Context Aggregation and Analysis: A Tool for User- Generated Video Verification
By Olga Papadopoulou, Dimitrios Giomelakis, Lazaros Apostolidis, Symeon Papadopoulos, Yiannis Kompatsiaris of CERTH-ITI. Dec 2019
On 21 September 2015 Jochen Spangenberg represented REVEAL in the session "News and User-Generated Content" at Prix Italia 2015. The panel discussed the impact of eyewitness media on the news business, what has changed in the past, and how to deal with respective challenges now and in the future. Here's Jochen's presentation - slightly adapted for public access.
View this ondemand webinar here: https://pages.bugcrowd.com/7-bug-bounty-myths-busted-ondemand-webinar
About the content:
Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this recorded webinar we will explore 7 myths about Bug Bounty programs, the hackers who are involved, and the impact they are having on the security posture of organizations around the world.
After viewing this presentation and ondemand webinar you will:
1. Learn if a bug bounty program is right for your organization
2. Understand if a bug bounty encourages hackers to attack your systems
3. Explore the real benefits of bug bounty programs – and find out if they actually work
4. Get insight on whether these programs are too hard and costly to manage
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
As an active security researcher with immense professional expertise in application security, Jason Haddix joins us to explain the common attack vectors that face today’s mobile applications -- from a hacker’s perspective.
On 21 September 2015 Jochen Spangenberg represented REVEAL in the session "News and User-Generated Content" at Prix Italia 2015. The panel discussed the impact of eyewitness media on the news business, what has changed in the past, and how to deal with respective challenges now and in the future. Here's Jochen's presentation - slightly adapted for public access.
View this ondemand webinar here: https://pages.bugcrowd.com/7-bug-bounty-myths-busted-ondemand-webinar
About the content:
Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this recorded webinar we will explore 7 myths about Bug Bounty programs, the hackers who are involved, and the impact they are having on the security posture of organizations around the world.
After viewing this presentation and ondemand webinar you will:
1. Learn if a bug bounty program is right for your organization
2. Understand if a bug bounty encourages hackers to attack your systems
3. Explore the real benefits of bug bounty programs – and find out if they actually work
4. Get insight on whether these programs are too hard and costly to manage
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
As an active security researcher with immense professional expertise in application security, Jason Haddix joins us to explain the common attack vectors that face today’s mobile applications -- from a hacker’s perspective.
Aggregating and Analyzing the Context of Social Media ContentSymeon Papadopoulos
Introduction to the Context Analysis and Aggregation service of InVID. Given at the Workshop on Content Verification Tools hosted by the journalists' association in Thessaloniki, Greece on June 6, 2018.
The InVID Plug-in: Web Video Verification on the BrowserInVID Project
Presentation of the paper "The InVID Plug-in: Web Video
Verification on the Browser" at the 1st Int. Workshop on Multimedia Verification (MuVer) that was hosted at the ACM Multimedia Conference, October 23 - 27, 2017 Mountain View, CA, USA.
Demo presentation of the MeVer tools for disinformation detection consists of Context aggregation and analysis, Image forensics, DeepFake detector, Near duplicate detection, Visual location estimation and Network analysis and visualization.
Presentation of the InVID tool for social media verificationInVID Project
Presentation of the InVID tool for social media verification through contextual analysis, at the Media Informatics Lab meeting on detection and verification of socially shared videos.
Video & AI: capabilities and limitations of AI in detecting video manipulationsVasileiosMezaris
Invited presentation given by Dr. Vasileios Mezaris during the Greek Media Literacy Week 2019; specifically, presented in the international conference on "Disinformation in Cyberspace: Media literacy meets Artificial Intelligence" that was organized as part of the Media Literacy Week 2019 in Athens, Greece, on November 15, 2019.
Techniques and Tools for fact-checking a presentation by Ochaya Jackson Amos in an online training session organised by 211 Check with support from the International Fact-checking Network (IFCN)
Video recommendations and Machine Learning by Jerónimo Macanas at Big Data Sp...Big Data Spain
A good content recommendation system is key for any video content provider. Machine Learning video recommendations provide a unique opportunity for broadcasters, Pay-TV operators, TV Networks, and any content distributor to increase engagement and reduce churn through content personalization.
https://www.bigdataspain.org/2017/talk/video-recommendations-and-machine-learning
Big Data Spain 2017
16th - 17th Kinépolis Madrid
The Black Hole of Video Analytics- KISSmetrics / Viddler WebinarViddler Inc.
Eric McClatchy, Marketing Manager of Viddler, presented a video analytics webinar for KISSmetrics.
"The Black Hole of Video Analytics" prevents your ability to relate your video analytics to your website goals and metrics, severely limiting the insights your video analytics can bring.
