{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T03:58:53Z","timestamp":1768622333776,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"TIP Directorate of the National Science Foundation","award":["2122682"],"award-info":[{"award-number":["2122682"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679827","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:11Z","timestamp":1729452851000},"page":"1983-1993","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SmartHash: Perceptual Hashing for Image Tampering Detection and Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8522-5045","authenticated-orcid":false,"given":"Priyanka","family":"Samanta","sequence":"first","affiliation":[{"name":"The Graduate Center, CUNY &amp; Brooklyn College, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4816-3964","authenticated-orcid":false,"given":"Shweta","family":"Jain","sequence":"additional","affiliation":[{"name":"CUNY John Jay College of Criminal Justice &amp; The Graduate Center of CUNY, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mscoco dataset https:\/\/cocodataset.org\/#home"},{"key":"e_1_3_2_1_2_1","unstructured":"phash survey \"https:\/\/www.phash.org\/docs\/pubs\/thesis_zauner.pdf\""},{"key":"e_1_3_2_1_3_1","unstructured":"phash the open source perceptual hash library \"https:\/\/www.phash.org\/\""},{"key":"e_1_3_2_1_4_1","unstructured":"Six fake news techniques and simple tools to vet them \"https:\/\/gijn.org\/six-fake-news-techniques-and-simple-tools-to-vet-them\/\""},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.microsoft.com\/en-us\/photodna","year":"2009","unstructured":"photodna by microsoft (2009), https:\/\/www.microsoft.com\/en-us\/photodna"},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/ieee-dataport.org\/open-access\/modified-casia","author":"Casia","year":"2013","unstructured":"Casia dataset (2013), \"https:\/\/ieee-dataport.org\/open-access\/modified-casia\""},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/github.com\/dbisUnibas\/PS-Battles","author":"Photoshopbattle","year":"2018","unstructured":"Photoshopbattle dataset (2018), \"https:\/\/github.com\/dbisUnibas\/PS-Battles\""},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/c2pa.org\/","author":"Coalition","year":"2020","unstructured":"Coalition for content provenance and authenticity (2020), \"https:\/\/c2pa.org\/\""},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/contentauthenticity.org\/","author":"Content","year":"2020","unstructured":"Content authenticity initiative (2020), \"https:\/\/contentauthenticity.org\/\""},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf","author":"Neuralhash","year":"2021","unstructured":"Neuralhash by apple (2021), https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf"},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/github.com\/KhaosT\/nhcalc\/tree\/main\/nhcalc","author":"Neuralhash","year":"2021","unstructured":"Neuralhash github (2021), https:\/\/github.com\/KhaosT\/nhcalc\/tree\/main\/nhcalc"},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/github.com\/jankais3r\/pyPhotoDNA","year":"2021","unstructured":"photodna github (2021), https:\/\/github.com\/jankais3r\/pyPhotoDNA"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.05.024"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.233"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2895466"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.09.003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825953"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.235"},{"key":"e_1_3_2_1_19_1","volume-title":"Sclaroff","author":"Cakir F.","year":"2019","unstructured":"Cakir, F., He, K., Bargal, S.A., Sclaroff, S.: Hashing with mutual information. IEEE transactions on pattern analysis and machine intelligence 41(10), 2424--2437 (2019)"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.104"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2438008"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.12.078"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083247"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00386"},{"key":"e_1_3_2_1_25_1","first-page":"2475","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition.","author":"Erin Liong V.","year":"2015","unstructured":"Erin Liong, V., Lu, J., Wang, G., Moulin, P., Zhou, J.: Deep hashing for compact binary codes learning. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 2475--2483 (2015)"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/30.267415"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2011.6026372"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123403"},{"key":"e_1_3_2_1_30_1","first-page":"1","volume-title":"INC2010: 6th International Conference on Networked Computing.","author":"Hu Y.","year":"2010","unstructured":"Hu, Y., Niu, X.: Dwt based robust image hashing algorithm. In: INC2010: 6th International Conference on Networked Computing. pp. 1--4. IEEE (2010)"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.559"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126686.3126773"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1421855"},{"key":"e_1_3_2_1_34_1","volume-title":"Hinton","author":"Krizhevsky A.","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25 (2012)"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298947"},{"key":"e_1_3_2_1_36_1","first-page":"2482","volume-title":"Tan","author":"Li Q.","year":"2017","unstructured":"Li, Q., Sun, Z., He, R., Tan, T.: Deep supervised discrete hashing. In: Advances in neural information processing systems. pp. 2482--2491 (2017)"},{"key":"e_1_3_2_1_37_1","volume-title":"S.F.: