{"id":"https://openalex.org/W4392904953","doi":"https://doi.org/10.1109/ccnc51664.2024.10454640","title":"Authenticating AI-Generated Social Media Images Using Frequency Domain Analysis","display_name":"Authenticating AI-Generated Social Media Images Using Frequency Domain Analysis","publication_year":2024,"publication_date":"2024-01-06","ids":{"openalex":"https://openalex.org/W4392904953","doi":"https://doi.org/10.1109/ccnc51664.2024.10454640"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51664.2024.10454640","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51664.2024.10454640","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032762774","display_name":"Nihal Poredi","orcid":null},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nihal Poredi","raw_affiliation_strings":["Binghamton University,Dept. of Electrical and Computer Engineering,Binghamton,NY,USA,13902"],"affiliations":[{"raw_affiliation_string":"Binghamton University,Dept. of Electrical and Computer Engineering,Binghamton,NY,USA,13902","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084428113","display_name":"Deeraj Nagothu","orcid":"https://orcid.org/0000-0002-0511-0722"},"institutions":[{"id":"https://openalex.org/I4210131102","display_name":"Intelligent Fusion Technology (United States)","ror":"https://ror.org/02hjcc687","country_code":"US","type":"company","lineage":["https://openalex.org/I4210131102"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deeraj Nagothu","raw_affiliation_strings":["Intelligent Fusion Technology, Inc.,Germantown,MD,USA,20876"],"affiliations":[{"raw_affiliation_string":"Intelligent Fusion Technology, Inc.,Germantown,MD,USA,20876","institution_ids":["https://openalex.org/I4210131102"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100402109","display_name":"Yu Chen","orcid":"https://orcid.org/0000-0003-1880-0586"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yu Chen","raw_affiliation_strings":["Binghamton University,Dept. of Electrical and Computer Engineering,Binghamton,NY,USA,13902"],"affiliations":[{"raw_affiliation_string":"Binghamton University,Dept. of Electrical and Computer Engineering,Binghamton,NY,USA,13902","institution_ids":["https://openalex.org/I123946342"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032762774"],"corresponding_institution_ids":["https://openalex.org/I123946342"],"apc_list":null,"apc_paid":null,"fwci":2.3684,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89325129,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"534","last_page":"539"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7759807109832764},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6703693270683289},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.596504271030426},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5824098587036133},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.574590802192688},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5726868510246277},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5564231276512146},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4433770477771759},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.4084087908267975},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3611926734447479},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.336693674325943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24921217560768127}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7759807109832764},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6703693270683289},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.596504271030426},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5824098587036133},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.574590802192688},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5726868510246277},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5564231276512146},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4433770477771759},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.4084087908267975},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3611926734447479},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.336693674325943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24921217560768127},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc51664.2024.10454640","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51664.2024.10454640","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G4191871010","display_name":null,"funder_award_id":"2039342","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1997654368","https://openalex.org/W2031614119","https://openalex.org/W2126777570","https://openalex.org/W2138011018","https://openalex.org/W2152161678","https://openalex.org/W2508457857","https://openalex.org/W2533598788","https://openalex.org/W2793246835","https://openalex.org/W2898422183","https://openalex.org/W2907295878","https://openalex.org/W2947923502","https://openalex.org/W2962770929","https://openalex.org/W2963073614","https://openalex.org/W2964325468","https://openalex.org/W2982083293","https://openalex.org/W2988576913","https://openalex.org/W2991318208","https://openalex.org/W2999010171","https://openalex.org/W3011573535","https://openalex.org/W3012472557","https://openalex.org/W3034530968","https://openalex.org/W3174831884","https://openalex.org/W4224035735","https://openalex.org/W4226125322","https://openalex.org/W4231851991","https://openalex.org/W4249413252","https://openalex.org/W4288099671","https://openalex.org/W4312933868","https://openalex.org/W4313594536","https://openalex.org/W4321648656","https://openalex.org/W4323706279","https://openalex.org/W4375869427","https://openalex.org/W4380741057","https://openalex.org/W6790978476"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2374086689","https://openalex.org/W3176279093","https://openalex.org/W2373945265","https://openalex.org/W2370203001","https://openalex.org/W1912565424","https://openalex.org/W1998027365","https://openalex.org/W2990774877","https://openalex.org/W3093339210","https://openalex.org/W2025389994"],"abstract_inverted_index":{"Living":[0],"in":[1,162],"the":[2,24,40,50,76,163,169,193],"age":[3],"of":[4,26,42,78,116,187],"social":[5,56,176],"media,":[6],"it":[7],"is":[8,196],"a":[9,188,197],"daily":[10],"routine":[11],"for":[12,55],"individuals":[13],"to":[14,35,52,96,102,157,172,200],"post":[15],"videos,":[16],"audio,":[17],"pictures,":[18],"and":[19,88,104,129,143,160],"text":[20],"online.":[21],"In":[22,107],"addition,":[23],"proliferation":[25],"Artificial":[27],"Intelligence":[28],"(AI)":[29],"technology":[30],"allows":[31],"customizing":[32],"multimedia":[33],"content":[34],"meet":[36],"personal":[37,86],"demands.":[38],"However,":[39],"popularity":[41],"AI-based":[43],"text-to-image":[44,137],"generators":[45],"like":[46],"DeepAI":[47],"also":[48],"opens":[49],"door":[51],"generating":[53],"images":[54,73,123,178,202],"media":[57,177],"platforms":[58],"that":[59,81,119,192],"impersonate":[60],"unsuspecting":[61],"users":[62],"without":[63],"their":[64],"permission.":[65],"While":[66],"people":[67],"enjoy":[68],"high":[69],"creativity,":[70],"such":[71,139],"\u201cfake\u201d":[72],"could":[74],"enable":[75,168],"propagation":[77],"deceptive":[79],"information":[80],"negatively":[82],"impacts":[83],"an":[84,113],"individual's":[85],"life":[87],"potentially":[89],"cause":[90],"public":[91],"unrest.":[92],"Therefore,":[93],"reliable":[94],"methods":[95],"facilitate":[97],"image":[98],"authentication":[99],"are":[100,147,155],"vital":[101],"identify":[103],"flag":[105],"them.":[106],"this":[108],"paper,":[109],"we":[110],"present":[111],"AUSOME-2,":[112],"upgraded":[114],"version":[115],"our":[117],"system":[118,195],"AUthenticates":[120],"SOcial":[121],"MEdia":[122],"(AUSOME)":[124],"using":[125],"frequency":[126,164],"analysis":[127,153],"technologies":[128],"machine":[130],"learning":[131],"(ML)":[132],"algorithms.":[133],"Images":[134],"from":[135,149,179],"several":[136],"platforms,":[138],"as":[140],"Dall-E":[141],"2":[142],"Google":[144],"Deep":[145],"Dream,":[146],"distinguished":[148],"genuine":[150,180],"images.":[151],"Spectral":[152],"techniques":[154],"used":[156],"obtain":[158],"features":[159,167],"fingerprints":[161],"domain.":[165],"These":[166],"ML":[170],"model":[171],"classify":[173],"AI":[174],"-generated":[175],"ones.":[181],"The":[182],"experimental":[183],"results,":[184],"on":[185],"top":[186],"proof-of-concept":[189],"prototype,":[190],"showed":[191],"AUSOME-2":[194],"promising":[198],"approach":[199],"authenticate":[201],"with":[203],"decent":[204],"detection":[205],"accuracy.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
