<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Towards Multimedia Opinion Mining *</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Giulia</forename><surname>Boato</surname></persName>
							<email>boato@disi.unitn.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Information Engineering and Computer Science</orgName>
								<orgName type="institution">University of Trento</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Valentina</forename><surname>Conotter</surname></persName>
							<email>conotter@disi.unitn.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Information Engineering and Computer Science</orgName>
								<orgName type="institution">University of Trento</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><forename type="middle">G B</forename><surname>De Natale</surname></persName>
							<email>denatale@ing.unitn.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Information Engineering and Computer Science</orgName>
								<orgName type="institution">University of Trento</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Claudio</forename><surname>Fontanari</surname></persName>
							<email>fontanar@science.unitn.it</email>
							<affiliation key="aff1">
								<orgName type="department">Dept. of Mathematics</orgName>
								<orgName type="institution">University of Trento Via Sommarive</orgName>
								<address>
									<addrLine>14</addrLine>
									<postCode>38123</postCode>
									<settlement>Trento</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Towards Multimedia Opinion Mining *</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">B6289283BE29D2F5850F16B85AA311BB</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:19+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Opinion mining</term>
					<term>cross-media analysis</term>
					<term>digital forensics</term>
					<term>photomontage detection</term>
					<term>sensor pattern noise</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Both opinion mining and multimedia retrieval are active research areas with challenging applications, but as far as we know the present vision paper is the first attempt to integrate them into multimedia opinion mining.</p><p>Here we address the specific case of satirical comments in politics by exploiting the presence of photomontage to infer a tendentially negative opinion. In order to do so, we introduce a novel digital forensics technique allowing source identification from a single image.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The availability of more and more devices that allow users to generate new multimedia content, by capturing their own experience in images and videos, mixing it with digital material collected from the web, and finally sharing it with other users, claims for a new paradigm of information extraction from digital data. Indeed, media search based on textual annotations seems to be intrinsically inadequate to access the richness of visual information; on the other hand, content-based image retrieval suffers from the so-called semantic gap between low level features and high-level semantics. A cross-media approach, exploiting both text and visual content, helps to bridge such a gap and provides more effective tools to information retrieval. We point out that relevant information concerns not only facts, but also opinions. Extracting opinions from text documents is a very challenging but well-established discipline, known as opinion mining or sentiment analysis. However, ambiguity of text (especially in satirical or ironic comments) makes automated opinion extraction into a really non-trivial issue. Following the cross-media philosophy, we believe that images accompanying text provide valuable side information that should be exploited to accomplish such a task. To the best of our knowledge, this is the first contribution towards an opinion mining based not only on text, but also on more general multimedia content. Indeed, the idea of analyzing facts, opinion, and bias in large multidimensional data sets is the main goal of the European project Living Knowledge <ref type="bibr">[1]</ref>. In such a framework, a first application of digital forensics techniques to investigate opinions conveyed by images is presented in <ref type="bibr" target="#b0">[2]</ref>.</p><p>Here instead we address a specific case study, namely, satirical comments in politics.</p><p>A satirical text conveys a tendentially negative opinion about its subject, but it can be ambiguous enough to confuse an automated classification. However, luckily enough satirical comments about politicians appearing on the web are quite often accompanied by photomontages making their ironic purpose more easily detectable. Our key idea is to apply digital forensics tools detecting image manipulations to classify as negative the opinion about a politician extracted from a text surrounding a photomontage. In order to do so, we need to distinguish (pieces of) pictures taken by different cameras. As we shall see, currently available tools based on sensor noise require either the devices which took the pictures or at least multiple images taken by each camera, which is clearly an infeasible assumption in the web context. We are able to overcome this point thanks to the recent work <ref type="bibr" target="#b1">[3]</ref> about noise estimation from a single image. The structure of the paper is the following: In Section 2 we describe the current state of the art on opinion mining and we outline the proposed cross-media approach. In Section 3 we report digital forensics tools currently available for image manipulation detection. The proposed method for photomontage detection and multimedia opinion mining from satirical comments on politics is detailed in Section 4. Finally, Section 5 reports concluding remarks and open problems to be addressed in future works on this new research topic.