{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:23:22Z","timestamp":1764588202936,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:00:00Z","timestamp":1626307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,15]]},"DOI":"10.1145\/3458305.3459599","type":"proceedings-article","created":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T00:49:47Z","timestamp":1626396587000},"page":"108-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["AMP"],"prefix":"10.1145","author":[{"given":"Paul","family":"England","sequence":"first","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Henrique S.","family":"Malvar","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Eric","family":"Horvitz","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Jack W.","family":"Stokes","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"C\u00e9dric","family":"Fournet","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Rebecca","family":"Burke-Aguero","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Amaury","family":"Chamayou","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Sylvan","family":"Clebsch","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Manuel","family":"Costa","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"John","family":"Deutscher","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Shabnam","family":"Erfani","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Matt","family":"Gaylor","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Andrew","family":"Jenks","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Kevin","family":"Kane","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Elissa M.","family":"Redmiles","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Alex","family":"Shamis","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Isha","family":"Sharma","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"John C.","family":"Simmons","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Sam","family":"Wenker","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]},{"given":"Anika","family":"Zaman","sequence":"additional","affiliation":[{"name":"Microsoft, UK"}]}],"member":"320","published-online":{"date-parts":[[2021,7,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adobe. 2019. Introducing the Content Authenticity Initiative. https:\/\/theblog.adobe.com\/content-authenticity-initiative\/.  Adobe. 2019. Introducing the Content Authenticity Initiative. https:\/\/theblog.adobe.com\/content-authenticity-initiative\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Amber. 2019. Instilling Trust into Video. https:\/\/app.ambervideo.co\/.  Amber. 2019. Instilling Trust into Video. https:\/\/app.ambervideo.co\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/WDM.2002.1176207"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_2_1_5_1","unstructured":"Arati Baliga I Subhod Pandurang Kamat and Siddhartha Chatterjee. 2018. Performance evaluation of the quorum blockchain platform. 8 pages.  Arati Baliga I Subhod Pandurang Kamat and Siddhartha Chatterjee. 2018. Performance evaluation of the quorum blockchain platform. 8 pages."},{"key":"e_1_3_2_1_6_1","unstructured":"Blockchain. 2020. Ethereum transactions per second. https:\/\/blockchair.com\/ethereum\/charts\/transactions-per-second. Accessed: 2020-07-31.  Blockchain. 2020. Ethereum transactions per second. https:\/\/blockchair.com\/ethereum\/charts\/transactions-per-second. Accessed: 2020-07-31."},{"key":"e_1_3_2_1_7_1","unstructured":"C2PA. 2020. Coalition for Content Provenance and Authenticity. https:\/\/c2pa.org\/.  C2PA. 2020. Coalition for Content Provenance and Authenticity. https:\/\/c2pa.org\/."},{"key":"e_1_3_2_1_8_1","volume-title":"OSDI","volume":"99","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro and Barbara Liskov . 1999 . Practical Byzantine fault tolerance . In OSDI , Vol. 99 . USENIX Association, USA, 173--186. Miguel Castro and Barbara Liskov. 1999. Practical Byzantine fault tolerance. In OSDI, Vol. 99. USENIX Association, USA, 173--186."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. https:\/\/tools.ietf.org\/html\/rfc5280.  D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. https:\/\/tools.ietf.org\/html\/rfc5280.","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_10_1","volume-title":"AMP: Authentication of Media via Provenance. arXiv:2001.07886 [cs.MM]","author":"England Paul","year":"2020","unstructured":"Paul England , Henrique S. Malvar , Eric Horvitz , Jack W. Stokes , C\u00e9dric Fournet , Rebecca Burke-Aguero , Amaury Chamayou , Sylvan Clebsch , Manuel Costa , John Deutscher , Shabnam Erfani , Matt Gaylor , Andrew Jenks , Kevin Kane , Elissa Redmiles , Alex Shamis , Isha Sharma , John C. Simmons , Sam Wenker , and Anika Zaman . 2020 . AMP: Authentication of Media via Provenance. arXiv:2001.07886 [cs.MM] Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, C\u00e9dric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa Redmiles, Alex Shamis, Isha Sharma, John C. Simmons, Sam Wenker, and Anika Zaman. 