{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:22:37Z","timestamp":1776100957488,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001807","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","doi-asserted-by":"publisher","award":["2023\/12865-8"],"award-info":[{"award-number":["2023\/12865-8"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["442229\/2024-"],"award-info":[{"award-number":["442229\/2024-"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1145\/3733102.3733148","type":"proceedings-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:07Z","timestamp":1750158847000},"page":"80-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Implications of Neural Compression to Scientific Images"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8370-6329","authenticated-orcid":false,"given":"Jo\u00e3o Phillipe","family":"Cardenuto","sequence":"first","affiliation":[{"name":"Unicamp, Capinas, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2041-9701","authenticated-orcid":false,"given":"Joshua","family":"Krinsky","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6892-4561","authenticated-orcid":false,"given":"Lucas","family":"Nogueira","sequence":"additional","affiliation":[{"name":"Unicamp, Capinas, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6404-9466","authenticated-orcid":false,"given":"Aparna","family":"Bharati","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9757-5756","authenticated-orcid":false,"given":"Daniel","family":"Moreira","sequence":"additional","affiliation":[{"name":"Loyola University Chicago, Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Connelly Barnes Eli Shechtman Adam Finkelstein and Dan\u00a0B. Goldman. 2009. PatchMatch: A Randomized Correspondence Algorithm for Structural Image Editing. ACM Transactions on Graphics (TOG) 28 3 Article 24 (2009). 10.1145\/1531326.1531330","DOI":"10.1145\/1531326.1531330"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Sandra Bergmann Denise Moussa Fabian Brand Andr\u00e9 Kaup and Christian Riess. 2024. Forensic Analysis of AI-Compression Traces in Spatial and Frequency Domain. Pattern Recognition Letters 180 (2024) 41\u201347. 10.1016\/j.patrec.2024.02.015","DOI":"10.1016\/j.patrec.2024.02.015"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Elisabeth\u00a0M. Bik Arturo Casadevall and Ferric\u00a0C. Fang. 2016. The Prevalence of Inappropriate Image Duplication in Biomedical Research Publications. mBio 7 3 (2016). 10.1128\/mbio.00809-16","DOI":"10.1128\/mbio.00809-16"},{"key":"e_1_3_3_1_5_2","unstructured":"Edoardo\u00a0Daniele Cannas Sara Mandelli Natasa Popovic Ayman Alkhateeb Alessandro Gnutti Paolo Bestagini and Stefano Tubaro. 2024. Is JPEG AI Going to Change Image Forensics? (2024). arxiv:https:\/\/arXiv.org\/abs\/2412.03261"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Jo\u00e3o\u00a0P. Cardenuto Daniel Moreira and Anderson Rocha. 2024. Unveiling Scientific Articles from Paper Mills with Provenance Analysis. PLOS ONE 19 10 (2024) 1\u201328. 10.1371\/journal.pone.0312666","DOI":"10.1371\/journal.pone.0312666"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Jo\u00e3o\u00a0P. Cardenuto and Anderson Rocha. 2022. Benchmarking Scientific Image Forgery Detectors. Science and Engineering Ethics 28 4 (2022). 10.1007\/s11948-022-00391-4","DOI":"10.1007\/s11948-022-00391-4"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Beijing Chen Weijin Tan Gouenou Coatrieux Yuhui Zheng and Yun-Qing Shi. 2021. A Serial Image Copy-Move Forgery Localization Scheme with Source\/Target Distinguishment. IEEE Transactions on Multimedia 23 (2021) 3506\u20133517. 10.1109\/TMM.2020.3026868","DOI":"10.1109\/TMM.2020.3026868"},{"key":"e_1_3_3_1_9_2","unstructured":"Jeffrey\u00a0A. Clark and Pillow Contributors. 2025. Pillow (Version 11.1.0) [Computer software]. https:\/\/pillow.readthedocs.io\/ Python Imaging Library (Pillow) is an actively maintained fork of the original PIL."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Davide Cozzolino Giovanni Poggi and Luisa Verdoliva. 2015. Efficient Dense-Field Copy\u2013Move Forgery Detection. IEEE Transactions on Information Forensics and Security 10 11 (2015) 2284\u20132297. 10.1109\/TIFS.2015.2455334","DOI":"10.1109\/TIFS.2015.2455334"},{"key":"e_1_3_3_1_11_2","unstructured":"Daya Guo Dejian Yang Haowei Zhang Junxiao Song Ruoyu Zhang Runxin Xu Qihao Zhu Shirong Ma Peiyi Wang Xiao Bi et\u00a0al. 2025. Deepseek-R1: Incentivizing Reasoning Capability in LLMs via Reinforcement Learning. (2025). arxiv:https:\/\/arXiv.org\/abs\/2501.12948"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS61860.2024.10810704"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP51287.2024.10648063"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.5555\/3618408.3619222"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Yuanman Li Yingjie He Changsheng Chen Li Dong Bin Li Jiantao Zhou and Xia Li. 2024. Image Copy-Move Forgery Detection via Deep PatchMatch and Pairwise Ranking Learning. IEEE Transactions on Image Processing 34 (2024) 425\u2013440. 