{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:18:35Z","timestamp":1730283515255,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/mmsp.2018.8547083","type":"proceedings-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:19:12Z","timestamp":1543537152000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Image Forensics in Online News"],"prefix":"10.1109","author":[{"given":"Federica","family":"Lago","sequence":"first","affiliation":[]},{"given":"Quoc-Tin","family":"Phan","sequence":"additional","affiliation":[]},{"given":"Giulia","family":"Boato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Verifying multimedia use at mediaeval 2015","author":"boididou","year":"2015","journal-title":"MediaEval Benchmark 2015"},{"key":"ref11","article-title":"Detection and resolution of rumours in social media: A survey","author":"zubiaga","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/10451.001.0001","author":"farid","year":"2016","journal-title":"Photo Forensics"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1016\/j.cag.2017.08.014","article-title":"Image forgery detection confronts image composition","volume":"68","author":"schetinger","year":"2017","journal-title":"Computers & Graphics"},{"key":"ref14","article-title":"Sentiment analysis and subjectivity","volume":"2","author":"liu","year":"2010","journal-title":"Handbook of Natural Language Processing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579323"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2015.7169801"},{"key":"ref17","article-title":"A hybrid approach for multimedia use verification","author":"phan","year":"2016","journal-title":"MediaEval"},{"key":"ref18","article-title":"A picture's worth&#x2026;","author":"krawetz","year":"2007","journal-title":"Black Hat Briefings"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2009.03.025","article-title":"Passive detection of doctored jpeg image via block artifact srid extraction","volume":"89","author":"li","year":"2009","journal-title":"Signal Processing"},{"key":"ref4","article-title":"Inside the macedonian fake-news complex","volume":"15","author":"subramanian","year":"2017","journal-title":"Wired Magazine"},{"journal-title":"Dozens now confirmed dead in portuguese bushfires motorists died when they were trapped on bridge","year":"0","key":"ref27"},{"journal-title":"Deepfakes porn has serious consequences","year":"0","author":"lee","key":"ref3"},{"key":"ref6","article-title":"Assessing the impact of image manipulation on users' perceptions of deception","author":"conotter","year":"2014","journal-title":"Proc SPIE 9014 Human Vision and Electronic Imaging XIX"},{"key":"ref5","article-title":"Facebook fake-news writer: &#x2018;i think donald trump is in the white house because of me&#x2019;","author":"dewey","year":"2016","journal-title":"The Washington Post"},{"key":"ref8","article-title":"Boston marathon bombing &#x2018;bag men'suing new york post for falsely portraying them as suspects","author":"golgowski","year":"2013","journal-title":"NY Daily News"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488033"},{"article-title":"The ministry of truth. a mass experiment in altering political memories","year":"2010","author":"saletan","key":"ref2"},{"journal-title":"59 percent of you will share this article without even reading it","year":"0","author":"demers","key":"ref9"},{"key":"ref1","article-title":"Image diversity analysis: Context, opinion and bias","author":"zontone","year":"2009","journal-title":"International Workshop Living Web Making Web Diversity A True Asset"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2012215"},{"journal-title":"Noise analysis for image forensics","year":"0","key":"ref21"},{"key":"ref24","article-title":"Introduction to information retrieval","volume":"151","author":"christopher","year":"2008","journal-title":"An Introduction to Information Retrieval"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"journal-title":"What should you do if an incident happens on your plane?","year":"0","author":"haynes","key":"ref26"},{"journal-title":"Black lives matter &#x2018;thugs' blocked emergency crews from reaching hurricane victims?","year":"0","key":"ref25"}],"event":{"name":"2018 IEEE 20th International Workshop on Multimedia Signal Processing (MMSP)","start":{"date-parts":[[2018,8,29]]},"location":"Vancouver, BC","end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE 20th International Workshop on Multimedia Signal Processing (MMSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536333\/8547039\/08547083.pdf?arnumber=8547083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:35:04Z","timestamp":1643250904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8547083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/mmsp.2018.8547083","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}