{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T01:49:34Z","timestamp":1776304174204,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819784868","type":"print"},{"value":"9789819784875","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8487-5_32","type":"book-chapter","created":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T07:03:07Z","timestamp":1730617387000},"page":"461-475","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Comprehensive Exploration on\u00a0Detecting Fake Images Generated by\u00a0Stable Diffusion"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7612-5470","authenticated-orcid":false,"given":"Jingyi","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6933-0203","authenticated-orcid":false,"given":"Xiaolong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1735-2331","authenticated-orcid":false,"given":"Zhijian","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5783-321X","authenticated-orcid":false,"given":"Xiaojiang","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"issue":"4","key":"32_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3592450","volume":"42","author":"O Avrahami","year":"2023","unstructured":"Avrahami, O., Fried, O., Lischinski, D.: Blended latent diffusion. ACM Trans. Graph. (TOG) 42(4), 1\u201311 (2023)","journal-title":"ACM Trans. Graph. (TOG)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Bird, J.J., Lotfi, A.: Cifake: image classification and explainable identification of AI-generated synthetic images. Proc. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3356122"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Coccomini, D.A., Esuli, A., Falchi, F., Gennaro, C., Amato, G.: Detecting images generated by diffusers (2023). arXiv preprint arXiv:2303.05275","DOI":"10.7717\/peerj-cs.2127"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Corvi, R., Cozzolino, D., Zingarini, G., Poggi, G., Nagano, K., Verdoliva, L.: On the detection of synthetic images generated by diffusion models. In: Proceedings of IEEE ICASSP, pp.\u00a01\u20135 (2023)","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.K.: On the detection of digital face manipulation. In: Proceedings of IEEE\/CVF CVPR, pp. 5781\u20135790 (2020)","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: Proceedings of IEEE\/CVF CVPR, pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"2","key":"32_CR7","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1111\/j.1475-5661.2006.00199.x","volume":"31","author":"K Dodds","year":"2006","unstructured":"Dodds, K.: Popular geopolitics and audience dispositions: James bond and the internet movie database (imdb). Trans. Inst. Br. Geogr. 31(2), 116\u2013130 (2006)","journal-title":"Trans. Inst. Br. Geogr."},{"key":"32_CR8","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., et\u00a0al.: An image is worth 16 x 16 words: transformers for image recognition at scale (2020). arXiv preprint arXiv:2010.11929"},{"key":"32_CR9","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Proceedings of NeurIPS, vol. 27 (2014)"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of IEEE\/CVF CVPR, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"He, Y., Gan, B., Chen, S., Zhou, Y., Yin, G., Song, L., Sheng, L., Shao, J., Liu, Z.: Forgerynet: a versatile benchmark for comprehensive forgery analysis. In: Proceedings of IEEE\/CVF CVPR, pp. 4360\u20134369 (2021)","DOI":"10.1109\/CVPR46437.2021.00434"},{"key":"32_CR12","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Proceedings of NeurIPS, vol. 33, pp. 6840\u20136851 (2020)"},{"key":"32_CR13","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of gans for improved quality, stability, and variation (2017). arXiv preprint arXiv:1710.10196"},{"key":"32_CR14","unstructured":"Karras, T., Aittala, M., Aila, T., Laine, S.: Elucidating the design space of diffusion-based generative models. In: Proceedings of NeurIPS, vol. 35, pp. 26565\u201326577 (2022)"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of stylegan. In: Proceedings of the IEEE\/CVF, pp. 8110\u20138119 (2020)","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"32_CR16","unstructured":"Kingma, D., Salimans, T., Poole, B., Ho, J.: Variational diffusion models. In: Proceedings of NeurIPS, vol. 34, pp. 21696\u201321707 (2021)"},{"key":"32_CR17","unstructured":"Lugaresi, C., Tang, J., Nash, H., McClanahan, C., Uboweja, E., Hays, M., Zhang, F., Chang, C.L., Yong, M.G., Lee, J., et\u00a0al.: Mediapipe: a framework for building perception pipelines (2019). arXiv preprint arXiv:1906.08172"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Cozzolino, D., Verdoliva, L.: Detection of gan-generated fake images over social networks. In: Proceedings of IEEE MIPR, pp. 384\u2013389 (2018)","DOI":"10.1109\/MIPR.2018.00084"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Verdoliva, L., Poggi, G.: Do gans leave artificial fingerprints? In: Proceedings of IEEE MIPR, pp. 506\u2013511 (2019)","DOI":"10.1109\/MIPR.2019.00103"},{"key":"32_CR20","unstructured":"Meng, C., He, Y., Song, Y., Song, J., Wu, J., Zhu, J.Y., Ermon, S.: