{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:47:59Z","timestamp":1772063279311,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T00:00:00Z","timestamp":1505433600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11042-017-5132-9","type":"journal-article","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T05:32:35Z","timestamp":1505453555000},"page":"15545-15571","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Verifying information with multimedia content on twitter"],"prefix":"10.1007","volume":"77","author":[{"given":"Christina","family":"Boididou","sequence":"first","affiliation":[]},{"given":"Stuart E.","family":"Middleton","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Symeon","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Duc-Tien","family":"Dang-Nguyen","sequence":"additional","affiliation":[]},{"given":"Giulia","family":"Boato","sequence":"additional","affiliation":[]},{"given":"Yiannis","family":"Kompatsiaris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,15]]},"reference":[{"issue":"6","key":"5132_CR1","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/TMM.2013.2265080","volume":"15","author":"LM Aiello","year":"2013","unstructured":"Aiello LM, Petkos G, Mart\u00edn CJ, Corney D, Papadopoulos S, Skraba R, G\u00f6ker A, Kompatsiaris I, Jaimes A (2013) Sensing trending topics in twitter. IEEE Trans Multimedia 15(6):1268\u20131282. https:\/\/doi.org\/10.1109\/TMM.2013.2265080","journal-title":"IEEE Trans Multimedia"},{"issue":"10","key":"5132_CR2","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/TIFS.2015.2445742","volume":"10","author":"E Ardizzone","year":"2015","unstructured":"Ardizzone E, Bruno A, Mazzola G (2015) Copy move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084\u20132094","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"5132_CR3","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inf Forensics Secur 7(3):1003\u20131017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5132_CR4","unstructured":"Boididou C, Andreadou K, Papadopoulos S, Dang-Nguyen DT, Boato G, Riegler M, Kompatsiaris Y (2015) Verifying multimedia use at mediaeval 2015. In: Mediaeval 2015 workshop, September 14\u201315, 2015, Wurzen, Germany"},{"key":"5132_CR5","doi-asserted-by":"crossref","unstructured":"Boididou C, Papadopoulos S, Apostolidis L, Kompatsiaris Y (2017) Learning to detect misleading content on twitter. In: Proceedings of the 2017 ACM on international conference on multimedia retrieval. ACM, pp 278\u2013286","DOI":"10.1145\/3078971.3078979"},{"key":"5132_CR6","unstructured":"Boididou C, Papadopoulos S, Dang-Nguyen D, Boato G, Riegler M, Middleton SE, Petlund A, Kompatsiaris Y (2016) Verifying multimedia use at mediaeval 2016. In: Working notes proceedings of the mediaeval 2016 workshop, Hilversum, The Netherlands, October 20\u201321, 2016. http:\/\/ceur-ws.org\/Vol-1739\/MediaEval_2016_paper_3.pdf"},{"key":"5132_CR7","unstructured":"Boididou C, Papadopoulos S, Dang-Nguyen DT, Boato G, Kompatsiaris Y (2015) The CERTH-UNITN participation @ verifying multimedia use 2015. In: Working notes proceedings of the mediaeval 2015 workshop. Wurzen, Germany"},{"key":"5132_CR8","doi-asserted-by":"publisher","unstructured":"Boididou C, Papadopoulos S, Kompatsiaris Y, Schifferes S, Newman N (2014) Challenges of computational verification in social multimedia. In: Proceedings of the companion publication of the 23rd international conference on world wide web companion, pp 743\u2013748. https:\/\/doi.org\/10.1145\/2567948.2579323","DOI":"10.1145\/2567948.2579323"},{"key":"5132_CR9","doi-asserted-by":"crossref","unstructured":"Canini KR, Suh B, Pirolli PL (2011) Finding credible information sources in social networks based on content and social structure. In: Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). IEEE, pp 1\u20138","DOI":"10.1109\/PASSAT\/SocialCom.2011.91"},{"key":"5132_CR10","unstructured":"Carton S, Adar E, Park S, Mei Q, Zeffer N, Resnick P (2015) Audience analysis for competing memes in social media. In: Ninth international AAAI conference on web and social media"},{"key":"5132_CR11","doi-asserted-by":"crossref","unstructured":"Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on world wide web. ACM, pp 675\u2013684","DOI":"10.1145\/1963405.1963500"},{"key":"5132_CR12","doi-asserted-by":"crossref","unstructured":"Conotter V, Boato G, Farid H (2010) Detecting photo manipulation on signs and billboards. In: IEEE international conference on image processing, pp 