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Opinion Mining</head><p>In the last few years, opinion mining has attracted interest from different research areas including computational linguistics, artificial intelligence and computer science (see <ref type="bibr" target="#b2">[4]</ref> for a comprehensive and updated survey). Given the increasing diffusion and popularity of user-generated content (e.g., blogs), opinion mining provides the opportunity to scan this information and to gain insights into the public's or an individual's perception of facts and products, and it is therefore appealing for marketers and analysts. Existing methods focus on sentiment analysis on text, by determining whether a positive or negative sentiment is conveyed by a single words, a complete phrase, or a document. On one hand, the semantic orientation of single words is defined by looking at co-occurrence patterns with reference words (e.g., "excellent" and "poor") <ref type="bibr" target="#b3">[5]</ref><ref type="bibr" target="#b4">[6]</ref><ref type="bibr" target="#b5">[7]</ref> or by exploiting additional data such as word paraphrases <ref type="bibr" target="#b6">[8]</ref>. On the other hand, semantic orientation of sentences and documents can be extracted by suitably modifying machine learning techniques <ref type="bibr" target="#b7">[9]</ref><ref type="bibr" target="#b8">[10]</ref>. Specific methods for product review are presented in the literature: the authors of <ref type="bibr" target="#b9">[11]</ref><ref type="bibr" target="#b10">[12]</ref> propose to associate the extracted opinion with particular characteristics of the product, while just a summary of the reviews is determined in <ref type="bibr" target="#b11">[13]</ref><ref type="bibr" target="#b12">[14]</ref>, filtering out untruthful reviews that try to manipulate the customer <ref type="bibr" target="#b13">[15]</ref>. The problem of analyzing opinion on widespread news has been addressed only recently in <ref type="bibr" target="#b14">[16]</ref>, by exploiting comments and information reported on blogs. We believe that state of the art techniques could strongly be improved by exploiting the integration of the semantic content of textual and non-textual data, thus allowing more accurate opinion extraction by detecting the characteristics of visual data that may alter the perception of a user and their relevant impact. In order to do so, we underline the need of opinion mining methods from multimedia data able to support current tools working on text. By linking associated text and images we may come to a cross-media characterisation and analysis. The selection and use of images for conveying a message or illustrating a textual message clearly have a strong potential for biasing due to the subtle message that can be conveyed by images. In this paper we propose a first attempt focusing on satirical comments in politics, where multimedia data analysis can help disambiguating opinion extracted from text. In particular, satirical texts about politicians convey negative sentiments towards them, although irony may require an antiphrastic use of positive words therefore making an automatic text analysis very difficult. On the other hand, this kind of comments are commonly supported by photomontages, which can represent an anchor for multimedia opinion mining. Indeed, by detecting photomontages it will be possible to achieve a more accurate automatic analysis of cross-media comments about a politician. We propose to exploit the currently available techniques to detect image manipulations (described in details in the next Section) and to classify as negative the opinion about a politician extracted from a text surrounding a photomontage (following the algorithm presented in Section 4).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Digital Forensics</head><p>From a traditional point of view, a photograph is a trusty and close representation of a real scene. Notwithstanding, this is no longer true for digital images, nowadays widely used in several fields such as news, sports and information reporting, because of the ease of manipulation allowed by sophisticated photo editors (e.g., Photoshop). Doctored images cannot be admitted as a legal evidence, thus claming for advanced tools able to link the digital image to a specific camera and therefore demonstrating its integrity. Moreover, modified data may influence people opinions and even alter their attidudes in response to the represented event <ref type="bibr" target="#b15">[17]</ref><ref type="bibr" target="#b16">[18]</ref>. As a consequence, it is more and more important to be able to automatically verify the fidelity and authenticity of digital images in order to guarantee their truthfulness. Digital watermarking <ref type="bibr" target="#b17">[19]</ref> has been proposed as a valuable means to prove the content ownership and authenticity and to track copyright violations. Generally, a watermark (an imperceptible digital code) is embedded into a multimedia content and it is assumed to be modified whenever a tampering occurs. Authenticity can thus be demonstrated by comparing the extracted watermark with the original inserted code. The major drawback of this approach is that it requires the watermark to be embedded at the time of recording, thus limiting its application to specially equipped cameras. According to <ref type="bibr" target="#b18">[20]</ref>, digital watermarking is said to be an active forensics approach, in contrast to passive techniques which work in absence of any watermark or special hardware. Recently, the scientific community focused its attention on passive forensics techniques, whose aims can be primarly divided in three categories <ref type="bibr" target="#b20">[21]</ref>:</p><p>• Image forgery detection, to prove that a a-posteriori manipulation has been applied to an image, e.g., moving or replacing an object within an image. Different tools, such as binary similarity measures, wavelet coefficient statistics, quality metrics, phase characteristic of the bicoherence spectrum, resampling, color filter array interpolation, and geometric optics can be used to this aim <ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref>. • Discrimination between synthetic and real images <ref type="bibr" target="#b27">[28]</ref><ref type="bibr" target="#b28">[29]</ref>.