{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:06:56Z","timestamp":1776107216721,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2241303, CNS-1949650"],"award-info":[{"award-number":["CNS-2241303, CNS-1949650"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670306","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4822-4836","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5551-7847","authenticated-orcid":false,"given":"Anna Yoo Jeong","family":"Ha","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5705-8209","authenticated-orcid":false,"given":"Josephine","family":"Passananti","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7524-9292","authenticated-orcid":false,"given":"Ronik","family":"Bhaskar","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4324-7817","authenticated-orcid":false,"given":"Shawn","family":"Shan","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4296-986X","authenticated-orcid":false,"given":"Reid","family":"Southen","sequence":"additional","affiliation":[{"name":"Concept Artist, Detroit, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5918-2940","authenticated-orcid":false,"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8909-0494","authenticated-orcid":false,"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Magnific AI. 2023. Magnific. https:\/\/magnific.ai."},{"key":"e_1_3_2_1_2_1","unstructured":"Sina Alemohammad et al. 2023. Self-Consuming Generative Models Go MAD. In arXiv preprint:2307.01850."},{"key":"e_1_3_2_1_3_1","volume-title":"Invasive Diffusion: How one unwilling illustrator found herself turned into an AI model.","author":"ANDY","year":"2022","unstructured":"ANDY BAIO. 2022. Invasive Diffusion: How one unwilling illustrator found herself turned into an AI model."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJSP.2023.3337714"},{"key":"e_1_3_2_1_5_1","unstructured":"Xiuli Bi et al. 2023. Detecting Generated Images by Real Images Only. arXiv preprint:2311.00962 (2023)."},{"key":"e_1_3_2_1_6_1","volume-title":"Bird and Ahmad Lotfi","author":"Jordan","year":"2023","unstructured":"Jordan J. Bird and Ahmad Lotfi. 2023. CIFAKE: Image Classification and Explainable Identification of AI-Generated Synthetic Images. arXiv preprint:2303.14126 (2023)."},{"key":"e_1_3_2_1_7_1","unstructured":"Isabelle Bousquette. 2023. Companies Increasingly Fear Backlash Over Their AI Work. WSJ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.647965"},{"key":"e_1_3_2_1_9_1","volume-title":"Bray et al","author":"Sergi","year":"2023","unstructured":"Sergi D. Bray et al. 2023. Testing human ability to detect `deepfake' images of human faces. Journal of Cybersecurity (2023), 1--18."},{"key":"e_1_3_2_1_10_1","unstructured":"Martin Briesch Dominik Sobania and Franz Rothlauf. 2023. Large Language Models Suffer From Their Own Output: An Analysis of the Self-Consuming Training Loop. In arXiv preprint:2311.16822."},{"key":"e_1_3_2_1_11_1","unstructured":"Cara. [n. d.]. https:\/\/cara.app\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Seung Youn Chyung et al. 2017. Evidence-Based Survey Design: The Use of a Midpoint on the Likert Scale. Performance Improvement (2017) 15--23.","DOI":"10.1002\/pfi.21727"},{"key":"e_1_3_2_1_13_1","unstructured":"Civitai. 2022. What is Civitai? https:\/\/civitai.com\/content\/guides\/what-is-civitai."},{"key":"e_1_3_2_1_14_1","unstructured":"Linda Codega. 2023. Dungeons & Dragons Updates Bigby to Replace AI-Enhanced Images. Gizmodo."},{"key":"e_1_3_2_1_15_1","unstructured":"Linda Codega. 2023. New Dungeons & Dragons Sourcebook Features AI Generated Art. Gizmodo."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of ICASSP.","author":"Riccardo","unstructured":"Riccardo Corvi et al. 2023. On The Detection of Synthetic Images Generated by Diffusion Models. In Proc. of ICASSP."},{"key":"e_1_3_2_1_17_1","volume-title":"Andersen v","unstructured":"CourtListener. 2024. Andersen v. Stability AI Ltd.(3:23-cv-00201). https:\/\/www.courtlistener.com\/docket\/66732129\/andersen-v-stability-ai-ltd\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Davide Cozzolino et al. 2023. Raising the Bar of AI-generated Image Detection with CLIP. arXiv preprint:2312.00195 (2023)."