{"id":723907,"date":"2021-02-06T18:16:19","date_gmt":"2021-02-07T02:16:19","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/?post_type=msr-research-item&#038;p=723907"},"modified":"2021-02-06T18:16:19","modified_gmt":"2021-02-07T02:16:19","slug":"multi-stakeholder-media-provenance-management-to-counter-synthetic-media-risks-in-news-publishing","status":"publish","type":"msr-research-item","link":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/publication\/multi-stakeholder-media-provenance-management-to-counter-synthetic-media-risks-in-news-publishing\/","title":{"rendered":"Multi-Stakeholder Media Provenance Management to Counter Synthetic Media Risks in News Publishing"},"content":{"rendered":"<p>The rise of indirect content distribution via third party social media platforms has<br \/>\nintroduced a new conduit for synthetic or manipulated content. That content purports to<br \/>\nbe legitimate news, or to come from legitimate news sources, and can present the<br \/>\nconsumer with apparent brand integrity markings, which convey authority.<\/p>\n<p>Three major global news organizations and a leading technology provider have come<br \/>\ntogether to demonstrate a mechanism to tackle this problem that can operate at scale. The<br \/>\nBBC, The New York Times Company, and CBC\/Radio\u2010Canada in cooperation with Microsoft<br \/>\nhave developed a proposed open standards approach which can be used by large and small<br \/>\nnews organizations to protect the provenance of news stories in audio\/visual\/textual<br \/>\nmedia.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rise of indirect content distribution via third party social media platforms has introduced a new conduit for synthetic or manipulated content. That content purports to be legitimate news, or to come from legitimate news sources, and can present the consumer with apparent brand integrity markings, which convey authority. Three major global news organizations and [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":null,"msr_publishername":"","msr_publisher_other":"","msr_booktitle":"","msr_chapter":"","msr_edition":"","msr_editors":"","msr_how_published":"","msr_isbn":"","msr_issue":"","msr_journal":"","msr_number":"","msr_organization":"","msr_pages_string":"","msr_page_range_start":"","msr_page_range_end":"","msr_series":"","msr_volume":"","msr_copyright":"","msr_conference_name":"International Broadcasting Convention (IBC)","msr_doi":"","msr_arxiv_id":"","msr_s2_paper_id":"","msr_mag_id":"","msr_pubmed_id":"","msr_other_authors":"","msr_other_contributors":"","msr_speaker":"","msr_award":"","msr_affiliation":"","msr_institution":"","msr_host":"","msr_version":"","msr_duration":"","msr_original_fields_of_study":"","msr_release_tracker_id":"","msr_s2_match_type":"","msr_citation_count_updated":"","msr_published_date":"2020-9-1","msr_highlight_text":"","msr_notes":"","msr_longbiography":"","msr_publicationurl":"","msr_external_url":"","msr_secondary_video_url":"","msr_conference_url":"","msr_journal_url":"","msr_s2_pdf_url":"","msr_year":0,"msr_citation_count":0,"msr_influential_citations":0,"msr_reference_count":0,"msr_s2_match_confidence":0,"msr_microsoftintellectualproperty":true,"msr_s2_open_access":false,"msr_s2_author_ids":[],"msr_pub_ids":[],"msr_hide_image_in_river":0,"footnotes":""},"msr-research-highlight":[],"research-area":[13558],"msr-publication-type":[193716],"msr-publisher":[],"msr-focus-area":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-723907","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_publishername":"","msr_edition":"","msr_affiliation":"","msr_published_date":"2020-9-1","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"","msr_chapter":"","msr_isbn":"","msr_journal":"","msr_volume":"","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":"","msr_related_uploader":[{"type":"url","viewUrl":"false","id":"false","title":"https:\/\/www.ibc.org\/technical-papers\/multi-stakeholder-media-provenance-management-to-counter-synthetic-media-risks-in-news-publishing\/6759.article","label_id":"243118","label":0}],"msr_citation_count":0,"msr_citation_count_updated":"","msr_s2_paper_id":"","msr_influential_citations":0,"msr_reference_count":0,"msr_arxiv_id":"","msr_s2_author_ids":[],"msr_s2_open_access":false,"msr_s2_pdf_url":null,"msr_attachments":[],"msr-author-ordering":[{"type":"text","value":"J. Aythora","user_id":0,"rest_url":false},{"type":"text","value":"R. Burke\u2010Ag\u00fcero","user_id":0,"rest_url":false},{"type":