{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.09089","arxiv_id":"2605.09089","integrity":{"available":true,"endpoint":"/pith/2605.09089/integrity.json","summary":{"critical":8,"advisory":4,"informational":0,"by_detector":{"doi_compliance":{"total":12,"critical":8,"advisory":4,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T08:22:01.681754Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T20:38:01.581865Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T13:31:18.976144Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T10:31:44.409213Z","findings_count":12}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICCV48922.2021.013924) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/ICCV48922.2021.013924","detected_arxiv_id":null,"ref_index":5,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/cvpr52734.2025.014152' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/cvpr52734.2025.014152","detected_arxiv_id":null,"ref_index":9,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.24840/2183-0606_013.002_l0034' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.24840/2183-0606_013.002_l0034","detected_arxiv_id":null,"ref_index":6,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/cvpr52729.2023.003084' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/cvpr52729.2023.003084","detected_arxiv_id":null,"ref_index":11,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-41679-8_364) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-031-41679-8_364","detected_arxiv_id":null,"ref_index":17,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1117/1.JEI.34.4.0430184) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1117/1.JEI.34.4.0430184","detected_arxiv_id":null,"ref_index":25,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/cvpr52729.2023.019742' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/cvpr52729.2023.019742","detected_arxiv_id":null,"ref_index":10,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/tcsvt.2022.31895454' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/tcsvt.2022.31895454","detected_arxiv_id":null,"ref_index":16,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/3581783.36120752' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/3581783.36120752","detected_arxiv_id":null,"ref_index":24,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/wacv48630.2021.000424' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/wacv48630.2021.000424","detected_arxiv_id":null,"ref_index":13,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-53311-2_152) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-031-53311-2_152","detected_arxiv_id":null,"ref_index":23,"audited_at":"2026-05-19T10:31:44.409213Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/cvpr52733.2024.012134' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/cvpr52733.2024.012134","detected_arxiv_id":null,"ref_index":27,"audited_at":"2026-05-19T10:31:44.409213Z"}],"snapshot_sha256":"989b1dead966f10a2f12624ffc2e25292ce4468013e471c86ea824ca02f838d4"},"events":[{"event_id":845,"event_type":"pith.integrity.v1","payload_sha256":"9461f4f8ddf8d041c4992029baa850e4541f71d90fc7464a1e3e5e5c0ffe285d","signature_b64":"X6ShnNsGa15gc+5MlGK5Q59zAUkwKVGOKL0WgHF9XRPJJNV9lm4WkongUQmUDW9jEv9WpKUEWYbcANP/pxLABA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.477178+00:00","payload":{"note":"Identifier '10.1109/cvpr52733.2024.012134' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Yu, Z., Ni, J., Lin, Y., Deng, H., Li, B.: Diffforensics: Leveraging diffusion prior to image forgery detection and localization. In: 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp. 12765–12774 (2024). https:","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"doi":"10.1109/cvpr52733.2024.012134","arxiv_id":null,"ref_index":27,"raw_excerpt":"Yu, Z., Ni, J., Lin, Y., Deng, H., Li, B.: Diffforensics: Leveraging diffusion prior to image forgery detection and localization. In: 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp. 12765–12774 (2024). https://doi.org/10.1109/CVPR52733.2024.012134","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":27,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/cvpr52733.2024.012134","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"1b14ba017d1de1b5b6ee5e88a1a92de850e211c53d3be597ed525640131e5b65","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":844,"event_type":"pith.integrity.v1","payload_sha256":"647c768bc82708ffa143b469bdd5d1105d43e003b7a14641175b1bc3c4d0c18c","signature_b64":"t3gk4hRscUELfKWSnjJuN2wOnQNRxeFSCHcrB3TNXzv1jNFGHALf1PJq5hs7hWZD7kKfsaR+3gvbPsWDXeCWBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.476158+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1117/1.JEI.34.4.0430184) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Wang, L., Li, Z., Zhao, W.: Research on identity document image tampering detec- tion based on texture understanding and multistream networks. Journal of Elec- tronic Imaging34(4), 043018 (2025).https://doi.org/10.1117/1.JEI.34.4. 