1741\u20131744","DOI":"10.1109\/ICIP.2010.5652906"},{"key":"5132_CR13","doi-asserted-by":"publisher","unstructured":"Conotter V, Dang-Nguyen DT, Riegler M, Boato G, Larson M (2014) A crowdsourced data set of edited images online. In: Proceedings of the 2014 international ACM workshop on crowdsourcing for multimedia, crowdMM \u201914. https:\/\/doi.org\/10.1145\/2660114.2660120 . ACM, New York, pp 49\u201352","DOI":"10.1145\/2660114.2660120"},{"issue":"5","key":"5132_CR14","doi-asserted-by":"crossref","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara P, Bianchi T, Rosa AD, Piva A (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566\u20131577","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5132_CR15","unstructured":"Gupta A, Kumaraguru P (2012) Twitter explodes with activity in mumbai blasts! a lifeline or an unmonitored daemon in the lurking? In: IIIT, Delhi, Technical report, IIITD-TR-2011-005"},{"key":"5132_CR16","unstructured":"Gupta A, Kumaraguru P, Castillo C, Meier P (2014) Tweetcred: a real-time web-based system for assessing credibility of content on twitter. In: Proceedings 6th international conference on social informatics (socinfo)"},{"key":"5132_CR17","doi-asserted-by":"crossref","unstructured":"Gupta A, Lamba H, Kumaraguru P, Joshi A (2013) Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd international conference on world wide web companion. International world wide web conferences steering committee, pp 729\u2013 736","DOI":"10.1145\/2487788.2488033"},{"issue":"3","key":"5132_CR18","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"L Jian","year":"2015","unstructured":"Jian L, Xiaolong L, Bin Y, Xingming S, Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507\u2013 518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5132_CR19","doi-asserted-by":"crossref","unstructured":"Jin Z, Cao J, Jiang YG, Zhang Y (2014) News credibility evaluation on microblog with a hierarchical propagation model. In: 2014 IEEE international conference on data mining (ICDM). IEEE, pp 230\u2013 239","DOI":"10.1109\/ICDM.2014.91"},{"key":"5132_CR20","doi-asserted-by":"crossref","unstructured":"Jin Z, Cao J, Zhang Y, Luo J (2016) News verification by exploiting conflicting social viewpoints in microblogs. In: AAAI 2016. AAAI","DOI":"10.1609\/aaai.v30i1.10382"},{"key":"5132_CR21","unstructured":"Jin Z, Cao J, Zhang Y, Zhang Y (2015) MCG-ICT at Mediaeval 2015: Verifying multimedia use with a two-level classification model. In: Working notes proceedings of the MediaEval 2015 workshop. Wurzen, Germany"},{"issue":"3-2","key":"5132_CR22","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1109\/TIFS.2011.2128309","volume":"6","author":"E Kee","year":"2011","unstructured":"Kee E, Johnson MK, Farid H (2011) Digital image authentication from jpeg headers. IEEE Trans Inf Forensics Secur 6(3-2):1066\u20131075","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"5132_CR23","first-page":"1821","volume":"89","author":"W Li","year":"2009","unstructured":"Li W, Yuan Y, Yu N (2009) Passive detection of doctored jpeg image via block artifact grid extraction. IEEE Trans Signal Process 89(9):1821\u20131829","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"5132_CR24","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang J, Qiu G (2010) JPEG Error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Secur 5(3):480\u2013491","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"5132_CR25","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo J, Araujo L (2013) Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst Appl 40(8):2992\u20133000","journal-title":"Expert Syst Appl"},{"key":"5132_CR26","unstructured":"Middleton SE (2015) Extracting attributed verification and debunking reports from social media: MediaEval-2015 trust and credibility analysis of image and video. In: Working notes proceedings of the MediaEval 2015 workshop. Wurzen, Germany"},{"issue":"2","key":"5132_CR27","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MIS.2013.126","volume":"29","author":"SE Middleton","year":"2014","unstructured":"Middleton SE, Middleton L, Modafferi S (2014) Real-time crisis mapping of natural disasters using social media. IEEE Intell Syst 29(2):9\u201317","journal-title":"IEEE Intell Syst"},{"issue":"1","key":"5132_CR28","first-page":"4:1","volume":"31","author":"JF O\u2019Brien","year":"2012","unstructured":"O\u2019Brien JF, Farid H (2012) Exposing photo manipulation with inconsistent reflections. ACM Trans Graph 31(1):4:1\u20134:11","journal-title":"ACM Trans