A robust image authentication method distinguishing jpeg compression from malicious manipulation","author":"Lin C.Y.","year":"2001","unstructured":"Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE transactions on circuits and systems for video technology 11(2), 153--168 (2001)"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301269"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.227"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190594"},{"key":"e_1_3_2_1_41_1","first-page":"1","volume-title":"Marc","author":"Mahfoudi G.","year":"2019","unstructured":"Mahfoudi, G., Tajini, B., Retraint, F., Morain-Nicolier, F., Dugelay, J.L., Marc, P.: Defacto: Image and face manipulation dataset. In: 2019 27Th european signal processing conference (EUSIPCO). pp. 1--5. IEEE (2019)"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.1980.0020"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/278476.278485"},{"key":"e_1_3_2_1_44_1","volume-title":"Evans","author":"Monga V.","year":"2006","unstructured":"Monga, V., Evans, B.L.: Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE transactions on Image Processing 15(11), 3452--3465 (2006)"},{"key":"e_1_3_2_1_45_1","volume-title":"Mih\u00e7ak","author":"Monga V.","year":"2007","unstructured":"Monga, V., Mih\u00e7ak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Information Forensics and Security 2(3--1), 376--390 (2007)"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3454-1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.11.002"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSP.2002.1180102"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3267720"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.05.021"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560425"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.11.011"},{"key":"e_1_3_2_1_54_1","volume-title":"Zisserman","author":"Simonyan K.","year":"2014","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.02.001"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.011"},{"key":"e_1_3_2_1_57_1","volume-title":"Su","author":"Tang Z.","year":"2008","unstructured":"Tang, Z., Wang, S., Zhang, X., Wei, W., Su, S.: Robust image hashing for tamper detection using non-negative matrix factorization. Journal of ubiquitous convergence technology 2(1), pp--18 (2008)"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.05.015"},{"key":"e_1_3_2_1_59_1","volume-title":"Zhang","author":"Tang Z.","year":"2013","unstructured":"Tang, Z., Zhang, X., Zhang, S.: Robust perceptual image hashing based on ring partition and nmf. IEEE transactions on knowledge and data engineering 26(3), 711--724 (2013)"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2020.1832139"},{"key":"e_1_3_2_1_61_1","volume-title":"Wang","author":"Wang H.","year":"2018","unstructured":"Wang, H., Wang, H.: Perceptual hashing-based image copy-move forgery detection. Security and Communication Networks 2018 (2018)"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0047-y"},{"key":"e_1_3_2_1_63_1","first-page":"70","volume-title":"Kitani","author":"Wang X.","year":"2016","unstructured":"Wang, X., Shi, Y., Kitani, K.M.: Deep supervised hashing with triplet labels. In: Computer Vision--ACCV 2016: 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20--24, 2016, Revised Selected Papers, Part I 13. pp. 70--84. Springer (2017)"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407698"},{"key":"e_1_3_2_1_65_1","volume-title":"Simoncelli","author":"Wang Z.","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing 13(4), 600--612 (2004)"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/3304415.3304566"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00306"},{"key":"e_1_3_2_1_68_1","volume-title":"Chen","author":"Yang H.F.","year":"2017","unstructured":"Yang, H.F., Lin, K., Chen, C.S.: Supervised learning of semantics-preserving hash via deep convolutional neural networks. IEEE transactions on pattern analysis and machine intelligence 40(2), 437--451 (2017)"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.638587"},{"key":"e_1_3_2_1_70_1","first-page":"3457","volume-title":"Proc. 13th AAAI Conf. Artif. Intell.","author":"Yue C.","year":"2016","unstructured":"Yue, C., Long, M., Wang, J., Han, Z., Wen, Q.: Deep quantization network for efficient image retrieval. In: Proc. 13th AAAI Conf. Artif. Intell. pp. 3457--3463 (2016)"},{"key":"e_1_3_2_1_71_1","unstructured":"Zeng J.: Novel block-dct and pca based image perceptual hashing algorithm. IJCSI (2013)"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2467315"},{"key":"e_1_3_2_1_73_1","first-page":"1","article-title":"Image region forgery detection: A deep learning approach","volume":"2016","author":"Zhang Y.","year":"2016","unstructured":"Zhang, Y., Goh, J., Win, L.L., Thing, V.L.: Image region forgery detection: A deep learning approach. SG-CRC 2016, 1--11 (2016)","journal-title":"SG-CRC"},{"key":"e_1_3_2_1_74_1","volume-title":"Guo","author":"Zhao J.","year":"2013","unstructured":"Zhao, J., Guo, J.: Passive forensics for copy-move image forgery using a method based on dct and svd. Forensic science international 233(1--3), 158--166 (2013)"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939650"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","location":"Boise ID USA","acronym":"CIKM '24","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:07Z","timestamp":1750294687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":75,"alternative-id":["10.1145\/3627673.3679827","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679827","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}