043018,ht","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"ref_index":25,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Wang, L., Li, Z., Zhao, W.: Research on identity document image tampering detec- tion based on texture understanding and multistream networks. Journal of Elec- tronic Imaging34(4), 043018 (2025).https://doi.org/10.1117/1.JEI.34.4. 043018,ht","reconstructed_doi":"10.1117/1.JEI.34.4.0430184"},"severity":"advisory","ref_index":25,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1117/1.JEI.34.4.0430184","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"633a3fdfcd5031f6b76fc6fbb7f3d53cbdb1e56390e04801d3ced4574c18e3fa","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":843,"event_type":"pith.integrity.v1","payload_sha256":"b962a4217826f407985fa0b924bb6efab55e6fcd7475536ece3fc08ddef793bf","signature_b64":"naZusvmR47U8tDMLGpT9xfngMM817C+iQS1LXtegVOGbcm1M5bCC5MCgJuRr/3JXwbEwOysAIltUhcQf6BDLAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.475098+00:00","payload":{"note":"Identifier '10.1145/3581783.36120752' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Wang, H., Li, S., Cao, S., Yang, R., Zeng, J., Qian, Z., Zhang, X.: On physi- cally occluded fake identity document detection. In: Proceedings of the 31st ACM International Conference on Multimedia. p. 1556–1564. MM ’23, Association for Com","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"doi":"10.1145/3581783.36120752","arxiv_id":null,"ref_index":24,"raw_excerpt":"Wang, H., Li, S., Cao, S., Yang, R., Zeng, J., Qian, Z., Zhang, X.: On physi- cally occluded fake identity document detection. In: Proceedings of the 31st ACM International Conference on Multimedia. p. 1556–1564. MM ’23, Association for Computing Machinery, New York, NY, USA (2023).https://doi.org/10.1145/ 3581783.3612075,https://doi.org/10.1145/3581783.36120752, 4, 5","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":24,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3581783.36120752","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"241796bdf0a7bc8bd3976893162526fbeadb30bc2ed8feb10bc7dbf3da65db59","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":842,"event_type":"pith.integrity.v1","payload_sha256":"e7d04895d66b046e2289fe5e419957c5a50827479b7f888e913dd4ce1b957fda","signature_b64":"Z0FcgVodHVaVVkUsOys0ZgTHG2u+4CLsB5vUNbi0j/9Saf7cvMIPDWHVuoIAkswvW7BR8n/guGGXDc/fX4PtDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.474006+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-53311-2_152) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Triaridis, K., Mezaris, V.: Exploring multi-modal fusion for image manipulation detection and localization. In: Proceedings of the 30th International Conference on MultiMedia Modeling (MMM). Lecture Notes in Computer Science, vol. 14556, pp","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"ref_index":23,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Triaridis, K., Mezaris, V.: Exploring multi-modal fusion for image manipulation detection and localization. In: Proceedings of the 30th International Conference on MultiMedia Modeling (MMM). Lecture Notes in Computer Science, vol. 14556, pp","reconstructed_doi":"10.1007/978-3-031-53311-2_152"},"severity":"advisory","ref_index":23,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-031-53311-2_152","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f8651fd0f34bdb4eaf52b2fdd96b8fe46b7003d82de31cca292baf76077e768d","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":841,"event_type":"pith.integrity.v1","payload_sha256":"747a6ce81e3453eac907fc0a558aab2ca49e947892da05da28543409edf4162d","signature_b64":"/vYPphVr/L6b8/UNiDQmyNJrwN4XO/y08Vyi5gp+FZxXmdCwq7/IiMMZ6/5G/JohYu24kfej3N3IqJ3GKMMOBA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.472964+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-41679-8_364) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Luo, D., Zhou, Y., Yang, R., Liu, Y., Liu, X., Zeng, J., Yang, B., Huang, Z., Jin, L.: Icdar 2023 competition on detecting tampered text in images. In: Proceedings of theInternationalConferenceonDocumentAnalysisandRecognition(ICDAR).pp. 587","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"ref_index":17,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Luo, D., Zhou, Y., Yang, R., Liu, Y., Liu, X., Zeng, J., Yang, B., Huang, Z., Jin, L.: Icdar 2023 competition on detecting tampered text in images. In: Proceedings of theInternationalConferenceonDocumentAnalysisandRecognition(ICDAR).pp. 