{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.08167","arxiv_id":"2605.08167","integrity":{"available":true,"endpoint":"/pith/2605.08167/integrity.json","summary":{"critical":2,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":2,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T14:40:16.624630Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T02:01:22.408577Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:52:35.503589Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/tifs.2017.2652079' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/tifs.2017.2652079","detected_arxiv_id":null,"ref_index":19,"audited_at":"2026-05-19T15:52:35.503589Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/AC-CESS.2023.3307357) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/AC-CESS.2023.3307357","detected_arxiv_id":null,"ref_index":16,"audited_at":"2026-05-19T15:52:35.503589Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1016/j.cose.2023.103273' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1016/j.cose.2023.103273","detected_arxiv_id":null,"ref_index":18,"audited_at":"2026-05-19T15:52:35.503589Z"}],"snapshot_sha256":"48bd2846aa87ef0e5f12531875a937f8f915a1a37ffc6a3d3721e35767813d66"},"events":[{"event_id":1928,"event_type":"pith.integrity.v1","payload_sha256":"ad982d1df3e50f4fb0eeac247d10b74e4989530c16f369ab528c54112a87a3bb","signature_b64":"AtCH0O/ndqcPkdKoNBfPnNeZYhNQW3k08FnMmBLH18rfmaob9Bjjydufiy+mKCjur2PLpeFiXjlFp7oGsbP7CA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:57:11.682641+00:00","payload":{"note":"Identifier '10.1109/tifs.2017.2652079' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"D. Cozzolino and L. Verdoliva, “Single-image splicing localization through autoencoder-based anomaly detection,”IEEE Trans. Informa- tion Forensics and Security, vol. 12, no. 7, pp. 1566–1577, 2017, doi: 10.1109/TIFS.2017.2652079","arxiv_id":"2605.08167","detector":"doi_compliance","evidence":{"doi":"10.1109/tifs.2017.2652079","arxiv_id":null,"ref_index":19,"raw_excerpt":"D. Cozzolino and L. Verdoliva, “Single-image splicing localization through autoencoder-based anomaly detection,”IEEE Trans. Informa- tion Forensics and Security, vol. 12, no. 7, pp. 1566–1577, 2017, doi: 10.1109/TIFS.2017.2652079","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":19,"audited_at":"2026-05-19T15:52:35.503589Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/tifs.2017.2652079","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"24500aaccd78bd32f1690ca635a3e265f2c95f0c91310b438a613cfc1245826f","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1927,"event_type":"pith.integrity.v1","payload_sha256":"d953a07dbee9c9de6c7af6b509e2c0ba903d84b890099c07defc2b84c7a84294","signature_b64":"m6rcFKRurjyKjl10efQkNfRZHxMywKaW6304hgbq28uT5q+eCvqObaJrvWdKOtJdOJVi+GdkdxX8Thwq6RpeCA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:57:11.681344+00:00","payload":{"note":"Identifier '10.1016/j.cose.2023.103273' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"G. Nirmalapriya et al., “ASCA-SqueezeNet: Hybrid Deep Learning Model for Digital Image Forgery Detection,”Computers & Security, vol. 134, p. 103273, 2023, doi: 10.1016/j.cose.2023.103273","arxiv_id":"2605.08167","detector":"doi_compliance","evidence":{"doi":"10.1016/j.cose.2023.103273","arxiv_id":null,"ref_index":18,"raw_excerpt":"G. Nirmalapriya et al., “ASCA-SqueezeNet: Hybrid Deep Learning Model for Digital Image Forgery Detection,”Computers & Security, vol. 134, p. 103273, 2023, doi: 10.1016/j.cose.2023.103273","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":18,"audited_at":"2026-05-19T15:52:35.503589Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.cose.2023.103273","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"4542d07f410408a289b7e0bb66031c5479cafcbe3663f1f8138939110e0020b4","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1926,"event_type":"pith.integrity.v1","payload_sha256":"882ae1e01176a5b06a0cfa515f93723c464e18aa614f6a0fd305fc9cef19df56","signature_b64":"h/0XMEtBi5QTmjELUrfvpcz9Zl1TyhW3b6jwEgBjQ90fwEi8cvahrqLgh71vbVhjQvHQX2Prg2erdZEzMHMQCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:57:11.679930+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/AC-CESS.2023.3307357) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"A. H. Khalil et al., “Enhancing Digital Image Forgery Detection Us- ing Transfer Learning,”IEEE Access, vol. 11, 2023, doi: 10.1109/AC- CESS.2023.3307357","arxiv_id":"2605.08167","detector":"doi_compliance","evidence":{"ref_index":16,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"A. H. Khalil et al., “Enhancing Digital Image Forgery Detection Us- ing Transfer Learning,”IEEE Access, vol. 11, 2023, doi: 10.1109/AC- CESS.2023.3307357","reconstructed_doi":"10.1109/AC-CESS.2023.3307357"},"severity":"advisory","ref_index":16,"audited_at":"2026-05-19T15:52:35.503589Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/AC-CESS.2023.3307357","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"15ffb3817e367de68eebda54a0dd592fb2186863fc53f78480864c9aff2b0cc6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.08167/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}