{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T19:46:42Z","timestamp":1649015202080},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,3,3]],"date-time":"2016-03-03T00:00:00Z","timestamp":1456963200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s11042-016-3303-8","type":"journal-article","created":{"date-parts":[[2016,3,3]],"date-time":"2016-03-03T07:35:53Z","timestamp":1456990553000},"page":"7197-7212","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Media trustworthiness verification and event assessment through an integrated framework: a case-study"],"prefix":"10.1007","volume":"76","author":[{"given":"Irene","family":"Amerini","sequence":"first","affiliation":[]},{"given":"Rudy","family":"Becarelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Brancati","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Caldelli","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Giunta","sequence":"additional","affiliation":[]},{"given":"Massimiliano L.","family":"Itria","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,3]]},"reference":[{"issue":"2","key":"3303_CR1","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00778-003-0108-y","volume":"13","author":"A Adi","year":"2004","unstructured":"Adi A, Etzion O (2004) Amit - the situation manager. VLDB J 13(2):177\u2013203. doi: 10.1007\/s00778-003-0108-y","journal-title":"VLDB J"},{"issue":"6","key":"3303_CR2","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/TMM.2013.2265080","volume":"15","author":"L Aiello","year":"2013","unstructured":"Aiello L, Petkos G, Martin C, Corney D, Papadopoulos S, Skraba R, Goker A, Kompatsiaris I, Jaimes A (2013) Sensing trending topics in twitter. IEEE Trans Multimedia 15(6):1268\u20131282. doi: 10.1109\/TMM.2013.2265080","journal-title":"IEEE Trans Multimedia"},{"issue":"3","key":"3303_CR3","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099 \u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"3303_CR4","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.image.2013.03.006","volume":"28","author":"I Amerini","year":"2013","unstructured":"Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Process Image Commun 28(6):659\u2013669","journal-title":"Signal Process Image Commun"},{"key":"3303_CR5","doi-asserted-by":"publisher","unstructured":"Amerini I, Becarelli R, Caldelli R, Casini M (2015) A feature-based forensic procedure for splicing forgeries detection Mathematical Problems in Engineering 2015. doi: 10.1155\/2015\/653164","DOI":"10.1155\/2015\/653164"},{"key":"3303_CR6","doi-asserted-by":"publisher","unstructured":"Boididou C, Papadopoulos S, Kompatsiaris Y, Schifferes S, Newman N (2014) Challenges of computational verification in social multimedia. In: Proceedings of the 23rd international conference on world wide web, WWW \u201914 Companion. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland. doi: 10.1145\/2567948.2579323 , pp 743\u2013748","DOI":"10.1145\/2567948.2579323"},{"key":"3303_CR7","unstructured":"Derczynski L, Bontcheva K (2014) Pheme: veracity in digital social networks. In: Posters, demos, late-breaking results and workshop proceedings of the 22nd conference on user modeling, adaptation, and personalization co-located with the 22nd conference on user modeling, adaptation, and personalization (UMAP2014), Aalborg, Denmark, 7\u201311 July 2014"},{"issue":"2","key":"3303_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.ipm.2014.10.006","volume":"51","author":"L Derczynski","year":"2015","unstructured":"Derczynski L, Maynard D, Rizzo G, van Erp M, Gorrell G, Troncy R, Petrak J, Bontcheva K (2015) Analysis of named entity recognition and linking for tweets. Inf Process Manag 51(2):32\u201349. doi: 10.1016\/j.ipm.2014.10.006 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306457314001034","journal-title":"Inf Process Manag"},{"key":"3303_CR9","unstructured":"Esper T, EsperTech I (2014) Esper Reference version 4.9.0. http:\/\/esper.codehaus.org"},{"key":"3303_CR10","unstructured":"Etzion O, Niblett P (2011) Event processing in action. MANNING"},{"issue":"6","key":"3303_CR11","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler MA, Bolles RC (1981) Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381\u2013395. doi: 10.1145\/358669.358692","journal-title":"Commun ACM"},{"key":"3303_CR12","doi-asserted-by":"crossref","unstructured":"Gupta A, Lamba H, Kumaraguru P, Joshi A (2013) Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd international conference on world wide web, WWW \u201913 companion. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, pp 729\u2013736","DOI":"10.1145\/2487788.2488033"},{"key":"3303_CR13","unstructured":"Itria ML, Ceccarelli AD (2014) A complex event processing approach for crisis-management systems. In: EDCC workshop big4CIP"},{"key":"3303_CR14","unstructured":"J\u00f8sang A, Roslan I (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference"},{"key":"3303_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-9372-3","volume-title":"Twitter data analytics","author":"S Kumar","year":"2014","unstructured":"Kumar S, Morstatter F, Liu H (2014) Twitter data analytics. Springer, Berlin Heidelberg New York"},{"issue":"2","key":"3303_CR16","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91\u2013110","journal-title":"Int J Comput Vis"},{"key":"3303_CR17","doi-asserted-by":"crossref","unstructured":"Mao Z, Li N, Winsborough W. (2006) Distributed credential chain discovery in trust management with parameterized roles and constraints, vol 4307, pp 159\u2013173","DOI":"10.1007\/11935308_12"},{"key":"3303_CR18","doi-asserted-by":"publisher","unstructured":"Mathioudakis M, Koudas N (2010) Twittermonitor: trend detection over the twitter stream. In: Proceedings of the 2010 ACM SIGMOD intern. conference on management of data. doi: 10.1145\/1807167.1807306 , New York, pp 1155\u20131158","DOI":"10.1145\/1807167.1807306"},{"key":"3303_CR19","unstructured":"Middleton SE (2015) Extracting attributed verification and debunking reports from social media: mediaeval-2015 trust and credibility analysis of image and video. In: Working notes proceedings of the MediaEval 2015 workshop, Wurzen, Germany, September 14\u201315, CEUR-WS.org, ISSN 1613-0073. http:\/\/ceur-ws.org\/Vol-1436\/Paper_43.pdf"},{"key":"3303_CR20","doi-asserted-by":"crossref","unstructured":"Popoola A, Krasnoshtan D, Toth AP, Naroditskiy V, Castillo C, Meier P, Rahwan I (2013) Information verification during natural disasters. In: Carr L, Laender AHF, Lscio BF, King I, Fontoura M, Vrandecic D, Aroyo L, de Oliveira JPM, Lima F, Wilde E (eds) WWW (Companion Volume). International World Wide Web Conferences Steering Committee \/ ACM, pp 1029\u20131032","DOI":"10.1145\/2487788.2488111"},{"key":"3303_CR21","doi-asserted-by":"publisher","unstructured":"Sakaki T, Okazaki M, Matsuo Y (2010) Earthquake shakes twitter users: real-time event detection by social sensors. In: Proceedings of the 19th international conference on world wide web, WWW \u201910. doi: 10.1145\/1772690.1772777 . ACM, New York, pp 851\u2013860","DOI":"10.1145\/1772690.1772777"},{"issue":"4","key":"3303_CR22","doi-asserted-by":"publisher","first-page":"47:1","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan W, Nepal S, Paris C (2013) A survey of trust in social networks. ACM Comput Surv 45(4):47:1\u201347:33. doi: 10.1145\/2501654.2501661","journal-title":"ACM Comput Surv"},{"key":"3303_CR23","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/ACCESS.2013.2260814","volume":"1","author":"M Stamm","year":"2013","unstructured":"Stamm M, Min W, Liu K (2013) Information forensics: an overview of the first decade. Access, IEEE 1:167\u2013200. doi: 10.1109\/ACCESS.2013.2260814","journal-title":"Access, IEEE"},{"key":"3303_CR24","unstructured":"Zubiaga A, Liakata M, Procter RN, Bontcheva K, Tolmie P (2015) Towards detecting rumours in social media. In: AAAI workshop on AI for cities"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3303-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3303-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3303-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3303-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T05:58:32Z","timestamp":1567663112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3303-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,3]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["3303"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3303-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,3]]}}}