Sdedit: guided image synthesis and editing with stochastic differential equations (2021). arXiv preprint arXiv:2108.01073"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Mohammed, T.M., Chandrasekaran, S., Flenner, A., Bappy, J.H., Roy-Chowdhury, A.K., Manjunath, B.: Detecting gan generated fake images using co-occurrence matrices (2019). arXiv preprint arXiv:1903.06836","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532"},{"issue":"5","key":"32_CR22","first-page":"1038","volume":"14","author":"JC Neves","year":"2020","unstructured":"Neves, J.C., Tolosana, R., Vera-Rodriguez, R., Lopes, V., Proen\u00e7a, H., Fierrez, J.: Ganprintr: improved fakes and evaluation of the state of the art in face manipulation detection. Proc. IEEE J-STSP 14(5), 1038\u20131048 (2020)","journal-title":"Proc. IEEE J-STSP"},{"key":"32_CR23","unstructured":"Ramesh, A., Dhariwal, P., Nichol, A., Chu, C., Chen, M.: Hierarchical text-conditional image generation with clip latents (2022). arXiv preprint arXiv:2204.06125"},{"key":"32_CR24","unstructured":"Ricker, J., Damm, S., Holz, T., Fischer, A.: Towards the detection of diffusion model deepfakes (2022). arXiv preprint arXiv:2210.14571"},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF, pp. 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"32_CR26","unstructured":"Saharia, C., Chan, W., Saxena, S., Li, L., Whang, J., Denton, E.L., Ghasemipour, K., Gontijo Lopes, R., Karagol Ayan, B., Salimans, T., et al.: Photorealistic text-to-image diffusion models with deep language understanding. In: Proceedings of NeurIPS, vol. 35, pp. 36479\u201336494 (2022)"},{"key":"32_CR27","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE\/CVF ICCV, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"32_CR28","unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., Ganguli, S.: Deep unsupervised learning using nonequilibrium thermodynamics. In: International Conference on Machine Learning, pp. 2256\u20132265. PMLR (2015)"},{"key":"32_CR29","doi-asserted-by":"crossref","unstructured":"Song, Y., Ermon, S.: Generative modeling by estimating gradients of the data distribution. In: Proceedings of NeurIPS, vol. 32 (2019)","DOI":"10.1609\/aaai.v32i1.11827"},{"key":"32_CR30","unstructured":"Song, Y., Sohl-Dickstein, J., Kingma, D.P., Kumar, A., Ermon, S., Poole, B.: Score-based generative modeling through stochastic differential equations (2020). arXiv preprint arXiv:2011.13456"},{"key":"32_CR31","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Owens, A., Zhang, R., Efros, A.A.: Detecting photoshopped faces by scripting photoshop. In: Proceedings of IEEE\/CVF ICCV, pp. 10072\u201310081 (2019)","DOI":"10.1109\/ICCV.2019.01017"},{"key":"32_CR32","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Zhang, R., Owens, A., Efros, A.A.: CNN-generated images are surprisingly easy to spot... for now. In: Proceedings of IEEE\/CVF CVPR, pp. 8695\u20138704 (2020)","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"32_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Z., Bao, J., Zhou, W., Wang, W., Hu, H., Chen, H., Li, H.: Dire for diffusion-generated image detection. In: Proceedings of IEEE\/CVF ICCV, pp. 22445\u201322455 (2023)","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"32_CR34","doi-asserted-by":"crossref","unstructured":"Yu, N., Davis, L.S., Fritz, M.: Attributing fake images to gans: Learning and analyzing gan fingerprints. In: Proceedings of IEEE\/CVF ICCV, pp. 7556\u20137566 (2019)","DOI":"10.1109\/ICCV.2019.00765"},{"key":"32_CR35","doi-asserted-by":"crossref","unstructured":"Yuan, L., Chen, Y., Wang, T., Yu, W., Shi, Y., Jiang, Z.H., Tay, F.E., Feng, J., Yan, S.: Tokens-to-token vit: training vision transformers from scratch on imagenet. In: Proceedings of IEEE\/CVF ICCV, pp. 558\u2013567 (2021)","DOI":"10.1109\/ICCV48922.2021.00060"},{"key":"32_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, X., Karaman, S., Chang, S.F.: Detecting and simulating artifacts in gan fake images. In: Proceedings of IEEE WIFS, pp.\u00a01\u20136 (2019)","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"32_CR37","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of IEEE\/CVF CVPR, pp. 1053\u20131061 (2018)","DOI":"10.1109\/CVPR.2018.00116"},{"key":"32_CR38","unstructured":"Zhu, M., Chen, H., Yan, Q., Huang, X., Lin, G., Li, W., Tu, Z., Hu, H., Hu, J., Wang, Y.: Genimage: a million-scale benchmark for detecting AI-generated image. In: Proceedings of NeurIPS, vol. 36 (2024)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8487-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T07:10:00Z","timestamp":1730617800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8487-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"ISBN":["9789819784868","9789819784875"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8487-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"4 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Urumqi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}