},{"key":"e_1_3_2_1_19_1","unstructured":"Katie Deighton. 2024. How the Ad Industry Is Making AI Images Look Less Like AI. Wall Street Journal."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of USENIX Security.","author":"Ambra","unstructured":"Ambra Demontis et al. 2019. Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of NeurIPS.","author":"Dhariwal Prafulla","year":"2021","unstructured":"Prafulla Dhariwal and Alexander Nichol. 2021. Diffusion Models Beat GANs on Image Synthesis. In Proc. of NeurIPS."},{"key":"e_1_3_2_1_22_1","unstructured":"Maggie H. Dupre. 2023. Sports Illustrated Publisher Fires CEO After AI Scandal. Futurism."},{"key":"e_1_3_2_1_23_1","unstructured":"Salako Emmanuel. 2023. AI Tools for Combating Deepfakes. https:\/\/ijnet.org\/en\/story\/ai-tools-combating-deepfakes."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of IEEE S&P","author":"Joel","unstructured":"Joel Frank et al. 2024. A Representative Study on Human Detection of Artificially Generated Media Across Countries. In Proc. of IEEE S&P. San Francisco, CA."},{"key":"e_1_3_2_1_25_1","unstructured":"Ethan Gach. 2023. Amazon's First Official Fallout TV Show Artwork Is an AI-Looking Eyesore. Kotaku.com."},{"key":"e_1_3_2_1_26_1","unstructured":"Sara Ghazanfari et al. 2023. R-LPIPS: An adversarially robust perceptual similarity metric. arXiv preprint:2307.15157 (2023)."},{"key":"e_1_3_2_1_27_1","unstructured":"Paul Glynn. 2023. Sony World Photography Award 2023: Winner Refuses Award After Revealing AI Creation. BBC News."},{"key":"e_1_3_2_1_28_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint:1412.6572 (2014)."},{"key":"e_1_3_2_1_29_1","volume-title":"Sensors","volume":"23","author":"Hamano Genki","year":"2023","unstructured":"Genki Hamano, Shoko Imaizumi, and Hitoshi Kiya. 2023. Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images. Sensors, Vol. 23, 7 (2023)."},{"key":"e_1_3_2_1_30_1","unstructured":"Hive. 2023. AI-Generated Content Classification. https:\/\/thehive.ai\/apis\/ai-generated-content-classification."},{"key":"e_1_3_2_1_31_1","unstructured":"Karen Ho. 2024. Database of 16 000 Artists Used to Train Midjourney AI Including 6-Year-Old Child Garners Criticism. https:\/\/www.artnews.com\/art-news\/news\/midjourney-ai-artists-database-1234691955\/."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of WACV. IEEE.","author":"Ashish","unstructured":"Ashish Hooda et al. 2024. D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles. In Proc. of WACV. IEEE."},{"key":"e_1_3_2_1_33_1","unstructured":"Illuminarty. 2023. Is an AI Behind Your Image? https:\/\/illuminarty.ai\/."},{"key":"e_1_3_2_1_34_1","volume-title":"The level of collapse we are allowed: comparison of different response scales in safety attitudes questionnaire. Biometrics Biostatistics International Journal","author":"Jeong Heon Jae","year":"2016","unstructured":"Heon Jae Jeong and Wui Chiang Lee. 2016. The level of collapse we are allowed: comparison of different response scales in safety attitudes questionnaire. Biometrics Biostatistics International Journal (2016), 128--134."},{"key":"e_1_3_2_1_35_1","unstructured":"Joseph Saveri Law Firm LLP. 2023. Class Action Filed Against Stability AI Midjourney and DeviantArt for DMCA Violations Right of Publicity Violations Unlawful Competition Breach of TOS."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Tero Karras et al. 2020. Analyzing and Improving the Image Quality of StyleGAN. arXiv preprint:1912.04958 (2020).","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_2_1_37_1","volume-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky Alex","unstructured":"Alex Krizhevsky and Geoffrey Hinton. 2009. Learning multiple layers of features from tiny images. University of Toronto (2009)."},{"key":"e_1_3_2_1_38_1","unstructured":"SAND Lab. 2023. Web Glaze. https:\/\/glaze.cs.uchicago.edu\/webglaze.html."