Access | Times Cited: 26
Dong Li, Jiaying Zhu, Menglu Wang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023)
Closed Access | Times Cited: 26
High-performance reversible data hiding based on ridge regression prediction algorithm
Xiaoyu Wang, Xingyuan Wang, Bin Ma, et al.
Signal Processing (2022) Vol. 204, pp. 108818-108818
Closed Access | Times Cited: 24
Xiaoyu Wang, Xingyuan Wang, Bin Ma, et al.
Signal Processing (2022) Vol. 204, pp. 108818-108818
Closed Access | Times Cited: 24
A Light Weight Depthwise Separable Layer Optimized CNN Architecture for Object-Based Forgery Detection in Surveillance Videos
Sandhya, Abhishek Kumar Kashyap
The Computer Journal (2024) Vol. 67, Iss. 6, pp. 2270-2285
Closed Access | Times Cited: 5
Sandhya, Abhishek Kumar Kashyap
The Computer Journal (2024) Vol. 67, Iss. 6, pp. 2270-2285
Closed Access | Times Cited: 5
A Local Perturbation Generation Method for GAN-Generated Face Anti-Forensics
Haitao Zhang, Beijing Chen, Jinwei Wang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 33, Iss. 2, pp. 661-676
Open Access | Times Cited: 21
Haitao Zhang, Beijing Chen, Jinwei Wang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 33, Iss. 2, pp. 661-676
Open Access | Times Cited: 21
Image manipulation localization via semantic-guided feature enhancement and deep multi-scale edge supervision
Haichou Wang, Hang Cheng, Yun Chen, et al.
Neurocomputing (2025), pp. 130255-130255
Closed Access
Haichou Wang, Hang Cheng, Yun Chen, et al.
Neurocomputing (2025), pp. 130255-130255
Closed Access
Graph-based code semantics learning for efficient semantic code clone detection
Dongjin Yu, Quanxin Yang, Xin Chen, et al.
Information and Software Technology (2022) Vol. 156, pp. 107130-107130
Closed Access | Times Cited: 15
Dongjin Yu, Quanxin Yang, Xin Chen, et al.
Information and Software Technology (2022) Vol. 156, pp. 107130-107130
Closed Access | Times Cited: 15
Adaptive Texture and Spectrum Clue Mining for Generalizable Face Forgery Detection
Jiawei Liu, Jingyi Xie, Yang Wang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1922-1934
Closed Access | Times Cited: 8
Jiawei Liu, Jingyi Xie, Yang Wang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1922-1934
Closed Access | Times Cited: 8
Visualizing the truth: a survey of multimedia forensic analysis
Anjali Diwan, Upasana Sonkar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 47979-48006
Closed Access | Times Cited: 7
Anjali Diwan, Upasana Sonkar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 47979-48006
Closed Access | Times Cited: 7
A novel method for real-time object-based copy-move tampering localization in videos using fine-tuned YOLO V8
Sandhya, Abhishek Kumar Kashyap
Forensic Science International Digital Investigation (2023) Vol. 48, pp. 301663-301663
Closed Access | Times Cited: 7
Sandhya, Abhishek Kumar Kashyap
Forensic Science International Digital Investigation (2023) Vol. 48, pp. 301663-301663
Closed Access | Times Cited: 7
MGQFormer: Mask-Guided Query-Based Transformer for Image Manipulation Localization
Kunlun Zeng, Ri Cheng, Weimin Tan, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 7, pp. 6944-6952
Open Access | Times Cited: 2
Kunlun Zeng, Ri Cheng, Weimin Tan, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 7, pp. 6944-6952
Open Access | Times Cited: 2
An Interpretable Image Tampering Detection Approach Based on Cooperative Game
Wei Lu, Wenbo Xu, Ziqi Sheng
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 33, Iss. 2, pp. 952-962
Closed Access | Times Cited: 10
Wei Lu, Wenbo Xu, Ziqi Sheng
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 33, Iss. 2, pp. 952-962
Closed Access | Times Cited: 10
Video Surveillance Object Forgery Detection using PDCL Network with Residual-based Steganalysis Feature
Yanfen Gan, Jixiang Yang, Jun-Liu Zhong
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-17
Open Access | Times Cited: 4
Yanfen Gan, Jixiang Yang, Jun-Liu Zhong
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-17
Open Access | Times Cited: 4
Copy-Move Forgery Detection and Localization Framework for Images Using Stationary Wavelet Transform and Hybrid Dilated Adaptive VGG16 with Optimization Strategy
Prabhu Bevinamarad, Prakash H. Unki, Padmaraj Nidagundi