"edited_text","value":"A. Chamayou","user_id":38362,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=A. Chamayou"},{"type":"edited_text","value":"S. Clebsch","user_id":36368,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=S. Clebsch"},{"type":"edited_text","value":"M. Costa","user_id":32794,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=M. Costa"},{"type":"text","value":"N. Earnshaw","user_id":0,"rest_url":false},{"type":"text","value":"L. Ellis","user_id":0,"rest_url":false},{"type":"edited_text","value":"P. England","user_id":33226,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=P. England"},{"type":"edited_text","value":"C. Fournet","user_id":31819,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=C. Fournet"},{"type":"text","value":"M. Gaylor","user_id":0,"rest_url":false},{"type":"text","value":"C. Halford","user_id":0,"rest_url":false},{"type":"edited_text","value":"E. Horvitz","user_id":32033,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=E. Horvitz"},{"type":"text","value":"A. Jenks","user_id":0,"rest_url":false},{"type":"edited_text","value":"K. Kane","user_id":32554,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=K. Kane"},{"type":"text","value":"M. Lavallee","user_id":0,"rest_url":false},{"type":"text","value":"S. Lowenstein","user_id":0,"rest_url":false},{"type":"text","value":"B. MacCormack","user_id":0,"rest_url":false},{"type":"edited_text","value":"H. S. Malvar","user_id":32786,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=H. S. Malvar"},{"type":"text","value":"S. O&#39;Brien","user_id":0,"rest_url":false},{"type":"text","value":"J. Parnall","user_id":0,"rest_url":false},{"type":"text","value":"E. M. Redmiles","user_id":0,"rest_url":false},{"type":"edited_text","value":"A. Shamis","user_id":30941,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=A. Shamis"},{"type":"text","value":"I. Sharma","user_id":0,"rest_url":false},{"type":"edited_text","value":"J. W. Stokes","user_id":32427,"rest_url":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=J. W. Stokes"},{"type":"text","value":"S. Wenker","user_id":0,"rest_url":false},{"type":"text","value":"A. Zaman","user_id":0,"rest_url":false}],"msr_impact_theme":[],"msr_research_lab":[199561,199565],"msr_event":[],"msr_group":[381431],"msr_project":[634311],"publication":[],"video":[],"msr-tool":[],"msr_publication_type":"inproceedings","related_content":{"projects":[{"ID":634311,"post_title":"AMP - Authentication of Media via Provenance","post_name":"amp-authentication-of-media-via-provenance","post_type":"msr-project","post_date":"2020-01-31 18:53:40","post_modified":"2024-04-24 03:26:33","post_status":"publish","permalink":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/project\/amp-authentication-of-media-via-provenance\/","post_excerpt":"Advances in graphics and machine learning algorithms have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens democracies around the world by enabling widespread distribution of false information to billions of individuals via social media platforms, and by casting doubt on the veracity of all media. One approach to thwarting the flow of fake media is to detect modified or synthesized media via the use&hellip;","_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/634311"}]}}]},"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/723907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":1,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/723907\/revisions"}],"predecessor-version":[{"id":723910,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/723907\/revisions\/723910"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media?parent=723907"}],"wp:term":[{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=723907"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=723907"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=723907"},{"taxonomy":"msr-publisher","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-publisher?post=723907"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=723907"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=723907"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=723907"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=723907"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=723907"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=723907"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=723907"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=723907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}