},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. of ACRS.","author":"Lam K. W. K.","unstructured":"K. W. K. Lam, W. L. Lau, and Z. L. Li. 1999. Effects of JPEG compression on accuracy of image classification. In Proc. of ACRS."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/01431160210142842"},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. of ICML.","author":"Junnan","unstructured":"Junnan Li et al. 2023. BLIP-2: bootstrapping language-image pre-training with frozen image encoders and large language models. In Proc. of ICML."},{"key":"e_1_3_2_1_42_1","unstructured":"Zeyu Lu et al. 2023. Seeing is not always believing: Benchmarking Human and Model Perception of AI-Generated Images. arXiv preprint:2304.13023 (2023)."},{"key":"e_1_3_2_1_43_1","unstructured":"Aleksander Madry et al. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint:1706.06083 (2017)."},{"key":"e_1_3_2_1_44_1","unstructured":"Emanuel Maiberg. 2023. AI Images Detectors Are Being Used to Discredit the Real Horrors of War. 404Media."},{"key":"e_1_3_2_1_45_1","unstructured":"MaxonVFX. 2024. We extend our apologies to the community. https:\/\/twitter.com\/MaxonVFX\/status\/1748826148858208286."},{"key":"e_1_3_2_1_46_1","unstructured":"Alex Nichol et al. 2022. Hierarchical text-conditional image generation with clip latents. arXiv preprint:2204.06125 (2022)."},{"key":"e_1_3_2_1_47_1","unstructured":"Travis Northup. 2023. Wizards of the Coast Repeats Anti-AI Art Stance After Player's Handbook Controversy. IGN.com."},{"key":"e_1_3_2_1_48_1","unstructured":"Jie Yee Ong. 2023. Scooby-Doo: Daphne Voice Actor Fell Victim To $1 000 AI Art Scam. The Chainsaw."},{"key":"e_1_3_2_1_49_1","unstructured":"Optic. 2023. AI or Not. https:\/\/www.aiornot.com."},{"key":"e_1_3_2_1_50_1","volume-title":"Magic: The Gathering Maker Admits it Used AI-generated Art Despite Standing Ban. Ars Technica.","author":"Orland Kyle","year":"2024","unstructured":"Kyle Orland. 2024. Magic: The Gathering Maker Admits it Used AI-generated Art Despite Standing Ban. Ars Technica."},{"key":"e_1_3_2_1_51_1","unstructured":"Susannah Page-Katz. 2023. Introducing Our AI Policy. Kickstarter.com."},{"key":"e_1_3_2_1_52_1","volume-title":"SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. arXiv preprint:2307.01952","author":"Dustin Podell","year":"2023","unstructured":"Dustin Podell et al. 2023. SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. arXiv preprint:2307.01952 (2023)."},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. of ICML.","author":"Alec","unstructured":"Alec Radford et al. 2021. Learning transferable visual models from natural language supervision. In Proc. of ICML."},{"key":"e_1_3_2_1_54_1","unstructured":"Aditya Ramesh et al. 2022. Hierarchical text-conditional image generation with clip latents. arXiv preprint:2204.06125 (2022)."},{"key":"e_1_3_2_1_55_1","volume-title":"Towards the Detection of Diffusion Model Deepfakes. arXiv preprint:2210.14571","author":"Ricker Jonas","year":"2023","unstructured":"Jonas Ricker, Simon Damm, Thorsten Holz, and Asja Fischer. 2023. Towards the Detection of Diffusion Model Deepfakes. arXiv preprint:2210.14571 (2023)."},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. of CVPR.","author":"Robin","unstructured":"Robin Rombach et al. 2022. High-resolution image synthesis with latent diffusion models. In Proc. of CVPR."},{"key":"e_1_3_2_1_57_1","unstructured":"Kevin Roose. 2022. An A.I.-Generated Picture Won an Art Prize. Artists Aren't Happy. https:\/\/www.nytimes.com\/2022\/09\/02\/technology\/ai-artificial-intelligence-artists.html."},{"key":"e_1_3_2_1_58_1","unstructured":"Mia Sato. 2023. How AI art killed an indie book cover contest. The Verge."},{"key":"e_1_3_2_1_59_1","unstructured":"Christoph Schuhmann et al. 2022. Laion-5b: An open large-scale dataset for training next generation image-text models. arXiv preprint:2210.08402 (2022)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616588"},{"key":"e_1_3_2_1_61_1","volume-title":"Zhao","author":"Shan Shawn","year":"2023","unstructured":"Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, and Ben Y. Zhao. 2023. Glaze: Protecting artists from style mimicry by text-to-image models. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_62_1","unstructured":"\"Eons Show\". 2024. Eons Show apologies for violating own AI policy. Twitter. https:\/\/x.com\/EonsShow\/status\/1751327424556544451."},{"key":"e_1_3_2_1_63_1","unstructured":"Ilia Shumailov et al. 2023. The Curse of Recursion: Training on Generated Data Makes Models Forget. arXiv preprint:2305.17493 (2023)."},{"key":"e_1_3_2_1_64_1","volume-title":"Judge Rejects Copyright Claim.","author":"Small Zachary","unstructured":"Zachary Small. 2023. As Fight Over A.I. Artwork Unfolds, Judge Rejects Copyright Claim. NY Times."},{"key":"e_1_3_2_1_65_1","volume-title":"Robustness and Generalizability of Deepfake Detection: A Study with Diffusion Models. arXiv preprint:2309.02218","author":"Song Haixu","year":"2023","unstructured":"Haixu Song, Shiyu Huang, Yinpeng Dong, and Wei-Wei Tu. 2023. Robustness and Generalizability of Deepfake Detection: A Study with Diffusion Models. arXiv preprint:2309.02218 (2023)."},{"key":"e_1_3_2_1_66_1","volume-title":"Davidson","author":"Spring Kenneth R.","year":"2016","unstructured":"Kenneth R. Spring, John C. Russ, Matthew J. Parry-Hill, and Michael W. Davidson. 2016. JPEG Image Compression. National High Magnetic Field Laboratory."},{"key":"e_1_3_2_1_67_1","unstructured":"Stability AI. 2022. Stable Diffusion Public Release. https:\/\/stability.ai\/blog\/stable-diffusion-public-release."},{"key":"e_1_3_2_1_68_1","unstructured":"StabilityAI. 2022. Stable Diffusion v1--4 Model Card. https:\/\/huggingface.co\/CompVis\/stable-diffusion-v1--4."},{"key":"e_1_3_2_1_69_1","unstructured":"StabilityAI. 2022. Stable Diffusion v1--5 Model Card. https:\/\/huggingface.co\/runwayml\/stable-diffusion-v1--5."},{"key":"e_1_3_2_1_70_1","unstructured":"\"Portal Staff\". 2023. League of Legends AI-Generated LATAM Anniversary Video Gets Taken Down. ZLeague The Portal."},{"key":"e_1_3_2_1_71_1","unstructured":"Chandra Steele. 2023. How to Detect AI-Created Images. https:\/\/www.pcmag.com\/how-to\/how-to-detect-ai-created-images."},{"key":"e_1_3_2_1_72_1","volume-title":"Thompson and Tiffany Hsu","author":"Stuart","year":"2023","unstructured":"Stuart A. Thompson and Tiffany Hsu. 2023. How Easy Is It to Fool A.I.-Detection Tools? NY Times."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Sheng-Yu Wang et al. 2020. CNN-generated images are surprisingly easy to spot... for now. arXiv preprint:1912.11035 (2020).","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"e_1_3_2_1_74_1","volume-title":"Benchmarking Deepart Detection. arXiv preprint:2302.14475","author":"Wang Yabin","year":"2023","unstructured":"Yabin Wang, Zhiwu Huang, and Xiaopeng Hong. 2023. Benchmarking Deepart Detection. arXiv preprint:2302.14475 (2023)."},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of ICCV.","author":"Zhendong","unstructured":"Zhendong Wang et al. 2023. DIRE for Diffusion-Generated Image Detection. In Proceedings of ICCV."},{"key":"e_1_3_2_1_76_1","volume-title":"Proc. of NeurIPS.","author":"Wen Yuxin","year":"2023","unstructured":"Yuxin Wen, John Kirchenbauer, Jonas Geiping, and Tom Goldstein. 2023. Tree-Rings Watermarks: Invisible Fingerprints for Diffusion Images. In Proc. of NeurIPS."},{"key":"e_1_3_2_1_77_1","unstructured":"Cam Wilson. 2024. AI is producing 'fake' Indigenous art trained on real artists' work without permission. Crickey.com.au."},{"key":"e_1_3_2_1_78_1","unstructured":"YentaMagenta. 2023. Hive AI image \"detection\" is inaccurate and easily defeated. Reddit."},{"key":"e_1_3_2_1_79_1","unstructured":"Lijun Zhang et al. 2024. Robust Image Watermarking using Stable Diffusion. arXiv preprint:2401.04247 (2024)."},{"key":"e_1_3_2_1_80_1","unstructured":"Mingjian Zhu et al. 2023. GenImage: A Million-Scale Benchmark for Detecting AI-Generated Image. arXiv preprint:2306.08571 (2023)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:18:42Z","timestamp":1755843522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":80,"alternative-id":["10.1145\/3658644.3670306","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670306","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}