{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:39:15Z","timestamp":1735583955816},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100002322","name":"CAPES","doi-asserted-by":"publisher","award":["200960 \/ 2015\u20136 \/ SWE, 306196 \/ 2014-0","482271 \/ 2012-4","423673 \/ 2016\u20135 and 311862 \/ 2012\u20138"],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Graphics"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1016\/j.cag.2017.08.010","type":"journal-article","created":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T06:45:28Z","timestamp":1503643528000},"page":"142-151","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":38,"special_numbering":"C","title":["Humans are easily fooled by digital images"],"prefix":"10.1016","volume":"68","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8116-794X","authenticated-orcid":false,"given":"Victor","family":"Schetinger","sequence":"first","affiliation":[]},{"given":"Manuel M.","family":"Oliveira","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6110-0441","authenticated-orcid":false,"given":"Roberto","family":"da Silva","sequence":"additional","affiliation":[]},{"given":"Tiago J.","family":"Carvalho","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cag.2017.08.010_bib0001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2013\/496701","article-title":"An overview on image forensics","volume":"2013","author":"Piva","year":"2013","journal-title":"ISRN Signal Process"},{"issue":"4","key":"10.1016\/j.cag.2017.08.010_bib0002","doi-asserted-by":"crossref","DOI":"10.1145\/1978802.1978805","article-title":"Vision of the unseen: current trends and challenges in digital image and video forensics","volume":"43","author":"Rocha","year":"2011","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.cag.2017.08.010_sbref0003","series-title":"Proceedings of the SPIE 9028, media watermarking, security, and forensics 2014","article-title":"Countering anti-forensics by means of data fusion","volume":"vol. 9028","author":"Fontani","year":"2014"},{"key":"10.1016\/j.cag.2017.08.010_bib0004","series-title":"Proceedings of the ACM SIGGRAPH 2012 talks","first-page":"48","article-title":"Crowd sourcing memory colors for image enhancement","author":"Xue","year":"2012"},{"key":"10.1016\/j.cag.2017.08.010_bib0005","series-title":"Proceedings of the IEEE 11th international conference on computer vision, ICCV 2007.","first-page":"1","article-title":"Using color compatibility for assessing image realism","author":"Lalonde","year":"2007"},{"issue":"11","key":"10.1016\/j.cag.2017.08.010_bib0006","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1068\/p5418","article-title":"Perceiving illumination inconsistencies in scenes","volume":"34","author":"Ostrovsky","year":"2005","journal-title":"Perception"},{"key":"10.1016\/j.cag.2017.08.010_sbref0007","series-title":"Proceedings of the 12th eurographics workshop on rendering techniques","isbn-type":"print","first-page":"235","article-title":"Measuring the perception of visual realism in images","author":"Rademacher","year":"2001","ISBN":"http:\/\/id.crossref.org\/isbn\/3211837094"},{"key":"10.1016\/j.cag.2017.08.010_bib0008","series-title":"Proceedings of SPIE symposium on electronic imaging","article-title":"Image forensic analyses that elude the human visual system","author":"Farid","year":"2010"},{"issue":"10","key":"10.1016\/j.cag.2017.08.010_bib0009","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1038\/nn1553","article-title":"Why pictures look right when viewed from the wrong place","volume":"8","author":"Vishwanath","year":"2005","journal-title":"Nat Neurosci"},{"issue":"11","key":"10.1016\/j.cag.2017.08.010_bib0010","doi-asserted-by":"crossref","first-page":"1948","DOI":"10.1109\/JPROC.2006.884093","article-title":"Face recognition by humans: nineteen results all computer vision researchers should know about","volume":"94","author":"Sinha","year":"2006","journal-title":"Proc IEEE"},{"issue":"2","key":"10.1016\/j.cag.2017.08.010_bib0011","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1038\/72140","article-title":"Expertise for cars and birds recruits brain areas involved in face recognition","volume":"3","author":"Gauthier","year":"2000","journal-title":"Nat Neurosci"},{"issue":"2","key":"10.1016\/j.cag.2017.08.010_bib0012","doi-asserted-by":"crossref","DOI":"10.1145\/2620030","article-title":"Human perception of visual realism for photo and computer-generated face images","volume":"11","author":"Fan","year":"2014","journal-title":"ACM Trans Appl Percept"},{"key":"10.1016\/j.cag.2017.08.010_bib0014","unstructured":"IEEE. IEEE IFS-TC image forensics challenge. 2013. http:\/\/ifc.recod.ic.unicamp.br\/fc.website\/index.py; Accessed: 2017-3-25."