skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: AUSOME: authenticating social media images using frequency analysis
Ever since human society entered the age of social media, every user has had a considerable amount of visual content stored online and shared in variant virtual communities. As an efficient information circulation measure, disastrous consequences are possible if the contents of images are tampered with by malicious actors. Specifically, we are witnessing the rapid development of machine learning (ML) based tools like DeepFake apps. They are capable of exploiting images on social media platforms to mimic a potential victim without their knowledge or consent. These content manipulation attacks can lead to the rapid spread of misinformation that may not only mislead friends or family members but also has the potential to cause chaos in public domains. Therefore, robust image authentication is critical to detect and filter off manipulated images. In this paper, we introduce a system that accurately AUthenticates SOcial MEdia images (AUSOME) uploaded to online platforms leveraging spectral analysis and ML. Images from DALL-E 2 are compared with genuine images from the Stanford image dataset. Discrete Fourier Transform (DFT) and Discrete Cosine Transform (DCT) are used to perform a spectral comparison. Additionally, based on the differences in their frequency response, an ML model is proposed to classify social media images as genuine or AI-generated. Using real-world scenarios, the AUSOME system is evaluated on its detection accuracy. The experimental results are encouraging and they verified the potential of the AUSOME scheme in social media image authentications.  more » « less
Award ID(s):
2039342
PAR ID:
10485512
Author(s) / Creator(s):
; ;
Editor(s):
Wysocki, Bryant T.; Holt, James; Blowers, Misty
Publisher / Repository:
SPIE
Date Published:
Journal Name:
Proceedings Volume 12542, Disruptive Technologies in Information Sciences VII
ISSN:
0277-786X
ISBN:
9781510662001
Page Range / eLocation ID:
10
Subject(s) / Keyword(s):
Digital Media Authentication Discrete Fourier Transform (DFT) Discrete Cosine Transform (DCT) DALL-E 2 Deep Neural Networks (DNN)
Format(s):
Medium: X
Location:
Orlando, United States
Sponsoring Org:
National Science Foundation
More Like this
  1. With the growing ubiquity of the Internet and access to media-based social media platforms, the risks associated with media content sharing on social media and the need for safety measures against such risks have grown paramount. At the same time, risk is highly contextualized, especially when it comes to media content youth share privately on social media. In this work, we conducted qualitative content analyses on risky media content flagged by youth participants and research assistants of similar ages to explore contextual dimensions of youth online risks. The contextual risk dimensions were then used to inform semi- and self-supervised state-of-the-art vision transformers to automate the process of identifying risky images shared by youth. We found that vision transformers are capable of learning complex image features for use in automated risk detection and classification. The results of our study serve as a foundation for designing contextualized and youth-centered machine-learning methods for automated online risk detection. 
    more » « less
  2. Global social media use during natural disasters has been well documented (Murthy et al., 2017). In the U.S., public social media platforms are often a primary venue for those affected by disasters . Some disaster victims believe first responders will see their public posts and that the 9-1-1 telephone system becomes overloaded during crises. Moreover, some feel that the accuracy and utility of information on social media is likely higher than traditional media sources . However, sifting through content during a disaster is often difficult due to the high volume of ‘non-relevant’ content. In addition, text is studied more than images posted on Twitter, leaving a potential gap in understanding disaster experiences. Images posted on social media during disasters have a high level of complexity (Murthy et al., 2016). Our study responds to O’Neal et al.’s (2017) call-to-action that social media images posted during disasters should be studied using machine learning. 
    more » « less
  3. Social media is a routine part of every-day life for millions of people worldwide. How does engaging with social media shape enduring memories for that experience? This question is important given the popularity of certain types of content on social media platforms, such as content widely known as “fitspiration”. Two experiments involving 510 US adults (mean age = 36.82) examined memory for food and fitness-related social media images that individuals write comments about, as well as memory for other images in the context. We demonstrate that commenting on social media images boosts memory for them and weakly affects memory for conceptually related images in the same context. Exploratory analyses revealed correlations between self-reported disordered eating symptomology and effects of commenting on memory. These findings demonstrate that how people engage with social media has implications for the enduring memories of that content and may relate to behaviors and attitudes in offline lives, such as eating and body image. 
    more » « less
  4. Spectroscopic image data has provided molecular discrimination for numerous fields including: remote sensing, food safety and biomedical imaging. Despite the various technologies for acquiring spectral data, there remains a trade-off when acquiring data. Typically, spectral imaging either requires long acquisition times to collect an image stack with high spectral specificity or acquisition times are shortened at the expense of fewer spectral bands or reduced spatial sampling. Hence, new spectral imaging microscope platforms are needed to help mitigate these limitations. Fluorescence excitation-scanning spectral imaging is one such new technology, which allows more of the emitted signal to be detected than comparable emission-scanning spectral imaging systems. Here, we have developed a new optical geometry that provides spectral illumination for use in excitation-scanning spectral imaging microscope systems. This was accomplished using a wavelength-specific LED array to acquire spectral image data. Feasibility of the LED-based spectral illuminator was evaluated through simulation and benchtop testing and assessment of imaging performance when integrated with a widefield fluorescence microscope. Ray tracing simulations (TracePro) were used to determine optimal optical component selection and geometry. Spectral imaging feasibility was evaluated using a series of 6-label fluorescent slides. The LED-based system response was compared to a previously tested thin-film tunable filter (TFTF)-based system. Spectral unmixing successfully discriminated all fluorescent components in spectral image data acquired from both the LED and TFTF systems. Therefore, the LED-based spectral illuminator provided spectral image data sets with comparable information content so as to allow identification of each fluorescent component. These results provide proof-of-principle demonstration of the ability to combine output from many discrete wavelength LED sources using a double-mirror (Cassegrain style) optical configuration that can be further modified to allow for high speed, video-rate spectral image acquisition. Real-time spectral fluorescence microscopy would allow monitoring of rapid cell signaling processes (i.e., Ca2+and other second messenger signaling) and has potential to be translated to clinical imaging platforms. 
    more » « less
  5. As part of a Youth Advisory Board of teens (YAB), a longitudinal and interactive program to engage with teens for adolescent online safety research, we used an Asynchronous Remote Community (ARC) method with seven teens to explore their social media usage and perspectives on privacy on social media. There was a spectrum of privacy levels in our teen participants’ preferred social media platforms and preferences varied depending on their user goals such as content viewing and socializing. They recognized privacy risks they could encounter on social media, hence, actively used privacy features afforded by platforms to stay safe while meeting their goals. In addition, our teen participants designed solutions that can aid users to exercise more granular control over determining what information on their accounts is to be shared with which groups of users. Our findings highlight the need to ensure researchers and social media developers work with teens to provide teen-centric solutions for safer experiences on social media. 
    more » « less