{"id":"https://openalex.org/W2938045713","doi":"https://doi.org/10.1155/2019/9236910","title":"Visual and Textual Analysis for Image Trustworthiness Assessment within Online News","display_name":"Visual and Textual Analysis for Image Trustworthiness Assessment within Online News","publication_year":2019,"publication_date":"2019-04-14","ids":{"openalex":"https://openalex.org/W2938045713","doi":"https://doi.org/10.1155/2019/9236910","mag":"2938045713"},"language":"en","primary_location":{"id":"doi:10.1155/2019/9236910","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/9236910","pdf_url":"http://downloads.hindawi.com/journals/scn/2019/9236910.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2019/9236910.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033827892","display_name":"Federica Lago","orcid":"https://orcid.org/0000-0001-7840-7693"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Federica Lago","raw_affiliation_strings":["University of Trento, Department of Engineering and Computer Science, Trento 38123, Italy"],"raw_orcid":"https://orcid.org/0000-0001-7840-7693","affiliations":[{"raw_affiliation_string":"University of Trento, Department of Engineering and Computer Science, Trento 38123, Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034070433","display_name":"Quoc-Tin Phan","orcid":"https://orcid.org/0000-0002-4403-374X"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Quoc-Tin Phan","raw_affiliation_strings":["University of Trento, Department of Engineering and Computer Science, Trento 38123, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Trento, Department of Engineering and Computer Science, Trento 38123, Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028899632","display_name":"Giulia Boato","orcid":"https://orcid.org/0000-0002-0260-9528"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giulia Boato","raw_affiliation_strings":["University of Trento, Department of Engineering and Computer Science, Trento 38123, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Trento, Department of Engineering and Computer Science, Trento 38123, Italy","institution_ids":["https://openalex.org/I193223587"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033827892"],"corresponding_institution_ids":["https://openalex.org/I193223587"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.9185,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.78770976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13877","display_name":"Law in Society and Culture","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8839282989501953},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.6143648624420166},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.6004526019096375},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5782158374786377},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.47285938262939453},{"id":"https://openalex.org/keywords/haystack","display_name":"Haystack","score":0.4492798447608948},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32135164737701416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8839282989501953},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.6143648624420166},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.6004526019096375},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5782158374786377},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.47285938262939453},{"id":"https://openalex.org/C13424479","wikidata":"https://www.wikidata.org/wiki/Q5687237","display_name":"Haystack","level":2,"score":0.4492798447608948},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32135164737701416},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1155/2019/9236910","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/9236910","pdf_url":"http://downloads.hindawi.com/journals/scn/2019/9236910.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6b4119bb453f42c1bf4f1f7c7d252d37","is_oa":false,"landing_page_url":"https://doaj.org/article/6b4119bb453f42c1bf4f1f7c7d252d37","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"},{"id":"pmh:oai:iris.unitn.it:11572/241793","is_oa":true,"landing_page_url":"https://www.hindawi.com/journals/scn/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:zenodo.org:49296","is_oa":true,"landing_page_url":"https://www.openaccessrepository.it/record/49296","pdf_url":null,"source":{"id":"https://openalex.org/S4306402478","display_name":"INFM-OAR (INFN Catania)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210116497","host_organization_name":"Istituto Nazionale di Fisica Nucleare, Sezione di Catania","host_organization_lineage":["https://openalex.org/I4210116497"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1155/2019/9236910","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/9236910","pdf_url":"http://downloads.hindawi.com/journals/scn/2019/9236910.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2938045713.pdf","grobid_xml":"https://content.openalex.org/works/W2938045713.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1994743750","https://openalex.org/W2009130368","https://openalex.org/W2051353472","https://openalex.org/W2071794886","https://openalex.org/W2096754397","https://openalex.org/W2097506049","https://openalex.org/W2121029817","https://openalex.org/W2130225759","https://openalex.org/W2147152072","https://openalex.org/W2390960427","https://openalex.org/W2515389788","https://openalex.org/W4233906183"],"related_works":["https://openalex.org/W4253878822","https://openalex.org/W1965563707","https://openalex.org/W1736550718","https://openalex.org/W4210692028","https://openalex.org/W4408323858","https://openalex.org/W2808729870","https://openalex.org/W2479343091","https://openalex.org/W2278064783","https://openalex.org/W3174858427","https://openalex.org/W1972480475"],"abstract_inverted_index":{"The":[0,118,173,181,196],"majority":[1],"of":[2,48,67,75,79,86,135,153],"news":[3,16,30,99,115],"published":[4,96],"online":[5,98],"presents":[6],"one":[7],"or":[8,11,106,163],"more":[9,17,22],"images":[10,63,87,95,136],"videos,":[12],"which":[13],"make":[14],"the":[15,44,54,65,71,77,84,112,114,184,208],"easily":[18],"consumed":[19],"and":[20,38,46,58,69,73,129,224],"therefore":[21],"attractive":[23],"to":[24,82,140,169,220],"huge":[25],"audiences.":[26],"As":[27],"a":[28,133,150],"consequence,":[29],"with":[31,190],"catchy":[32],"multimedia":[33],"content":[34],"can":[35,146],"be":[36,147],"spread":[37],"get":[39],"viral":[40],"extremely":[41],"quickly.":[42],"Unfortunately,":[43],"availability":[45],"sophistication":[47],"photo":[49],"editing":[50],"software":[51],"are":[52,138],"erasing":[53],"line":[55],"between":[56],"pristine":[57],"manipulated":[59],"content.":[60,142],"Given":[61],"that":[62,100,107,137,207,227],"have":[64,101],"power":[66],"bias":[68],"influence":[70],"opinion":[72],"behavior":[74],"readers,":[76],"need":[78],"automatic":[80],"techniques":[81,158],"assess":[83],"authenticity":[85],"is":[88,116,176,210,218],"straightforward.":[89],"This":[90],"paper":[91],"aims":[92],"at":[93],"detecting":[94,126],"within":[97],"either":[102],"been":[103],"maliciously":[104],"modified":[105],"do":[108],"not":[109,211],"represent":[110],"accurately":[111],"event":[113],"mentioning.":[117],"proposed":[119],"approach":[120],"composes":[121],"image":[122,127,156,166,171],"forensic":[123],"algorithms":[124],"for":[125,213],"tampering,":[128],"textual":[130,141,144],"analysis":[131,145],"as":[132,149],"verifier":[134],"misaligned":[139],"Furthermore,":[143],"considered":[148],"complementary":[151],"source":[152],"information":[154],"supporting":[155],"forensics":[157],"when":[159],"they":[160],"falsely":[161,164],"detect":[162],"ignore":[165],"tampering":[167],"due":[168],"heavy":[170],"postprocessing.":[172],"devised":[174],"method":[175],"tested":[177],"on":[178,183],"three":[179],"datasets.":[180],"performance":[182],"first":[185],"two":[186],"shows":[187],"interesting":[188],"results,":[189],"F1-score":[191],"generally":[192],"higher":[193],"than":[194],"75%.":[195],"third":[197],"dataset":[198],"has":[199],"an":[200],"exploratory":[201],"intent;":[202],"in":[203,230],"fact,":[204],"although":[205],"showing":[206],"methodology":[209],"ready":[212],"completely":[214],"unsupervised":[215],"scenarios,":[216],"it":[217],"possible":[219,222],"investigate":[221],"problems":[223],"controversial":[225],"cases":[226],"might":[228],"arise":[229],"real-world":[231],"scenarios.":[232]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":7}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
