{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:7I5XDBL2LAPJKIZRDHU6WNH7JB","short_pith_number":"pith:7I5XDBL2","canonical_record":{"source":{"id":"1611.05328","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MM","submitted_at":"2016-11-16T15:45:19Z","cross_cats_sorted":["cs.CV"],"title_canon_sha256":"8c5f024d6d22c576661ea98dfd5d2fe5af652298b2997e69b209ecdf31eeb09c","abstract_canon_sha256":"2d66577686c4620b12f6497d7d8559a22e7006370ac00ae47c57ec380483fe62"},"schema_version":"1.0"},"canonical_sha256":"fa3b71857a581e95233119e9eb34ff4863457720292095e5b32aa92018c26bf1","source":{"kind":"arxiv","id":"1611.05328","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1611.05328","created_at":"2026-05-18T00:58:27Z"},{"alias_kind":"arxiv_version","alias_value":"1611.05328v1","created_at":"2026-05-18T00:58:27Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1611.05328","created_at":"2026-05-18T00:58:27Z"},{"alias_kind":"pith_short_12","alias_value":"7I5XDBL2LAPJ","created_at":"2026-05-18T12:30:04Z"},{"alias_kind":"pith_short_16","alias_value":"7I5XDBL2LAPJKIZR","created_at":"2026-05-18T12:30:04Z"},{"alias_kind":"pith_short_8","alias_value":"7I5XDBL2","created_at":"2026-05-18T12:30:04Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:7I5XDBL2LAPJKIZRDHU6WNH7JB","target":"record","payload":{"canonical_record":{"source":{"id":"1611.05328","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MM","submitted_at":"2016-11-16T15:45:19Z","cross_cats_sorted":["cs.CV"],"title_canon_sha256":"8c5f024d6d22c576661ea98dfd5d2fe5af652298b2997e69b209ecdf31eeb09c","abstract_canon_sha256":"2d66577686c4620b12f6497d7d8559a22e7006370ac00ae47c57ec380483fe62"},"schema_version":"1.0"},"canonical_sha256":"fa3b71857a581e95233119e9eb34ff4863457720292095e5b32aa92018c26bf1","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:58:27.333911Z","signature_b64":"t1yNY2kLa23Vud1rXo+4UuaCezUj8VmygfyyQ0q7vGrJTo4ouSkVjMl0WI7E4yGIN5G++cafOOqZ6MTwYS4lDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"fa3b71857a581e95233119e9eb34ff4863457720292095e5b32aa92018c26bf1","last_reissued_at":"2026-05-18T00:58:27.333290Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:58:27.333290Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1611.05328","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:27Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"NFQvxLlb0emYCXi3r+wurFjzO5vxxc7LT6ylTR+/0EFJxo0AlkieEoEqwDpa/5Xb52r9e5Qp3VxvBmJHnJuqAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T09:09:14.943636Z"},"content_sha256":"5a7553a3c2918b5c920bf5c9e992eef3157ac8b5247f381928f8b866f9053330","schema_version":"1.0","event_id":"sha256:5a7553a3c2918b5c920bf5c9e992eef3157ac8b5247f381928f8b866f9053330"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:7I5XDBL2LAPJKIZRDHU6WNH7JB","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Image Credibility Analysis with Effective Domain Transferred Deep Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CV"],"primary_cat":"cs.MM","authors_text":"Jiebo Luo, Juan Cao, Yongdong Zhang, Zhiwei Jin","submitted_at":"2016-11-16T15:45:19Z","abstract_excerpt":"Numerous fake images spread on social media today and can severely jeopardize the credibility of online content to public. In this paper, we employ deep networks to learn distinct fake image related features. In contrast to authentic images, fake images tend to be eye-catching and visually striking. Compared with traditional visual recognition tasks, it is extremely challenging to understand these psychologically triggered visual patterns in fake images. Traditional general image classification datasets, such as ImageNet set, are designed for feature learning at the object level but are not su"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1611.05328","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:27Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BqIPFtV/TOTHggkZ/OUm7tlyfgOqI/KyH8Nv16asPhbO1DHOII8mgfVolhnZAS7rlq107k7fSQOtsUIwhKj2AA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T09:09:14.943983Z"},"content_sha256":"8f550ad2049a39fb6e1936cd1f60e79072b06ba6ebdf30cb9970962d7a1ba762","schema_version":"1.0","event_id":"sha256:8f550ad2049a39fb6e1936cd1f60e79072b06ba6ebdf30cb9970962d7a1ba762"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/7I5XDBL2LAPJKIZRDHU6WNH7JB/bundle.json","state_url":"https://pith.science/pith/7I5XDBL2LAPJKIZRDHU6WNH