{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:42:42Z","timestamp":1775230962665,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/wifs.2017.8267647","type":"proceedings-article","created":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T16:06:44Z","timestamp":1517328404000},"page":"1-6","source":"Crossref","is-referenced-by-count":232,"title":["Distinguishing computer graphics from natural images using convolution neural networks"],"prefix":"10.1109","author":[{"given":"Nicolas","family":"Rahmouni","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Nozick","sequence":"additional","affiliation":[]},{"given":"Junichi","family":"Yamagishi","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"abadi","year":"2015","journal-title":"software available from tensorflow org"},{"key":"ref10","first-page":"276","article-title":"Discrimination between photo images and computer graphics based on statistical moments in the frquency domain of histogram","author":"cui","year":"2007","journal-title":"Proceeding of CIHW2007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761552"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6115849"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2010.5569821"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1109\/ICASSP.2008.4517944","article-title":"Forensic techniques for classifying scanner, computer generated and digital camera images","author":"khanna","year":"2008","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 2008"},{"key":"ref15","first-page":"1","article-title":"Image authentication by detecting traces of dernosaicing","author":"gallagher","year":"2008","journal-title":"IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPRW'08"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.08.009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7_10"},{"key":"ref18","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref19","first-page":"3371","article-title":"Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion","volume":"11","author":"vincent","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref28","author":"piaskiewicz","year":"2017","journal-title":"Level-design reference database"},{"key":"ref4","author":"schetinger","year":"2015","journal-title":"Humans are easily fooled by digital images"},{"key":"ref27","first-page":"205","article-title":"Columbia photographic images and photorealistic computer graphics dataset","author":"ng","year":"2005","journal-title":"Technical Report"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2407746.2407763"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1117\/12.650162"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1145\/2713168.2713194","article-title":"Raise: a raw images dataset for digital image forensics","author":"dang-nguyen","year":"2015","journal-title":"Proc ACM Conference on Multimedia Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"ref8","first-page":"2877","article-title":"Classifying computer generated graphics and natural imaged based on image contour information","volume":"9","author":"wang","year":"2012","journal-title":"J Inf Comput Sci"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4380047"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660304"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-325"},{"key":"ref22","author":"duda","year":"2000","journal-title":"Pattern Classification"},{"key":"ref21","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/5326.897072"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref26","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref25","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","location":"Rennes","start":{"date-parts":[[2017,12,4]]},"end":{"date-parts":[[2017,12,7]]}},"container-title":["2017 IEEE Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8258575\/8267640\/08267647.pdf?arnumber=8267647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T20:25:14Z","timestamp":1570652714000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8267647\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/wifs.2017.8267647","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}