</p><p>• Image source identification. All methods are based on the assumption that digital pictures taken by the same device are overlaid by a specific pattern, that is a unique and intrinsic fingerprint of the acquisition device. Each manufacturer selects specific hardware components for a given device model, thus different patterns can be present in the image, depending on the brand and on the model. These intrinsic characteristics allow linking images to a specific device for forensic purposes. Many techniques have been proposed in the literature to describe this unique pattern, each one analyzing different processing steps of the digital camera pipeline (i.e. demosaiking, CFA interpolation, lens radial distortion) <ref type="bibr" target="#b29">[30]</ref><ref type="bibr" target="#b30">[31]</ref><ref type="bibr" target="#b31">[32]</ref><ref type="bibr" target="#b32">[33]</ref><ref type="bibr" target="#b33">[34]</ref>. The most promising approach belonging to this class of forensics techniques is based on the analysis of sensor imperfections. Two types of noise have been considered in forensics analysis. The first type is introduced by array defects and includes hot pixels, dead pixels, pixel traps and cluster defects <ref type="bibr" target="#b34">[35]</ref>. The major drawback of these methods is that defect pixels are not very reliable since many cameras include in their hardware post-processing operations able to compensate such a noise. The second type of noise is called Patter Noise and indicates "any spatial pattern that does not change significantly from image to image" <ref type="bibr" target="#b35">[36]</ref>. This reference pattern is known given the camera model that took the photo or is obtained by averaging the noise residuals of a set of available images, all taken from a specific camera <ref type="bibr" target="#b36">[37]</ref><ref type="bibr" target="#b37">[38]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Proposed Method</head><p>The main technical issue we have to face in our application is photomontage detection. In <ref type="bibr" target="#b38">[39]</ref> sensor noise extraction is exploited to detect image forgeries, by computing correlation between the reference pattern and pattern extracted by local regions of the images. The main limitation of forensics techniques based on sensor noise remains the basic assumption of the availability of the device which took the image or, alternatively, of other images taken by the same device <ref type="bibr" target="#b38">[39]</ref>. This may be a strong constraint, especially in those applications where only one image is available and its origin and integrity needs to be verified.</p><p>In our opinion, a possible solution could come from a recent work in a field different from digital forensics. Indeed, Liu et al. <ref type="bibr" target="#b1">[3]</ref> perform noise estimation starting from a single image. This approach is based on a simple noise model of a CCD camera, namely, I=f(L+n s +n c )+n q , where I is the observed image brightness, f(.) is the camera response function (CRF), and n s, n c, n q take into account different types of noise introduced in the image acquisition process. After a segmentation process (K-Means Clustering), each segment of image I is transformed by using the inverse of CRF (available at www.cs.columbia.edu/CAVE) to obtain a corresponding L in the irradiance plane. Such an L is then added with synthesized noises n s and n c (since n q can be neglected) and direct CRF is applied again to return into the brightness domain. Next, a real camera demosaicing algorithm is reproduced. Through this process, a noisy image I N can be obtained by adding to the original image I the synthesized CCD noise. At this point a noise level function (NLF) can be estimated, which is essentially a relation describing the noise level as a function of the image brightness. An example of estimated NLF curves is given in Fig. <ref type="figure">1</ref>. Fig. <ref type="figure">1</ref> Estimated NLF curves, one for each channel RGB, taken from <ref type="bibr" target="#b1">[3]</ref> Experiments show that the proposed method is efficient and is able to extract reliable noise from images. This algorithm has been successfully applied to adaptive bilateral denoising and canny edge detection, reporting very promising results.</p><p>In the context of image forensics, the most interesting aspect of this work is that authors claim that different images from the same camera give the same estimated NLF. Validation to this claim has been performed with success, as reported in Fig. <ref type="figure">1</ref>. It is evident that two different images, taken by the same camera, results in a very similar NLF. Starting from this point, we could evince that different images taken by different cameras exhibit different NLF curves, thus resulting in a promising forensics technique to detect photomontage. Furthermore, with the described method it seems to be possible to reveal differences in images taken with the same camera but in different moments, thus leading to a complete forensics framework able to reveal any splicing.</p><p>Hence we stress two main advantages with respect to the technique presented in <ref type="bibr" target="#b37">[38]</ref>. First of all, only one image is needed and the constraint to have available either the camera or a set of images is overcome. Second, photomontages deriving by the splice of two or more images taken by the same camera, but taken in different moments, can be revealed. On the contrary, forgeries detection based on sensor noise analysis only reveals if parts of the image are linked to a different camera, loosing its efficiency when splicing comes from images taken by the same camera.</p><p>The main idea of our contribution is to apply forensics techniques to the automatic analysis of cross-media comments about politicians. Since we assume that the opinion extracted from a satiric text surrounding a photomontage is negative, we detect photomontage of politicians in order to claim satirical purpose of both the image and the surrounding text.</p><p>The proposed algorithm is the following:</p><p>1. Exploit GOOGLE image search engine (based on textual annotations) to construct a database of websites about famous persons. In this case study we focus on images of the Italian Prime Minister Silvio Berlusconi. 2. A face detector (for instance <ref type="bibr" target="#b39">[40]</ref>) is applied to isolate the face of the person, based on the assumption that typically a satirical photomontage is constructed by splicing the face with another image as in Fig. <ref type="figure" target="#fig_1">2</ref>(a). 3. The noise estimation proposed in <ref type="bibr" target="#b1">[3]</ref> is applied firstly inside and then outside the region extracted in step 2. 