{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:18:32Z","timestamp":1765041512774,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"BMBF","award":["F16KIS1519"],"award-info":[{"award-number":["F16KIS1519"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,10]]},"DOI":"10.1145\/3643491.3660280","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T06:19:37Z","timestamp":1717222777000},"page":"65-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Whodunit: Detection and Attribution of Synthetic Images by Leveraging Model-specific Fingerprints"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4106-8174","authenticated-orcid":false,"given":"Alexander","family":"Wi\u00dfmann","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9594-2633","authenticated-orcid":false,"given":"Steffen","family":"Zeiler","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5007-5355","authenticated-orcid":false,"given":"Robert M.","family":"Nickel","sequence":"additional","affiliation":[{"name":"Bucknell University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0678-3053","authenticated-orcid":false,"given":"Dorothea","family":"Kolossa","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/496701"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Ali Borji. 2023. Generated Faces in the Wild: Quantitative Comparison of Stable Diffusion Midjourney and DALL-E 2. https:\/\/doi.org\/10.48550\/arXiv.2210.00586","DOI":"10.48550\/arXiv.2210.00586"},{"key":"e_1_3_2_1_4_1","volume-title":"Statistics of natural image categories. Network: computation in neural systems 14, 3","author":"Torralba Antonio","year":"2003","unstructured":"Antonio Torralba and Aude Oliva. 2003. Statistics of natural image categories. Network: computation in neural systems 14, 3 (2003), 391."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"e_1_3_2_1_6_1","volume-title":"ArsTechnica. Retrieved","author":"Edwards Benj","year":"2023","unstructured":"Benj Edwards. 2023. Immaculate AI images of Pope Francis trick the masses. ArsTechnica. Retrieved March 15, 2024 from https:\/\/arstechnica.com\/information-technology\/2023\/the-power-of-ai-compels-you-to-believe-this-fake-image-of-pope-in-a-puffy-coat\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00104"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2105.05233"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3495724.3495978"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525242"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323028"},{"key":"e_1_3_2_1_13_1","unstructured":"G. Bradski. 2000. The OpenCV Library. Technical Report. Dr. Dobb\u2019s Journal of Software Tools."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295408"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Turc Iulia","year":"2022","unstructured":"Iulia Turc and Gaurav Nemade. 2022. Midjourney User Prompts and Generated Images (250k). Retrieved March 15, 2024 from https:\/\/www.kaggle.com\/ds\/2349267 Uploaded to Kaggle: June 6, 2022, Downloaded: September 6, 2023."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_18_1","article-title":"The biggest threat of deepfakes isn\u2019t the deepfakes themselves","author":"Hao Karen","year":"2019","unstructured":"Karen Hao. 2019. The biggest threat of deepfakes isn\u2019t the deepfakes themselves. MIT Technology Review. Retrieved March 15, 2024 from https:\/\/www.technologyreview.com\/2019\/10\/10\/132667\/the-biggest-threat-of-deepfakes-isnt-the-deepfakes-themselves\/","journal-title":"MIT Technology Review. Retrieved"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01617-5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2021.3120982"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_22_1","volume-title":"Futurism. Retrieved","author":"Harrison Maggie","year":"2023","unstructured":"Maggie Harrison. 2023. Google\u2019s Top Result for \u201dJohannes Vermeer\u201c Is an AI-Generated Version of \u201dGirl With a Pearl Earring\u201c. Futurism. Retrieved March 15, 2024 from https:\/\/futurism.com\/top-google-result-johannes-vermeer-ai-generated-knockoff"},{"key":"e_1_3_2_1_23_1","volume-title":"Futurism. Retrieved","author":"Harrison Maggie","year":"2023","unstructured":"Maggie Harrison. 2023. Top Google Result for \u201dEdward Hopper\u201c an AI-Generated Fake. Futurism. Retrieved March 15, 2024 from https:\/\/futurism.com\/top-google-result-edward-hopper-ai-generated-fake"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3179116"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00103"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206009"},{"key":"e_1_3_2_1_27_1","volume-title":"Wired. Retrieved","author":"Thompson Nicholas","year":"2017","unstructured":"Nicholas Thompson and Issie Lapowsky. 2017. How Russian Trolls Used Meme Warfare to Divide America. Wired. Retrieved March 15, 2024 from https:\/\/www.wired.com\/story\/russia-ira-propaganda-senate-report\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455008"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","unstructured":"Jonas Ricker Simon Damm Thorsten Holz and Asja Fischer. 2024. Towards the detection of diffusion model deepfakes. https:\/\/doi.org\/10.48550\/arXiv.2210.14571 arxiv:2210.14571\u00a0[cs.CV]","DOI":"10.48550\/arXiv.2210.14571"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616588"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.03585"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297410"},{"key":"e_1_3_2_1_36_1","unstructured":"Umesh P. 2012. Image Processing in Python. Technical Report. CSI Communications."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Rafael Valle Wilson Cai and Anish Doshi. 2018. TequilaGAN: How to easily identify GAN samples. https:\/\/doi.org\/10.48550\/arXiv.1807.04919 arXiv:arXiv preprint arXiv:1807.04919","DOI":"10.48550\/arXiv.1807.04919"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0686-2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-022-06225-5"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00116"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"}],"event":{"name":"ICMR '24: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Phuket Thailand","acronym":"ICMR '24"},"container-title":["3rd ACM International Workshop on Multimedia AI against Disinformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643491.3660280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643491.3660280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:35:06Z","timestamp":1756236906000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643491.3660280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,10]]},"references-count":44,"alternative-id":["10.1145\/3643491.3660280","10.1145\/3643491"],"URL":"https:\/\/doi.org\/10.1145\/3643491.3660280","relation":{},"subject":[],"published":{"date-parts":[[2024,6,10]]},"assertion":[{"value":"2024-06-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}