International Journal of Image Graphics and Signal Processing (2024) Vol. 16, Iss. 1, pp. 38-60
Open Access | Times Cited: 1
Prabhu Bevinamarad, Prakash H. Unki, Padmaraj Nidagundi
International Journal of Image Graphics and Signal Processing (2024) Vol. 16, Iss. 1, pp. 38-60
Open Access | Times Cited: 1
An MSDCNN-LSTM framework for video frame deletion forensics
Chunhui Feng, Dawei Wu, Tianle Wu, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 29, pp. 72745-72764
Closed Access | Times Cited: 1
Chunhui Feng, Dawei Wu, Tianle Wu, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 29, pp. 72745-72764
Closed Access | Times Cited: 1
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization
R. C. Peng, Shunquan Tan, Xianbo Mo, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4820-4834
Closed Access | Times Cited: 1
R. C. Peng, Shunquan Tan, Xianbo Mo, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4820-4834
Closed Access | Times Cited: 1
Real‐time object‐removal tampering localization in surveillance videos by employing YOLO‐V8
Sandhya, Abhishek Kashyap
Journal of Forensic Sciences (2024) Vol. 69, Iss. 4, pp. 1304-1319
Closed Access | Times Cited: 1
Sandhya, Abhishek Kashyap
Journal of Forensic Sciences (2024) Vol. 69, Iss. 4, pp. 1304-1319
Closed Access | Times Cited: 1
Seeing the Invisible: Recovering Surveillance Video with COTS mmWave Radar
Mingda Han, Huanqi Yang, Mingda Jia, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14592-14606
Closed Access | Times Cited: 1
Mingda Han, Huanqi Yang, Mingda Jia, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14592-14606
Closed Access | Times Cited: 1
Exposing video surveillance object forgery by combining TSF features and attention-based deep neural networks
Jun-Liu Zhong, Yanfen Gan, Jixiang Yang, et al.
Journal of Visual Communication and Image Representation (2024) Vol. 104, pp. 104267-104267
Closed Access | Times Cited: 1
Jun-Liu Zhong, Yanfen Gan, Jixiang Yang, et al.
Journal of Visual Communication and Image Representation (2024) Vol. 104, pp. 104267-104267
Closed Access | Times Cited: 1
Systematic analysis of video tampering and detection techniques
Anjali Diwan, Saurav Dixit, Ram Subbiah, et al.
Cogent Engineering (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Anjali Diwan, Saurav Dixit, Ram Subbiah, et al.
Cogent Engineering (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 1
Spatiotemporal Detection and Localization of Object Removal Video Forgery with Multiple Feature Extraction and Optimized Residual Network
Lakshmi Prasanna Kumari, K. V. Prasad
International Journal of Pattern Recognition and Artificial Intelligence (2023) Vol. 37, Iss. 04
Closed Access | Times Cited: 3
Lakshmi Prasanna Kumari, K. V. Prasad
International Journal of Pattern Recognition and Artificial Intelligence (2023) Vol. 37, Iss. 04
Closed Access | Times Cited: 3
A dual-tamper-detection method for digital image authentication and content self-recovery
Tong Liu, Xiaochen Yuan
Multimedia Tools and Applications (2021) Vol. 80, Iss. 19, pp. 29805-29826
Closed Access | Times Cited: 6
Tong Liu, Xiaochen Yuan
Multimedia Tools and Applications (2021) Vol. 80, Iss. 19, pp. 29805-29826
Closed Access | Times Cited: 6
A comprehensive analysis of digital video forensics techniques and challenges
Sandhya, Abhishek Kumar Kashyap
Iran Journal of Computer Science (2023) Vol. 7, Iss. 2, pp. 359-380
Closed Access | Times Cited: 2
Sandhya, Abhishek Kumar Kashyap
Iran Journal of Computer Science (2023) Vol. 7, Iss. 2, pp. 359-380
Closed Access | Times Cited: 2
Frame Identification of Object-Based Video Tampering Using Symmetrically Overlapped Motion Residual
Tae Hyung Kim, Cheol Woo Park, Il Kyu Eom
Symmetry (2022) Vol. 14, Iss. 2, pp. 364-364
Open Access | Times Cited: 4
Tae Hyung Kim, Cheol Woo Park, Il Kyu Eom
Symmetry (2022) Vol. 14, Iss. 2, pp. 364-364
Open Access | Times Cited: 4
Optimized deep learning model for spatio-temporal detection and localization of object removal video forgery with multiple feature extraction
Lakshmi Kumari, PRASAD K.V
Research Square (Research Square) (2022)
Closed Access | Times Cited: 4
Lakshmi Kumari, PRASAD K.V
Research Square (Research Square) (2022)
Closed Access | Times Cited: 4