4. Based on the claim in <ref type="bibr" target="#b1">[3]</ref> that different images taken by the same camera give the same estimated NLF and images taken from different cameras will exhibit different NLF, we check for image integrity as follows:</p><p>• If the calculated NLFs are coherent, no photomontage has been applied;</p><p>• Otherwise, if the calculated NLFs are not coherent, the image derives from a splicing operation of two different images. Thus, the non authenticity of the considered picture can be claimed. 5. According to a reasonable assumption, detection of a photomontage implies a tendentially negative opinion. We stress that a subjective analysis could be misleading, as demonstrated by the non tampered picture in Fig.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>In this vision paper we have moved the first steps towards the integration of multimedia data in opinion mining. Here we have focused on the specific case of satirical comments in politics by exploiting the negative connotation implied by the presence of a photomontage. However, we believe that a cross-media approach may have a relevant impact on opinion mining by taking advantage of visual information also in a more general context. Indeed, sentiments induced by images strongly influence the opinion conveyed to users. From this perspective, textual analysis should be supported by a suitable multimedia understanding. In our specific application, we have reduced opinion extraction to photomontage detection and we have introduced a novel digital forensics tool based on noise estimation from a single image. This idea turns out to be innovative with respect to the state of the art and may find more general applications in the field of digital forensics.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>2(b).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2</head><label>2</label><figDesc>Fig. 2 Examples of (a) photomontage and (b) authentic photograph</figDesc><graphic coords="6,204.78,419.42,59.10,85.50" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Investigating Image Dependencies Through Image Forensics</title>
		<author>
			<persName><forename type="first">F</forename><surname>Uccheddu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">De</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Piva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Barni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">GTTI 2009</title>
				<meeting><address><addrLine>Parma, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009-06">June 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Automatic estimation and removal of noise from a single image</title>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Szeliski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">B</forename><surname>Kang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">L</forename><surname>Zitnick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">T</forename><surname>Freeman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Pattern analysis and machine intelligence</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="299" to="314" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Opinion mining and sentiment analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Pang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Foundations and Trends in Information Retrieval</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1" to="135" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A holistic lexicon-based approach to opinion mining</title>
		<author>
			<persName><forename type="first">X</forename><surname>Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Yu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the ACM International Conference on Web Search and Web Data Mining</title>
				<meeting>of the ACM International Conference on Web Search and Web Data Mining</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Predicting the semantic orientation of adjectives</title>
		<author>
			<persName><forename type="first">V</forename><surname>Hatzivassiloglou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">R</forename><surname>Mckeown</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Annual Meeting of the Association for Computational Linguistics</title>
				<meeting>of the Annual Meeting of the Association for Computational Linguistics</meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Measuring praise and criticism: Inference of semantic orientation from association</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">D</forename><surname>Turney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Littman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="315" to="346" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Determining the semantic orientation of terms through gloss classification</title>
		<author>
			<persName><forename type="first">A</forename><surname>Esuli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Sebastiani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ACM International Conference on Information and Knowledge Management</title>
				<meeting>of ACM International Conference on Information and Knowledge Management</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Mining the peanut gallery: opinion extraction and semantic classification of product reviews</title>
		<author>
			<persName><forename type="first">K</forename><surname>Dave</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lawrence</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Pennock</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of WWW</title>
				<meeting>of WWW</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Towards answering opinion questions: separating facts from opinions and identifying the polarity of opinion sentences</title>
		<author>
			<persName><forename type="first">H</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Hatzivassiloglou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Conference on Empirical Methods in Natural Language Processing</title>
				<meeting>of the Conference on Empirical Methods in Natural Language essing</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Opinion observer: analyzing and comparing opinions on the web</title>
		<author>
			<persName><forename type="first">B</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cheng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of WWW</title>