7JB/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/7I5XDBL2LAPJKIZRDHU6WNH7JB/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T09:09:14Z","links":{"resolver":"https://pith.science/pith/7I5XDBL2LAPJKIZRDHU6WNH7JB","bundle":"https://pith.science/pith/7I5XDBL2LAPJKIZRDHU6WNH7JB/bundle.json","state":"https://pith.science/pith/7I5XDBL2LAPJKIZRDHU6WNH7JB/state.json","well_known_bundle":"https://pith.science/.well-known/pith/7I5XDBL2LAPJKIZRDHU6WNH7JB/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:7I5XDBL2LAPJKIZRDHU6WNH7JB","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"2d66577686c4620b12f6497d7d8559a22e7006370ac00ae47c57ec380483fe62","cross_cats_sorted":["cs.CV"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MM","submitted_at":"2016-11-16T15:45:19Z","title_canon_sha256":"8c5f024d6d22c576661ea98dfd5d2fe5af652298b2997e69b209ecdf31eeb09c"},"schema_version":"1.0","source":{"id":"1611.05328","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1611.05328","created_at":"2026-05-18T00:58:27Z"},{"alias_kind":"arxiv_version","alias_value":"1611.05328v1","created_at":"2026-05-18T00:58:27Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1611.05328","created_at":"2026-05-18T00:58:27Z"},{"alias_kind":"pith_short_12","alias_value":"7I5XDBL2LAPJ","created_at":"2026-05-18T12:30:04Z"},{"alias_kind":"pith_short_16","alias_value":"7I5XDBL2LAPJKIZR","created_at":"2026-05-18T12:30:04Z"},{"alias_kind":"pith_short_8","alias_value":"7I5XDBL2","created_at":"2026-05-18T12:30:04Z"}],"graph_snapshots":[{"event_id":"sha256:8f550ad2049a39fb6e1936cd1f60e79072b06ba6ebdf30cb9970962d7a1ba762","target":"graph","created_at":"2026-05-18T00:58:27Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Numerous fake images spread on social media today and can severely jeopardize the credibility of online content to public. In this paper, we employ deep networks to learn distinct fake image related features. In contrast to authentic images, fake images tend to be eye-catching and visually striking. Compared with traditional visual recognition tasks, it is extremely challenging to understand these psychologically triggered visual patterns in fake images. Traditional general image classification datasets, such as ImageNet set, are designed for feature learning at the object level but are not su","authors_text":"Jiebo Luo, Juan Cao, Yongdong Zhang, Zhiwei Jin","cross_cats":["cs.CV"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MM","submitted_at":"2016-11-16T15:45:19Z","title":"Image Credibility Analysis with Effective Domain Transferred Deep Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1611.05328","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:5a7553a3c2918b5c920bf5c9e992eef3157ac8b5247f381928f8b866f9053330","target":"record","created_at":"2026-05-18T00:58:27Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"2d66577686c4620b12f6497d7d8559a22e7006370ac00ae47c57ec380483fe62","cross_cats_sorted":["cs.CV"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MM","submitted_at":"2016-11-16T15:45:19Z","title_canon_sha256":"8c5f024d6d22c576661ea98dfd5d2fe5af652298b2997e69b209ecdf31eeb09c"},"schema_version":"1.0","source":{"id":"1611.05328","kind":"arxiv","version":1}},"canonical_sha256":"fa3b71857a581e95233119e9eb34ff4863457720292095e5b32aa92018c26bf1","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"fa3b71857a581e95233119e9eb34ff4863457720292095e5b32aa92018c26bf1","first_computed_at":"2026-05-18T00:58:27.333290Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:58:27.333290Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"t1yNY2kLa23Vud1rXo+4UuaCezUj8VmygfyyQ0q7vGrJTo4ouSkVjMl0WI7E4yGIN5G++cafOOqZ6MTwYS4lDg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:58:27.333911Z","signed_message":"canonical_sha256_bytes"},"source_id":"1611.05328","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:5a7553a3c2918b5c920bf5c9e992eef3157ac8b5247f381928f8b866f9053330","sha256:8f550ad2049a39fb6e1936cd1f60e79072b06ba6ebdf30cb9970962d7a1ba762"],"state_sha256":"af847fcb7c961513e992c9f87f5d37a891c64a499f3414eaa6f7617e1ca58d33"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"yF7jmmmTa/dQi93wJDiG56usyi4ikEIN8W2aGGP1cHV5ohoPeshjxfmGbFUipT8p5yXV4PlnqoPsbicjKkOkBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T09:09:14.945980Z","bundle_sha256":"b809c239d9f9b08523c26c1d10dce6c7356dbe533c6bbc847ee0acab257c2b52"}}