587","reconstructed_doi":"10.1007/978-3-031-41679-8_364"},"severity":"advisory","ref_index":17,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-031-41679-8_364","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"3ed9ad5c59a49948ed20a237955638f2588b4ffaabb74e4e2eef98dadecdec5e","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":840,"event_type":"pith.integrity.v1","payload_sha256":"a2d6666a99db08c21d8670a310a2eb09f3befc59004e57556bb4ec1fcb06d20e","signature_b64":"Djyi822SDrYXg6uMWhVI3cgFkhFqgCb49W8hJ7PhWyuJ4VYtyghlPSyo00/Ktogd9qVL5eChZj8QRizv17GxCA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.471920+00:00","payload":{"note":"Identifier '10.1109/tcsvt.2022.31895454' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Liu, X., Liu, Y., Chen, J., Liu, X.: Pscc-net: Progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Transactions on Circuits and Systems for Video Technology32(11), 7505–7517 (2022).https: /","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"doi":"10.1109/tcsvt.2022.31895454","arxiv_id":null,"ref_index":16,"raw_excerpt":"Liu, X., Liu, Y., Chen, J., Liu, X.: Pscc-net: Progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Transactions on Circuits and Systems for Video Technology32(11), 7505–7517 (2022).https: //doi.org/10.1109/TCSVT.2022.31895454","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":16,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/tcsvt.2022.31895454","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"0180ae2641bae02c396bbf37659a7b79a6cb791b704383bf43646f8c98c749cb","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":839,"event_type":"pith.integrity.v1","payload_sha256":"cc1517b3a6ee22facb1b2d43b5e89f8e266a6cc76213d33ad93d3575aed0b82f","signature_b64":"OyVdQ1bAjGPuIn759hfO/sOsGQVXOXFjiGXDrJgSkur5HguBF7VuqLwLC2Ip0nbThW0xs2P0VbV0/Ez5ExExBA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.470761+00:00","payload":{"note":"Identifier '10.1109/wacv48630.2021.000424' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Kwon, M.J., Yu, I.J., Nam, S.H., Lee, H.K.: Cat-net: Compression artifact tracing network for detection and localization of image splicing. In: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). pp. 375–384 (2021). https","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"doi":"10.1109/wacv48630.2021.000424","arxiv_id":null,"ref_index":13,"raw_excerpt":"Kwon, M.J., Yu, I.J., Nam, S.H., Lee, H.K.: Cat-net: Compression artifact tracing network for detection and localization of image splicing. In: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). pp. 375–384 (2021). https://doi.org/10.1109/WACV48630.2021.000424","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":13,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/wacv48630.2021.000424","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"96c695893623ec15d3a3b57c51e02b45976f1f024026f0dddd30e1fa194e19af","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":838,"event_type":"pith.integrity.v1","payload_sha256":"a41d9f4c3f295fbc69c010a1ebbda4a6b6dee5b869be72ffd6b36b2a32135de1","signature_b64":"Mc4hSpXfrbP71ZIyx9YglJjBcsi6lMtya40/rnX7toPgUQk1TsN9ETHdQxPOwlTKABLIK8KYcauKBw8cmWW5Cg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.469680+00:00","payload":{"note":"Identifier '10.1109/cvpr52729.2023.003084' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Guo, X., Liu, X., Ren, Z., Grosz, S., Masi, I., Liu, X.: Hierarchical fine-grained image forgery detection and localization. In: 2023 IEEE/CVF Conference on Com- puter Vision and Pattern Recognition (CVPR). pp. 3155–3165 (2023).https: //doi","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"doi":"10.1109/cvpr52729.2023.003084","arxiv_id":null,"ref_index":11,"raw_excerpt":"Guo, X., Liu, X., Ren, Z., Grosz, S., Masi, I., Liu, X.: Hierarchical fine-grained image forgery detection and localization. In: 2023 IEEE/CVF Conference on Com- puter Vision and Pattern Recognition (CVPR). pp. 3155–3165 (2023).https: //doi.org/10.1109/CVPR52729.2023.003084","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":11,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/cvpr52729.2023.003084","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"45a235f89522320b71f8aeb6609778872745324c006d40f561af8cde8700023b","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":837,"event_type":"pith.integrity.v1","payload_sha256":"4d7098c85f329d27885bd2187aee1d34dc179b224d483db0d0ed34f9c7591e7a","signature_b64":"1VnQ7UqzxhL2xf65OP8ymqktppEe6K0OX4E+4kBYbxNGDP0rDQk4xCcvc9z+ronviOJ7F0/i9aI//DplHYaxCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.468664+00:00","payload":{"note":"Identifier '10.1109/cvpr52729.2023.019742' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Guillaro, F., Cozzolino, D., Sud, A., Dufour, N., Verdoliva, L.: Trufor: Leveraging all-round