				<meeting>of WWW</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Extracting product features and opinions from reviews</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Popescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Etzioni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Conference on Human Language Technology and Empirical Methods in Natural Language Processing</title>
				<meeting>of the Conference on Human Language Technology and Empirical Methods in Natural Language essing</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">An exploration of sentiment summarization</title>
		<author>
			<persName><forename type="first">P</forename><surname>Beineke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Hastie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Manning</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vaithyanathan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of AAAI Spring Symposium on Exploring Attitude and Affect in Text: Theories and Applications</title>
				<meeting>of AAAI Spring Symposium on Exploring Attitude and Affect in Text: Theories and Applications</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Mining and summarizing customer reviews</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the ACM International Conference on Knowledge Discovery and Data Mining</title>
				<meeting>of the ACM International Conference on Knowledge Discovery and Data Mining</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A holistic lexicon-based approach to opinion mining</title>
		<author>
			<persName><forename type="first">X</forename><surname>Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Yu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the ACM International Conference on Web Search and Web Data Mining</title>
				<meeting>of the ACM International Conference on Web Search and Web Data Mining</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">BLEWS -Using Blogs to Provide Context for News Articles</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gamon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Basu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Belenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fisher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hurst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>König</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the International Conference on Weblogs and Social Media</title>
				<meeting>of the International Conference on Weblogs and Social Media</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Changing history: Doctored photographs affect memory for past public events</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L M</forename><surname>Sacchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Agnoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">F</forename><surname>Loftus</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Appl. Cognit. Psychol</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1005" to="1022" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Digital Doctoring: Can we trust photographs?</title>
		<author>
			<persName><forename type="first">H</forename><surname>Farid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Deception: Methods, Motives, Contexts and Consequences</title>
				<meeting><address><addrLine>Stanford, CA</addrLine></address></meeting>
		<imprint>
			<publisher>Stanford Univ. Press</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A survey of watermarking techniques Applied to Multimedia</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ISIE</title>
				<meeting>of ISIE</meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Passive-blind image forensics</title>
		<author>
			<persName><forename type="first">T.-T</forename><surname>Ng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-F</forename><surname>Chang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-Y</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Sun</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m">Multimedia Security Technologies for Digital Rights</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Elsevier</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">T</forename><surname>Sencar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Memon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Overview of state-of-the-art in digital image forensics</title>
		<title level="s">Statistical Science and Interdisciplinary Research</title>
		<meeting><address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>World Scientific Press</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A Classifier Design for Detecting Image Manipulations</title>
		<author>
			<persName><forename type="first">I</forename><surname>Avcibas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bayram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Memon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sankur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ramkumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of IEEE ICIP</title>
				<meeting>of IEEE ICIP</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Blind Detection of Photomontage Using Higher Order Statistics</title>
		<author>
			<persName><forename type="first">T</forename><surname>Ng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S. -F</forename><surname>Chang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ISCAS</title>
				<meeting>of ISCAS</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Image Manipulation Detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bayram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Avcibas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sankur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Memon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Electronic Imaging</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Exposing Digital Forgeries by Detecting Traces of Resampling</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Popescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Farid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Signal Processing</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="758" to="767" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Exposing Digital Forgeries in Color Filter Array Interpolated Images</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Popescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Farid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Signal Processing</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="3948" to="3959" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Exposing Digital Forgeries in Complex Lighting Environments</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Johnson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Farid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Infromation Forensics and Security</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="450" to="461" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">How Realistic is Photorealistic?