{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:50:40Z","timestamp":1761598240737,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811566332"},{"type":"electronic","value":"9789811566349"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-6634-9_20","type":"book-chapter","created":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:27:09Z","timestamp":1594996029000},"page":"212-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Deep Learning Based Method to Discriminate Between Photorealistic Computer Generated Images and Photographic Images"],"prefix":"10.1007","author":[{"given":"Kunj Bihari","family":"Meena","sequence":"first","affiliation":[]},{"given":"Vipin","family":"Tyagi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"issue":"1","key":"20_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/09747338.2014.921415","volume":"55","author":"MD Ansari","year":"2014","unstructured":"Ansari, M.D., Ghrera, S.P., Tyagi, V.: Pixel-based image forgery detection: a review. IETE J. Educ. 55(1), 40\u201346 (2014)","journal-title":"IETE J. Educ."},{"issue":"2","key":"20_CR2","first-page":"1","volume":"C","author":"E Candes","year":"2000","unstructured":"Candes, E., Donoho, D.L., Cand\u00e8s, E.J., Donoho, D.L.: Curvelets: a surprisingly effective nonadaptive representation of objects with edges. Curves Surf. Fitting C(2), 1\u201310 (2000)","journal-title":"Curves Surf. Fitting"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Chen, W., Shi, Y.Q.: Identifying computer graphics using HSV color model and statistical moments of characteristic functions. In: IEEE International Conference on Multimedia, pp. 1123\u20131126 (2007)","DOI":"10.1109\/ICME.2007.4284852"},{"issue":"2","key":"20_CR4","first-page":"229","volume":"55","author":"Q Cui","year":"2018","unstructured":"Cui, Q., McIntosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. Comput. Mater. Continua 55(2), 229\u2013241 (2018)","journal-title":"Comput. Mater. Continua"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"2010","key":"20_CR6","first-page":"2877","volume":"10","author":"S Fan","year":"2012","unstructured":"Fan, S., Wang, R., Zhang, Y., Guo, K.: Classifying computer generated graphics and natural images based on image contour information. J. Inf. Comput. Sci. 10(2010), 2877\u20132895 (2012)","journal-title":"J. Inf. Comput. Sci."},{"issue":"6","key":"20_CR7","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/TSMC.1973.4309314","volume":"3","author":"RM Haralick","year":"1973","unstructured":"Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. 3(6), 610\u2013621 (1973)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"20_CR8","first-page":"1","volume":"4788","author":"M He","year":"2018","unstructured":"He, M.: Distinguish computer generated and digital images: a cnn solution. Concurr. Comput. Pract. Exp. 4788, 1\u201310 (2018)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"9","key":"20_CR9","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/LSP.2018.2855566","volume":"25","author":"P He","year":"2018","unstructured":"He, P., Jiang, X., Sun, T., Member, S., Li, H.: Computer graphics identification combining convolutional and recurrent neural network. IEEE Signal Process. Lett. 25(9), 1369\u20131373 (2018)","journal-title":"IEEE Signal Process. Lett."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., van der Maaten, L.: Densely connected convolutional networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"20_CR11","unstructured":"McDonald, J.: Social Media Posts Spread Bogus Coronavirus Conspiracy Theory (2020). https:\/\/www.factcheck.org\/2020\/01\/social-media-posts-spread-bogus-coronavirus-conspiracy-theory\/. Accessed 24 Feb 2020"},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1016\/j.jat.2011.06.005","volume":"11","author":"G Kutyniok","year":"2011","unstructured":"Kutyniok, G., Lim, W.-Q.: Compactly supported shearlets are optimally sparse. J. Approx. Theory 11, 1564\u20131589 (2011)","journal-title":"J. Approx. Theory"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Li, W., Zhang, T., Zheng, E., Ping, X.: Identifying photorealistic computer graphics using second-order difference statistics. In: International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2316\u20132319 (2010)","DOI":"10.1109\/FSKD.2010.5569821"},{"issue":"8","key":"20_CR14","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/0375-9601(89)90854-2","volume":"141","author":"LS Liebovitch","year":"1989","unstructured":"Liebovitch, L.S., Toth, T.: A fast algorithm to determine fractal dimensions by box counting. Phys. Lett. A 141(8), 386\u2013390 (1989)","journal-title":"Phys. Lett. A"},{"issue":"2","key":"20_CR15","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1109\/TSP.2004.839896","volume":"53","author":"S Lyu","year":"2005","unstructured":"Lyu, S., Farid, H.: How realistic is photorealistic? IEEE Trans. Signal Process. 53(2), 845\u2013850 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Machado, C., Kira, B., Howard, P.N.: A study of misinformation in WhatsApp groups with a focus on the Brazilian presidential elections. In: WWW 2019: Companion Proceedings of the 2019 World Wide Web Conference, pp. 1013\u20131019 (2019)","DOI":"10.1145\/3308560.3316738"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"33505","DOI":"10.1007\/s11042-019-08082-2","volume":"78","author":"KB Meena","year":"2019","unstructured":"Meena, K.B., Tyagi, V.: A copy-move image forgery detection technique based on Gaussian-Hermite moments. Multimed. Tools Appl. 78, 33505\u201333526 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Meena, K.B., Tyagi, V.: Image forgery detection\u202f: survey and future directions. In: Data, Engineering and applications, pp. 163\u2013195 (2019)","DOI":"10.1007\/978-981-13-6351-1_14"},{"key":"20_CR19","first-page":"102481","volume":"52","author":"KB