10.1109\/TIP.2024.3482191","DOI":"10.1109\/TIP.2024.3482191"},{"key":"e_1_3_3_1_17_2","unstructured":"Alejandro Lozano Jeffrey Nirschl James Burgess Sanket Rajan Gupte Yuhui Zhang Alyssa Unell and Serena Yeung-Levy. 2024. Micro-Bench: A Vision-Language Benchmark for Microscopy Understanding. (2024). arxiv:https:\/\/arXiv.org\/abs\/2407.01791"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Ming\u00a0Y. Lu Bowen Chen Drew F.\u00a0K. Williamson Richard\u00a0J. Chen Ivy Liang Tong Ding Guillaume Jaume Igor Odintsov Long\u00a0Phi Le Georg Gerber et\u00a0al. 2024. A Visual-Language Foundation Model for Computational Pathology. Nature Medicine 30 3 (2024) 863\u2013874. 10.1038\/s41591-024-02856-4","DOI":"10.1038\/s41591-024-02856-4"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Yifan Ma Chengqiang Yi Yao Zhou Zhaofei Wang Yuxuan Zhao Lanxin Zhu Jie Wang Shimeng Gao Jianchao Liu Xinyue Yuan et\u00a0al. 2024. Semantic Redundancy-Aware Implicit Neural Compression for Multidimensional Biomedical Image Data. Communications Biology 7 1 (2024). 10.1038\/s42003-024-06788-0","DOI":"10.1038\/s42003-024-06788-0"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.5555\/3495724.3496723"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Daniel Moreira Jo\u00e3o\u00a0P. Cardenuto Ruiting Shao Sriram Baireddy Davide Cozzolino Diego Gragnaniello Wael Abd-Almageed Paolo Bestagini Stefano Tubaro et\u00a0al. 2022. SILA: A System for Scientific Image Analysis. Scientific Reports 12 1 (2022). 10.1038\/s41598-022-21535-3","DOI":"10.1038\/s41598-022-21535-3"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Mike Rossner and Kenneth\u00a0M. Yamada. 2004. What\u2019s in a picture? The temptation of image manipulation. The Journal of Cell Biology 166 1 (2004) 11\u201315. 10.1083\/jcb.200406019","DOI":"10.1083\/jcb.200406019"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Rasheed Sule Gabriela Rivera and Aldrin Gomes. 2023. Western Blotting (Immunoblotting): History Theory Uses Protocol and Problems. Taylor & Francis BioTechniques 75 3 (2023) 99\u2013114. 10.2144\/btn-2022-0034","DOI":"10.2144\/btn-2022-0034"},{"key":"e_1_3_3_1_24_2","volume-title":"JPEG AI Use Cases and Requirements","author":"Ebrahimi Touradj","year":"2024","unstructured":"Touradj Ebrahimi. 2024. JPEG AI Use Cases and Requirements. Technical Report N100724. Joint Photographic Experts Group (JPEG). https:\/\/ds.jpeg.org\/documents\/jpegai\/wg1n100724-102-REQ-JPEG_AI_Use_Cases_and_Requirements.pdf Accessed: January, 2025."},{"key":"e_1_3_3_1_25_2","first-page":"49","volume-title":"Proceedings of the International Symposium on Electronics in Marine (ELMAR)","author":"Tralic Dijana","year":"2013","unstructured":"Dijana Tralic, Ivan Zupancic, Sonja Grgic, and Mislav Grgic. 2013. CoMoFoD - New Database for Copy-Move Forgery Detection. In Proceedings of the International Symposium on Electronics in Marine (ELMAR). 49\u201354."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_11"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"Runzhao Yang Tingxiong Xiao Yuxiao Cheng Anan Li Jinyuan Qu Rui Liang Shengda Bao Xiaofeng Wang Jue Wang Jinli Suo et\u00a0al. 2024. Sharing Massive Biomedical Data at Magnitudes Lower Bandwidth Using Implicit Neural Function. Proceedings of the National Academy of Sciences 121 28 (2024). 10.1073\/pnas.2320870121","DOI":"10.1073\/pnas.2320870121"},{"key":"e_1_3_3_1_28_2","unstructured":"Sheng Zhang Yanbo Xu Naoto Usuyama Hanwen Xu Jaspreet Bagga Robert Tinn Sam Preston Rajesh Rao Mu Wei Naveen Valluri et\u00a0al. 2023. BiomedCLIP: A Multimodal Biomedical Foundation Model Pretrained from Fifteen Million Scientific Image-Text Pairs. (2023). arxiv:https:\/\/arXiv.org\/abs\/2303.00915"}],"event":{"name":"IH&MMSEC '25: ACM Workshop on Information Hiding and Multimedia Security","location":"San Jose USA","acronym":"IH&MMSEC '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:28Z","timestamp":1750158868000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733102.3733148"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":27,"alternative-id":["10.1145\/3733102.3733148","10.1145\/3733102"],"URL":"https:\/\/doi.org\/10.1145\/3733102.3733148","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-06-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}