</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lyu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Farid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Signal Processing</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="845" to="850" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">Physics-Motivated Features for Distinguishing Photographic Images and Computer Graphics</title>
		<author>
			<persName><forename type="first">T.-T</forename><surname>Ng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S. -F</forename><surname>Chang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M. -P</forename><surname>Tsui</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>ACM Multimedia</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Blind source camera identification</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kharrazi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">T</forename><surname>Sencar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Memon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ICIP</title>
				<meeting>of ICIP</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Source cell-phone identification</title>
		<author>
			<persName><forename type="first">O</forename><surname>Celiktutan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Avcibas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sankur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Memon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ADCOM</title>
				<meeting>of ADCOM</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Source camera identification based on CFA Interpolation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bayram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">T</forename><surname>Sencar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Memon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Avcibas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ICIP</title>
				<meeting>of ICIP</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Image based source camera identification using demosaicing</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Longand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Huang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of MMSP</title>
				<meeting>of MMSP</meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Source camera identification using footprints from lens aberration</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Choi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">Y</forename><surname>Lam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">K Y</forename><surname>Wong</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SPIE, Electronic Imaging</title>
				<meeting>of SPIE, Electronic Imaging<address><addrLine>San Jose, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Methods for Identification of Images Acquired with Digital Cameras</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">J</forename><surname>Geradts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bijhold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kieft</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kurusawa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kuroki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Saitoh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SPIE Electronic Imaging</title>
				<meeting>of SPIE Electronic Imaging<address><addrLine>San Jose, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Scanner identification with extension to forgery detection</title>
		<author>
			<persName><forename type="first">N</forename><surname>Khanna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">T C</forename><surname>Chiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Allebach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">J</forename><surname>Delp</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SPIE Electronic Imaging</title>
				<meeting>of SPIE Electronic Imaging<address><addrLine>San Jose, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Digital camera identification from sensor pattern noise</title>
		<author>
			<persName><forename type="first">J</forename><surname>Lukas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Goljan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Security and Forensics</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="205" to="214" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Determining image origin and integrity using sensor noise</title>
		<author>
			<persName><forename type="first">M</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Goljan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lukas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Security and Forensics</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="74" to="90" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Detecting digital image forgeries using sensor pattern noise</title>
		<author>
			<persName><forename type="first">J</forename><surname>Lukas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Goljan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SPIE Electronic Imaging</title>
				<meeting>of SPIE Electronic Imaging<address><addrLine>San Jose, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Fast Asymmetric Learning for Cascade Face Detection</title>
		<author>
			<persName><forename type="first">Jianxin</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Brubaker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Mullin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Rehg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Pattern Analysis and Machine Intelligence</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="369" to="382" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