Meena","year":"2020","unstructured":"Meena, K.B., Tyagi, V.: A copy-move image forgery detection technique based on tetrolet transform. J. Inf. Secur. Appl. 52, 102481\u2013102490 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"11","key":"20_CR20","doi-asserted-by":"publisher","first-page":"8197","DOI":"10.1007\/s11042-019-08343-0","volume":"79","author":"KB Meena","year":"2020","unstructured":"Meena, K.B., Tyagi, V.: A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms. Multimed. Tools Appl. 79(11), 8197\u20138212 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"20_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-981-13-9939-8_7","volume-title":"Advances in Computing and Data Sciences","author":"KB Meena","year":"2019","unstructured":"Meena, K.B., Tyagi, V.: Methods to distinguish photorealistic computer generated images from photographic images: a review. In: Singh, M., Gupta, P.K., Tyagi, V., Flusser, J., \u00d6ren, T., Kashyap, R. (eds.) ICACDS 2019. CCIS, vol. 1045, pp. 64\u201382. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-9939-8_7"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Meena, K.B., Tyagi, V.: A novel method to distinguish photorealistic computer generated images from photographic images. In: 2019 Fifth International Conference on Image Information Processing (ICIIP), pp. 385\u2013390 (2019)","DOI":"10.1109\/ICIIP47207.2019.8985711"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: IEEE International Conference on Computer Vision and Pattern Recognition (CVPR), pp. 886\u2013893 (2005)","DOI":"10.1109\/CVPR.2005.177"},{"issue":"2","key":"20_CR24","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2008.931077","volume":"26","author":"T Ng","year":"2009","unstructured":"Ng, T., Chang, S.: Distinguishing between natural photography and photorealistic computer graphics. IEEE Signal Process. Mag. 26(2), 49\u201358 (2009)","journal-title":"IEEE Signal Process. Mag."},{"key":"20_CR25","unstructured":"Ng, T., Chang, S., Hsu, J., Pepeljugoski, M.: Columbia Photographic Images and Photorealistic Computer Graphics Dataset. ADVENT Technical Report #205-2004-5, Columbia University (2005)"},{"key":"20_CR26","doi-asserted-by":"publisher","first-page":"130830","DOI":"10.1109\/ACCESS.2019.2940383","volume":"7","author":"X Ni","year":"2019","unstructured":"Ni, X., Chen, L., Yuan, L., Wu, G., Yao, Y.E.: An evaluation of deep learning-based computer generated image detection approaches. IEEE Access 7, 130830\u2013130840 (2019)","journal-title":"IEEE Access"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Ojala, T., Pietik\u00e4inen, M., M\u00e4enp\u00e4\u00e4, T.: A generalized local binary pattern operator for multiresolution gray scale and rotation invariant texture classification. In: International Conference on Advances in Pattern Recognition (ICAPR), Brazil, pp. 399\u2013408 (2001)","DOI":"10.1007\/3-540-44732-6_41"},{"issue":"10","key":"20_CR28","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries in color filter array interpolated images. IEEE Trans. Signal Process. 53(10), 3948\u20133959 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"11","key":"20_CR29","doi-asserted-by":"publisher","first-page":"2772","DOI":"10.1109\/TIFS.2018.2834147","volume":"13","author":"W Quan","year":"2018","unstructured":"Quan, W., Wang, K., Yan, D.M., Zhang, X.: Distinguishing between natural and computer-generated images using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 13(11), 2772\u20132787 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"De Rezende, E.R.S., Ruppert, G.C.S., Archer, C.T.I.R.: Exposing computer generated images by using deep convolutional neural networks. In: 30th SIBGRAPI Conference on Graphics, Patterns and Images, pp. 71\u201378 (2017)","DOI":"10.1109\/SIBGRAPI.2017.16"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Schwartz, W.R., da Silva, R.D., Davis, L.S., Pedrini, H.: A novel feature descriptor based on the shearlet transform. In: IEEE International Conference on Image Processing (ICIP), Belgium, pp. 1053\u20131056 (2011)","DOI":"10.1109\/ICIP.2011.6115600"},{"issue":"8","key":"20_CR32","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1016\/j.jvcir.2013.08.009","volume":"24","author":"E Tokuda","year":"2013","unstructured":"Tokuda, E., Pedrini, H., Rocha, A.: Computer generated images vs. digital photographs: a synergetic feature and classifier combination approach. J. Vis. Commun. Image Represent. 24(8), 1276\u20131292 (2013)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"20_CR33","doi-asserted-by":"publisher","DOI":"10.1201\/9781315123905","volume-title":"Understanding Digital Image Processing","author":"V Tyagi","year":"2018","unstructured":"Tyagi, V.: Understanding Digital Image Processing. CRC Press, Boca Raton (2018)"},{"issue":"9","key":"20_CR34","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/TCSVT.2018.2867786","volume":"29","author":"J Wang","year":"2018","unstructured":"Wang, J., Li, T., Luo, X., Shi, Y., Liu, R., Jha, S.K.: Identifying computer generated images based on quaternion central moments in color quaternion. IEEE Trans. Circ. Syst. Video Technol. 29(9), 2775\u20132785 (2018)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"Wu, R., Li, X., Bin, Y.: Identifying computer generated graphics via histogram features. In: 18th IEEE International Conference on Image Processing, pp. 1973\u20131976 (2011)","DOI":"10.1109\/ICIP.2011.6115849"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6634-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T07:31:49Z","timestamp":1723275109000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-6634-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811566332","9789811566349"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6634-9_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"354","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}