},{"key":"10.1016\/j.cag.2017.08.010_bib0015","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","article-title":"Exposing digital image forgeries by illumination color classification","author":"de Carvalho","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.cag.2017.08.010_bib0016","series-title":"Proceedings of 2014 IEEE international conference on image processing (ICIP)","first-page":"5312","article-title":"Copy-move forgery detection based on patchmatch","author":"Cozzolino","year":"2014"},{"issue":"4","key":"10.1016\/j.cag.2017.08.010_bib0017","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1109\/TIFS.2014.2302078","article-title":"A Bayesian-MRF approach for PRNU-based image forgery detection","volume":"9","author":"Chierchia","year":"2014","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10.1016\/j.cag.2017.08.010_bib0018","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","article-title":"Image forgery localization via block-grained analysis of jpeg artifacts","volume":"7","author":"Bianchi","year":"2012","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.cag.2017.08.010_sbref0018","series-title":"Serious games: mechanisms and effects","isbn-type":"print","doi-asserted-by":"crossref","DOI":"10.4324\/9780203891650","author":"Ritterfeld","year":"2009","ISBN":"http:\/\/id.crossref.org\/isbn\/9780415993692"},{"key":"10.1016\/j.cag.2017.08.010_bib0020","series-title":"Probability and statistics with reliability, queuing, and computer science applications","isbn-type":"print","author":"Trivedi","year":"2002","ISBN":"http:\/\/id.crossref.org\/isbn\/0471333417"},{"key":"10.1016\/j.cag.2017.08.010_bib0021","unstructured":"Multimedia systems and equipment - colour measurement and management - part 2-1: colour management - default RGB colour space - SRGB. 1999."},{"key":"10.1016\/j.cag.2017.08.010_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.diin.2011.06.003","article-title":"Perceptual discrimination of computer generated and photographic faces","author":"Farid","year":"2012","journal-title":"Digit Investig"},{"issue":"2","key":"10.1016\/j.cag.2017.08.010_bib0023","doi-asserted-by":"crossref","DOI":"10.1145\/2871714","article-title":"Assessing and improving the identification of computer-generated portraits","volume":"13","author":"Holmes","year":"2016","journal-title":"ACM Trans Appl Percept"},{"issue":"1","key":"10.1016\/j.cag.2017.08.010_bib0024","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/TIP.2015.2500021","article-title":"Massive online crowdsourced study of subjective and objective picture quality","volume":"25","author":"Ghadiyaram","year":"2016","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.cag.2017.08.010_bib0025","series-title":"Skills matter","author":"OECD","year":"2016"},{"issue":"2","key":"10.1016\/j.cag.2017.08.010_bib0026","doi-asserted-by":"crossref","DOI":"10.1145\/2871714","article-title":"Assessing and improving the identification of computer-generated portraits","volume":"13","author":"Holmes","year":"2016","journal-title":"ACM Trans Appl Percept"},{"key":"10.1016\/j.cag.2017.08.010_bib0027","series-title":"Proceedings of the 2014 international ACM workshop on crowdsourcing for multimedia. CrowdMM \u201914","isbn-type":"print","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/2660114.2660120","article-title":"A crowdsourced data set of edited images online","author":"Conotter","year":"2014","ISBN":"http:\/\/id.crossref.org\/isbn\/9781450331289"},{"issue":"2","key":"10.1016\/j.cag.2017.08.010_sbref0026","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1111\/j.1467-8659.2009.01627.x","article-title":"Shared sampling for real-time alpha matting","volume":"29","author":"Gastal","year":"2010","journal-title":"Comput Graph Forum"},{"issue":"4","key":"10.1016\/j.cag.2017.08.010_bib0029","article-title":"Image melding: combining inconsistent images using patch-based synthesis","volume":"31","author":"Darabi","year":"2012","journal-title":"ACM Trans Graph (TOG) (Proc SIGGRAPH 2012)"},{"key":"10.1016\/j.cag.2017.08.010_sbref0028","series-title":"Proceedings of IS&T\/SPIE electronic imaging","article-title":"Assessing the impact of image manipulation and image context on users\u2019 perceptions of deception","author":"Conotter","year":"2014"},{"key":"10.1016\/j.cag.2017.08.010_bib0031","first-page":"1","article-title":"Blind image quality assessment by relative gradient statistics and adaboosting neural network","volume":"40","author":"Liu","year":"2016","journal-title":"Signal Process: Image Commun"}],"updated-by":[{"updated":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"DOI":"10.1016\/j.cag.2017.10.006","type":"erratum","label":"Erratum"}],"container-title":["Computers & Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0097849317301450?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0097849317301450?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T16:18:23Z","timestamp":1570033103000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0097849317301450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":30,"alternative-id":["S0097849317301450"],"URL":"https:\/\/doi.org\/10.1016\/j.cag.2017.08.010","relation":{},"ISSN":["0097-8493"],"issn-type":[{"value":"0097-8493","type":"print"}],"subject":[],"published":{"date-parts":[[2017,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Humans are easily fooled by digital images","name":"articletitle","label":"Article Title"},{"value":"Computers & Graphics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cag.2017.08.010","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}