2020. AMP: Authentication of Media via Provenance. arXiv:2001.07886 [cs.MM]"},{"key":"e_1_3_2_1_11_1","unstructured":"Hyperledger Fabric. 2020. A Blockchain Platform for the Enterprise --- hyperledger-fabricdocs master documentation. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/. (Accessed on 04\/01\/2021).  Hyperledger Fabric. 2020. A Blockchain Platform for the Enterprise --- hyperledger-fabricdocs master documentation. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/. (Accessed on 04\/01\/2021)."},{"key":"e_1_3_2_1_12_1","volume-title":"Hasan and Khaled Salah","author":"Haya","year":"2019","unstructured":"Haya R. Hasan and Khaled Salah . 2019 . Combating Deepfake Videos Using Blockchain and Smart Contracts. In IEEE Access, Vol. 7 . IEEE, USA , 41596--41606. Haya R. Hasan and Khaled Salah. 2019. Combating Deepfake Videos Using Blockchain and Smart Contracts. In IEEE Access, Vol. 7. IEEE, USA, 41596--41606."},{"key":"e_1_3_2_1_13_1","unstructured":"Roderick Hodgson. 2020. Preserving Video Truth: an Anti-Deepfakes Narrative. https:\/\/www.youtube.com\/watch?v=zR-V1nf-dT0.  Roderick Hodgson. 2020. Preserving Video Truth: an Anti-Deepfakes Narrative. https:\/\/www.youtube.com\/watch?v=zR-V1nf-dT0."},{"key":"e_1_3_2_1_14_1","unstructured":"https:\/\/github.com\/deepfakes. 2020. faceswap: FaceSwap is a tool that utilizes deep learning to recognize and swap faces in pictures and videos. https:\/\/github.com\/deepfakes\/faceswap\/.  https:\/\/github.com\/deepfakes. 2020. faceswap: FaceSwap is a tool that utilizes deep learning to recognize and swap faces in pictures and videos. https:\/\/github.com\/deepfakes\/faceswap\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Content Authenticity Initiative. 2020. Creating the standard for digital content provenance. https:\/\/contentauthenticity.org\/.  Content Authenticity Initiative. 2020. Creating the standard for digital content provenance. https:\/\/contentauthenticity.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"javascript.com. 2021. ready to try JavaScript. https:\/\/www.javascript.com\/.  javascript.com. 2021. ready to try JavaScript. https:\/\/www.javascript.com\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Dia Kayyali. 2017. ProofMode - Verified Visuals Enabled! https:\/\/blog.witness.org\/2017\/04\/proofmode-helping-prove-human-rights-abuses-world\/.  Dia Kayyali. 2017. ProofMode - Verified Visuals Enabled! https:\/\/blog.witness.org\/2017\/04\/proofmode-helping-prove-human-rights-abuses-world\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Pavel Korshunov and Sebastien Marcel. 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection.  Pavel Korshunov and Sebastien Marcel. 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection."},{"key":"e_1_3_2_1_19_1","unstructured":"Marek Kowalski. 2018. FaceSwap. https:\/\/github.com\/MarekKowalski\/FaceSwap\/.  Marek Kowalski. 2018. FaceSwap. https:\/\/github.com\/MarekKowalski\/FaceSwap\/."},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE Workshop on Information Forensics and Security (WIFS). IEEE Computer Society, USA, 1--7.","author":"Li Yuezun","year":"2018","unstructured":"Yuezun Li , Ming-Ching Chang , and Siwei Lyu . 2018 . In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking . In IEEE Workshop on Information Forensics and Security (WIFS). IEEE Computer Society, USA, 1--7. Yuezun Li, Ming-Ching Chang, and Siwei Lyu. 2018. In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking. In IEEE Workshop on Information Forensics and Security (WIFS). IEEE Computer Society, USA, 1--7."},{"key":"e_1_3_2_1_21_1","volume-title":"Exposing DeepFake Videos By Detecting Face Warping Artifacts. In Workshop on Media Forensics. IEEE, IEEE Computer Society, USA.","author":"Li Yuezun","year":"2019","unstructured":"Yuezun Li and Siwei Lyu . 2019 . Exposing DeepFake Videos By Detecting Face Warping Artifacts. In Workshop on Media Forensics. IEEE, IEEE Computer Society, USA. Yuezun Li and Siwei Lyu. 2019. Exposing DeepFake Videos By Detecting Face Warping Artifacts. In Workshop on Media Forensics. IEEE, IEEE Computer Society, USA."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809385"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Scott McCloskey and Michael Albright. 2018. Detecting GAN-generated Imagery using Color Cues.  Scott McCloskey and Michael Albright. 2018. Detecting GAN-generated Imagery using Color Cues.","DOI":"10.1109\/ICIP.2019.8803661"},{"volume-title":"CCF: A Framework for Building Confidential Verifiable Replicated Services. https:\/\/github.com\/microsoft\/CCF\/blob\/master\/CCF-TECHNICAL-REPORT.pdf.","year":"2019","key":"e_1_3_2_1_24_1","unstructured":"Microsoft. 2019 . CCF: A Framework for Building Confidential Verifiable Replicated Services. https:\/\/github.com\/microsoft\/CCF\/blob\/master\/CCF-TECHNICAL-REPORT.pdf. Microsoft. 2019. CCF: A Framework for Building Confidential Verifiable Replicated Services. https:\/\/github.com\/microsoft\/CCF\/blob\/master\/CCF-TECHNICAL-REPORT.