{"id":"https://openalex.org/W3089523720","doi":"https://doi.org/10.1109/icip40778.2020.9190837","title":"Infoprint: Information Theoretic Digital Image Forensics","display_name":"Infoprint: Information Theoretic Digital Image Forensics","publication_year":2020,"publication_date":"2020-09-30","ids":{"openalex":"https://openalex.org/W3089523720","doi":"https://doi.org/10.1109/icip40778.2020.9190837","mag":"3089523720"},"language":"en","primary_location":{"id":"doi:10.1109/icip40778.2020.9190837","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icip40778.2020.9190837","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112744289","display_name":"Aurobrata Ghosh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112936","display_name":"Verisk Analytics (United States)","ror":"https://ror.org/01xdzbt45","country_code":"US","type":"company","lineage":["https://openalex.org/I4210112936"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aurobrata Ghosh","raw_affiliation_strings":["Verisk AI, Verisk Analytics"],"affiliations":[{"raw_affiliation_string":"Verisk AI, Verisk Analytics","institution_ids":["https://openalex.org/I4210112936"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100664803","display_name":"Zheng Zhong","orcid":"https://orcid.org/0000-0002-1711-7315"},"institutions":[{"id":"https://openalex.org/I4210112936","display_name":"Verisk Analytics (United States)","ror":"https://ror.org/01xdzbt45","country_code":"US","type":"company","lineage":["https://openalex.org/I4210112936"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zheng Zhong","raw_affiliation_strings":["Verisk AI, Verisk Analytics"],"affiliations":[{"raw_affiliation_string":"Verisk AI, Verisk Analytics","institution_ids":["https://openalex.org/I4210112936"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077218049","display_name":"Steve Cruz","orcid":"https://orcid.org/0000-0002-8322-934X"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steve Cruz","raw_affiliation_strings":["Colorado Springs, University of Colorado"],"affiliations":[{"raw_affiliation_string":"Colorado Springs, University of Colorado","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038197402","display_name":"Subbu Veeravasarapu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112936","display_name":"Verisk Analytics (United States)","ror":"https://ror.org/01xdzbt45","country_code":"US","type":"company","lineage":["https://openalex.org/I4210112936"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Subbu Veeravasarapu","raw_affiliation_strings":["Verisk AI, Verisk Analytics"],"affiliations":[{"raw_affiliation_string":"Verisk AI, Verisk Analytics","institution_ids":["https://openalex.org/I4210112936"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101827826","display_name":"Maneesh Singh","orcid":"https://orcid.org/0000-0003-0901-3388"},"institutions":[{"id":"https://openalex.org/I4210112936","display_name":"Verisk Analytics (United States)","ror":"https://ror.org/01xdzbt45","country_code":"US","type":"company","lineage":["https://openalex.org/I4210112936"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maneesh Singh","raw_affiliation_strings":["Verisk AI, Verisk Analytics"],"affiliations":[{"raw_affiliation_string":"Verisk AI, Verisk Analytics","institution_ids":["https://openalex.org/I4210112936"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049661026","display_name":"Terrance E. Boult","orcid":"https://orcid.org/0000-0001-5007-2529"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Terrance E Boult","raw_affiliation_strings":["Colorado Springs, University of Colorado"],"affiliations":[{"raw_affiliation_string":"Colorado Springs, University of Colorado","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5112744289"],"corresponding_institution_ids":["https://openalex.org/I4210112936"],"apc_list":null,"apc_paid":null,"fwci":0.0977,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.40439941,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"638","last_page":"642"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13877","display_name":"Law in Society and Culture","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7264058589935303},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.6567829847335815},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6498520374298096},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.47092336416244507},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.4397788345813751},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3668779134750366},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.31076425313949585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28132444620132446},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.21148869395256042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7264058589935303},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.6567829847335815},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6498520374298096},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.47092336416244507},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.4397788345813751},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3668779134750366},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.31076425313949585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28132444620132446},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.21148869395256042}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icip40778.2020.9190837","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icip40778.2020.9190837","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1686946872","https://openalex.org/W1959608418","https://openalex.org/W1983586459","https://openalex.org/W2049771774","https://openalex.org/W2084252081","https://openalex.org/W2097506049","https://openalex.org/W2162192649","https://openalex.org/W2194775991","https://openalex.org/W2515389788","https://openalex.org/W2541922885","https://openalex.org/W2593634001","https://openalex.org/W2766825913","https://openalex.org/W2798117183","https://openalex.org/W2798365772","https://openalex.org/W2802701183","https://openalex.org/W2892806280","https://openalex.org/W2907097116","https://openalex.org/W2948407537","https://openalex.org/W2955813329","https://openalex.org/W2963145887","https://openalex.org/W2964160479","https://openalex.org/W2964209830","https://openalex.org/W2979454998","https://openalex.org/W2982318515","https://openalex.org/W3043547428","https://openalex.org/W4293469690","https://openalex.org/W4297749952","https://openalex.org/W6637108112","https://openalex.org/W6640963894","https://openalex.org/W6726281296","https://openalex.org/W6729165681","https://openalex.org/W6729906282","https://openalex.org/W6749101112","https://openalex.org/W6750997056","https://openalex.org/W6751380901","https://openalex.org/W6765577808"],"related_works":["https://openalex.org/W2181728705","https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4247205791","https://openalex.org/W2167366752","https://openalex.org/W3002268218","https://openalex.org/W2385667210","https://openalex.org/W3001565613","https://openalex.org/W1506329045","https://openalex.org/W4205142576"],"abstract_inverted_index":{"Tampered":[0],"images":[1,50],"pose":[2],"a":[3,10,52,65],"serious":[4],"predicament":[5],"since":[6],"digitized":[7],"media":[8],"is":[9],"ubiquitous":[11],"part":[12],"of":[13,22,44],"our":[14],"lives.":[15],"These":[16],"are":[17],"facilitated":[18],"by":[19,93,111],"the":[20,42,58,78,91,104],"availability":[21],"image":[23],"editing":[24],"software":[25],"and":[26],"recent":[27],"advances":[28],"in":[29,48],"deep":[30,53],"Generative":[31],"Adversarial":[32],"Networks":[33],"(GANs).":[34],"We":[35,63],"propose":[36],"an":[37],"innovative":[38],"method":[39],"to":[40,76,106,107],"formulate":[41],"problem":[43,56],"10-calizing":[45],"manipulated":[46],"regions":[47],"fake":[49],"as":[51],"representation":[54],"learning":[55],"using":[57],"Information":[59],"Bottleneck":[60],"(IB)":[61],"principle.":[62],"devise":[64],"convolutional":[66],"neural":[67],"net-based":[68],"architecture,":[69],"InfoPrint":[70,89],"(IP),":[71],"that":[72,88,101],"uses":[73],"variational":[74],"inference":[75],"approximate":[77],"IB":[79],"formulation.":[80],"Testing":[81],"on":[82],"three":[83],"standard":[84],"datasets,":[85],"we":[86,99],"demonstrate":[87,100],"outperforms":[90],"state-of-the-art":[92],"3%":[94],"points":[95],"or":[96],"more.":[97],"Additionally,":[98],"it":[102],"has":[103],"ability":[105],"detect":[108],"alterations":[109],"made":[110],"inpainting":[112],"GANs.":[113]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-10-08T00:00:00"}