Graph"},{"key":"5132_CR29","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan J, Kang B, Meyer G, Hollerer T, Adalii S (2012) Credibility in context: an analysis of feature distributions in twitter. In: Privacy, security, risk and trust (PASSAT), 2012 international conference on and 2012 international confernece on social computing (socialcom). IEEE, pp 293\u2013 301","DOI":"10.1109\/SocialCom-PASSAT.2012.128"},{"key":"5132_CR30","doi-asserted-by":"crossref","unstructured":"Pasquini C, Boato G, Perez-Gonzalez F (2014) Multiple jpeg compression detection by means of benford-fourier coefficients. In: Proceedings of the workshop on information forensics and security. IEEE","DOI":"10.1109\/WIFS.2014.7084313"},{"key":"5132_CR31","doi-asserted-by":"crossref","unstructured":"Pasquini C, Perez-Gonzalez F, Boato G (2014) A benford-fourier jpeg compression detector. In: Proceedings of the international conference on image processing. IEEE, pp 5322\u2013 5326","DOI":"10.1109\/ICIP.2014.7026077"},{"issue":"3","key":"5132_CR32","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1080\/13645579.2013.774172","volume":"16","author":"R Procter","year":"2013","unstructured":"Procter R, Vis F, Voss A (2013) Reading the riots on twitter: methodological innovation for the analysis of big data. Int J Soc Res Methodol 16(3):197\u2013214","journal-title":"Int J Soc Res Methodol"},{"key":"5132_CR33","doi-asserted-by":"crossref","unstructured":"Ratkiewicz J, Conover M, Meiss M, Gon\u00e7alves B, Patil S, Flammini A, Menczer F (2011) Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th international conference companion on world wide web. ACM, pp 249\u2013252","DOI":"10.1145\/1963192.1963301"},{"key":"5132_CR34","unstructured":"Silverman C (ed) (2014) Verification handbook: a definitive guide to verifying digital content for emergency coverage. European Journalism Centre"},{"key":"5132_CR35","unstructured":"Starbird K, Muzny G, Palen L (2012) Learning from the crowd: collaborative filtering techniques for identifying on-the-ground twitterers during mass disruptions. In: Proceedings of the 9th international conference on information systems crisis response management Iscram"},{"key":"5132_CR36","doi-asserted-by":"crossref","unstructured":"Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference. ACM, pp 1\u20139","DOI":"10.1145\/1920261.1920263"},{"key":"5132_CR37","doi-asserted-by":"crossref","unstructured":"Tsakalidis A, Papadopoulos S, Kompatsiaris I (2014) An ensemble model for cross-domain polarity classification on twitter. In: Web information systems engineering\u2013WISE 2014. Springer, pp 168\u2013 177","DOI":"10.1007\/978-3-319-11746-1_12"},{"key":"5132_CR38","doi-asserted-by":"publisher","unstructured":"Zampoglou M, Papadopoulos S, Kompatsiaris Y (2015) Detecting image splicing in the wild (WEB). In: 2015 IEEE international conference on multimedia & expo workshops, ICME workshops 2015, Turin, Italy, June 29\u2013July 3, 2015. https:\/\/doi.org\/10.1109\/ICMEW.2015.7169839 , pp 1\u20136","DOI":"10.1109\/ICMEW.2015.7169839"},{"issue":"4","key":"5132_CR39","doi-asserted-by":"crossref","first-page":"4801","DOI":"10.1007\/s11042-016-3795-2","volume":"76","author":"M Zampoglou","year":"2017","unstructured":"Zampoglou M, Papadopoulos S, Kompatsiaris Y (2017) Large-scale evaluation of splicing localization algorithms for web images. Multimed Tools Appl 76(4):4801\u20134834","journal-title":"Multimed Tools Appl"},{"key":"5132_CR40","doi-asserted-by":"crossref","unstructured":"Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th international conference on world wide web. International world wide web conferences steering committee, pp 1395\u20131405","DOI":"10.1145\/2736277.2741637"},{"key":"5132_CR41","unstructured":"Zubiaga A, Aker A, Bontcheva K, Liakata M, Procter R (2017) Detection and resolution of rumours in social media: a survey. arXiv: 1704.00656"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5132-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5132-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5132-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T21:54:19Z","timestamp":1659477259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5132-9"}},"subtitle":["A comparative study of automated approaches"],"short-title":[],"issued":{"date-parts":[[2017,9,15]]},"references-count":41,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5132"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5132-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,15]]}}}