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"Microsoft. 2019. CCF documentation. https:\/\/microsoft.github.io\/CCF\/.  Microsoft. 2019. CCF documentation. https:\/\/microsoft.github.io\/CCF\/."},{"key":"e_1_3_2_1_26_1","unstructured":"Microsoft. 2019. Confidential Consortium Framework. https:\/\/github.com\/Microsoft\/CCF.  Microsoft. 2019. Confidential Consortium Framework. https:\/\/github.com\/Microsoft\/CCF."},{"key":"e_1_3_2_1_27_1","unstructured":"MongoDB. 2020. The database for modern applications. https:\/\/www.mongodb.com\/.  MongoDB. 2020. The database for modern applications. https:\/\/www.mongodb.com\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Lily Hay Newman. 2019. A New Tool Protects Videos from Deepfakes and Tampering. https:\/\/www.wired.com\/story\/amber-authenticate-video-validation-blockchain-tampering-deepfakes\/.  Lily Hay Newman. 2019. A New Tool Protects Videos from Deepfakes and Tampering. https:\/\/www.wired.com\/story\/amber-authenticate-video-validation-blockchain-tampering-deepfakes\/."},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Annual Technical Conference (ATC).","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John K Ousterhout . 2014 . In search of an understandable consensus algorithm . In USENIX Annual Technical Conference (ATC). Diego Ongaro and John K Ousterhout. 2014. In search of an understandable consensus algorithm. In USENIX Annual Technical Conference (ATC)."},{"key":"e_1_3_2_1_30_1","unstructured":"Project Origin. 2020. Protecting Trusted Media. https:\/\/www.originproject.info\/.  Project Origin. 2020. Protecting Trusted Media. https:\/\/www.originproject.info\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979127"},{"key":"e_1_3_2_1_33_1","volume-title":"Stokes","author":"Sherman Imani N.","year":"2020","unstructured":"Imani N. Sherman , Elissa M. Redmiles , and Jack W . Stokes . 2020 . Designing Indicators to Combat Fake Media . arXiv:2010.00544 [cs.HC] Imani N. Sherman, Elissa M. Redmiles, and Jack W. Stokes. 2020. Designing Indicators to Combat Fake Media. arXiv:2010.00544 [cs.HC]"},{"key":"e_1_3_2_1_34_1","unstructured":"The New York Times. 2019. The News Provenance Project. https:\/\/www.newsprovenanceproject.com\/.  The New York Times. 2019. The News Provenance Project. https:\/\/www.newsprovenanceproject.com\/."},{"key":"e_1_3_2_1_35_1","unstructured":"Truepic. 2019. Photo and video verification you can trust. https:\/\/truepic.com.  Truepic. 2019. Photo and video verification you can trust. https:\/\/truepic.com."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"e_1_3_2_1_37_1","volume-title":"Exposing Deep Fakes Using Inconsistent Head Poses. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE Computer Society, USA, 8261--8265","author":"Yang Xin","year":"2019","unstructured":"Xin Yang , Yuezun Li , and Siwei Lyu . 2019 . Exposing Deep Fakes Using Inconsistent Head Poses. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE Computer Society, USA, 8261--8265 . Xin Yang, Yuezun Li, and Siwei Lyu. 2019. Exposing Deep Fakes Using Inconsistent Head Poses. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE Computer Society, USA, 8261--8265."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309699"},{"volume-title":"Performance Analysis of the Libra Blockchain: An Experimental Study. In 2019 2nd International Conference on Hot Information-Centric Networking (HotICN). IEEE Computer Society, USA, 77--83","author":"Zhang J.","key":"e_1_3_2_1_39_1","unstructured":"J. Zhang , J. Gao , Z. Wu , W. Yan , Q. Wo , Q. Li , and Z. Chen . 2019 . Performance Analysis of the Libra Blockchain: An Experimental Study. In 2019 2nd International Conference on Hot Information-Centric Networking (HotICN). IEEE Computer Society, USA, 77--83 . J. Zhang, J. Gao, Z. Wu, W. Yan, Q. Wo, Q. Li, and Z. Chen. 2019. Performance Analysis of the Libra Blockchain: An Experimental Study. In 2019 2nd International Conference on Hot Information-Centric Networking (HotICN). IEEE Computer Society, USA, 77--83."}],"event":{"name":"MMSys '21: 12th ACM Multimedia Systems Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Istanbul Turkey","acronym":"MMSys '21"},"container-title":["Proceedings of the 12th ACM Multimedia Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458305.3459599","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458305.3459599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:39Z","timestamp":1750195479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458305.3459599"}},"subtitle":["authentication of media via provenance"],"short-title":[],"issued":{"date-parts":[[2021,7,15]]},"references-count":39,"alternative-id":["10.1145\/3458305.3459599","10.1145\/3458305"],"URL":"https:\/\/doi.org\/10.1145\/3458305.3459599","relation":{},"subject":[],"published":{"date-parts":[[2021,7,15]]},"assertion":[{"value":"2021-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}