clues for trustworthy image forgery detection and localization. In: 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"doi":"10.1109/cvpr52729.2023.019742","arxiv_id":null,"ref_index":10,"raw_excerpt":"Guillaro, F., Cozzolino, D., Sud, A., Dufour, N., Verdoliva, L.: Trufor: Leveraging all-round clues for trustworthy image forgery detection and localization. In: 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp. 20606–20615 (2023).https://doi.org/10.1109/CVPR52729.2023.019742, 4","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":10,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/cvpr52729.2023.019742","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"573cdf82a29356c6f6b3f4be9add58819dc090e31eff97a319b0327f84a429c2","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":836,"event_type":"pith.integrity.v1","payload_sha256":"fae3e934cec580bddddbe3f8f495e263a89f1f9d5a4ba3f168d4ed09815167c4","signature_b64":"5ta4pGWdRCl/KXCeTcJ7lTJl60jP1LMrsDJ0xF5o3f98RIF3eXtSWcn3nPHlvQ9prDJuH+mUmVrysuHzZBCkDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.467415+00:00","payload":{"note":"Identifier '10.1109/cvpr52734.2025.014152' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Gu, Z., Zhu, B., Zhu, G., Chen, Y., Tang, M., Wang, J.: Univad: A training- free unified model for few-shot visual anomaly detection. In: 2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp. 15194– 15203 (2025).ht","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"doi":"10.1109/cvpr52734.2025.014152","arxiv_id":null,"ref_index":9,"raw_excerpt":"Gu, Z., Zhu, B., Zhu, G., Chen, Y., Tang, M., Wang, J.: Univad: A training- free unified model for few-shot visual anomaly detection. In: 2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp. 15194– 15203 (2025).https://doi.org/10.1109/CVPR52734.2025.014152, 4","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":9,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/cvpr52734.2025.014152","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"dbf713eab65dcdebc3aa34ca588ebf49751de4b070125e4417b6a03890829d2c","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":835,"event_type":"pith.integrity.v1","payload_sha256":"ead554cca2a312a44e5c26f6ae4a80e02d7f32454638028178e8387a25fe7e3e","signature_b64":"flYl4ZAiPXfq9syc0qiG4nXd2pnXJ8Bia/B6knAt3I9KM65X6vdVYMM2RFbSlqgV4YkQo9TtIct5pa7WwagxDQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.466097+00:00","payload":{"note":"Identifier '10.24840/2183-0606_013.002_l0034' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Dai, K., Alonso, J., Gutiérrez-Meana, J.: A machine learning framework for forgery detection in digital id documents. Journal of Innovation Management13(2), XVI– XXV (Sep 2025).https://doi.org/10.24840/2183-0606_013.002_l0034","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"doi":"10.24840/2183-0606_013.002_l0034","arxiv_id":null,"ref_index":6,"raw_excerpt":"Dai, K., Alonso, J., Gutiérrez-Meana, J.: A machine learning framework for forgery detection in digital id documents. Journal of Innovation Management13(2), XVI– XXV (Sep 2025).https://doi.org/10.24840/2183-0606_013.002_l0034","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":6,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.24840/2183-0606_013.002_l0034","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"83cfefc998a6b1dbfc73d25061dd989e93bb34f8fd0dd62dd4b7c018969a6a78","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":834,"event_type":"pith.integrity.v1","payload_sha256":"dbd471146c4ede9622866b9be77d08188134ffb1a846de933aed209a5b25d170","signature_b64":"rshE058f4D6qBue5F9ltpHi6NivcFyx8JdPnF3FrXMuaDMY9WlKk6uq6aGwKRojVCqHpwcunI/cjjQz4kUfvCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:31:59.464915+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICCV48922.2021.013924) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Chen, X., Dong, C., Ji, J., Cao, J., Li, X.: Image manipulation detection by multi- view multi-scale supervision (10 2021).https://doi.org/10.1109/ICCV48922. 2021.013924","arxiv_id":"2605.09089","detector":"doi_compliance","evidence":{"ref_index":5,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Chen, X., Dong, C., Ji, J., Cao, J., Li, X.: Image manipulation detection by multi- view multi-scale supervision (10 2021).https://doi.org/10.1109/ICCV48922. 2021.013924","reconstructed_doi":"10.1109/ICCV48922.2021.013924"},"severity":"advisory","ref_index":5,"audited_at":"2026-05-19T10:31:44.409213Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ICCV48922.2021.013924","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"8d8e50f9ff4330ce48842bc0d8d89170452c54eac0c9fdf290cdc0249c127a1f","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.09089/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}