Topics Covered:
- What is the "Black Hole"
- How to Avoid the "Black Hole"
- Advanced video reports and charts
- Experiments to improve video effectiveness
Context Aggregation and Analysis: A tool for User-Generated Video VerificationOlga Papadopoulou
The uncontrolled dissemination of User-Generated Content (UGC) through social media and video platforms raises increasing concerns about the intentional or unintentional spread of misleading information. As a result, people who are turning to the Internet for their daily news, need tools that help them distinguish between reliable and unreliable content. Here we present the Context Aggregation and Analysis tool, with the aim to facilitate the investigation of the veracity of User-Generated videos (UGVs). The tool collects and calculates a set of verification cues based on the video context, that is the information surrounding the video rather than the video itself, and then creates a verification report. The cues include information about the video and user that posted it, as well as the activity of other users surrounding it (what we call 'wisdom of the crowd'), cross-checking with previous cases of fakes ('wisdom of the past'), and employing machine learning systems trained on past cases of real and fake videos ('wisdom of the machine'). We evaluate the tool in two ways: i) we carry out a user study where end users are manually assessing the tool's features on a set of UGVs from a real-world dataset of news-related videos, and ii) we quantitatively evaluate the automatic verification component of the tool. The tool assisted successfully with the debunking of 132 out of 200 fake videos, the verification of 142 out of 180 real videos and the performance of the classifiers reached an F-score of 0.72.
Publishers and video: What we know and what we don'tParse.ly
With video starting to take over readers' news feeds, many publishers have also made it a priority for editorial strategy. What’s your plan when it comes producing and distributing video content? Watch this recording to hear from two publishers that have prioritized video as part of their overall content strategy. They will share with us what they've learned thus far and what they are still figuring out.
Speakers:
- Travis Bernard, Director of Audience Development, TechCrunch
- Annie Lennon Carroll, General Manager, Video, AT Media (Apartment Therapy, The Kitchn)
- Sachin Kamdar, CEO, Parse.ly
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxraju957290
MN502 Overview of Network Security Page 6 of 6
Assessment Details and Submission Guidelines
Unit Code
MN502
Unit Title
Overview of Network Security
Assessment Type
Individual Assessment
Assessment Title
Demonstration of a network security tool
Purpose of the assessment (with ULO Mapping)
a) Discuss common threats and attacks on networked information systems
b) Identify most common intrusion detection attacks, and discuss how to prevent them
c) Apply skills to analyse complex problems in network security under supervision
Weight
15%
Total Marks
20
Word limit
Not Applicable
Due Date
W Week 7
Submission Guidelines
· All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
· If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
· Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For further information, please refer to the Academic Integrity Section in your Unit Description.
Assessment Cover Sheet
Student ID:
Student Surname:
Given Name:
Course:
School:
Unit Code:
Unit Title:
Due Date:
Date Submitted:
Campus:
Lecturer:
Tutor:
All work must be submitted on Moodle by the due date. If an extension of time to submit work is required, a Special Consideration Application must be submitted. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For fu ...
This presentation shows how network visualization technology can be used to identify fraud. Fraud almost always involves the fabrication of a connection, so using KeyLines to highlight and understand those connections makes fraud detection more effective and efficient
Presentation / invited talk by Kalina Bontcheva at Digilience 2019, Oct 2019Weverify
Presentation "WEVERIFY: ASSISTIVE AI TOOLS FOR ANALYSING FALSE CONTENT, DISINFORMATION FLOWS, AND ONLINE INFLUENCE CAMPAIGNS". By Kalina Bontcheva. Oct 2019.
While the use of Data Analytics produces excellent results, they’re commonly applied in a tactical way for specific functional areas within an organization. This tactical approach often falls short of realizing the full potential of Data Analytics. Going beyond initial results, a more systematic approach to Data Analytics can help drive organizational learning (human and machine) from the various remediation processes.
In this Webinar, we’ll discuss 3 areas of Analytics Automation: (1) Producing the findings, (2) Managing the findings, and (3) Learning from the findings.
Key takeaways:
· The value of Analytics Automation
· Understanding the various technologies (i.e. RPA, AI, etc.)
· Practical ideas for deploying and managing Analytics Automation
· Using a more structured approach to remediation exceptions
· Benefits of Root Cause Analysis
· Using Analytics Automation to get a broader, more complete view of your organization over time
A presentation I did in Summer 2015 to Nespresso's HQ Marketing Department to explain in simple words how video is produced, edited and distributed on the web.
(Open in slideshare for notes and links!)
TTO2021: Cross-Lingual Rumour Stance Classification: a First Study with BERT...Weverify
By Carolina Scarton. Presentation at the Truth and Trust Online Conference (TTO 2021). Link: https://truthandtrustonline.com/wp-content/uploads/2021/10/TTO2021_paper_31.pdf
More Related Content
Similar to Context Aggregation and Analysis: A Tool for User- Generated Video Verification. By Olga Papadopoulou et al
Aggregating and Analyzing the Context of Social Media ContentSymeon Papadopoulos
Introduction to the Context Analysis and Aggregation service of InVID. Given at the Workshop on Content Verification Tools hosted by the journalists' association in Thessaloniki, Greece on June 6, 2018.
The InVID Plug-in: Web Video Verification on the BrowserInVID Project
Presentation of the paper "The InVID Plug-in: Web Video
Verification on the Browser" at the 1st Int. Workshop on Multimedia Verification (MuVer) that was hosted at the ACM Multimedia Conference, October 23 - 27, 2017 Mountain View, CA, USA.
Demo presentation of the MeVer tools for disinformation detection consists of Context aggregation and analysis, Image forensics, DeepFake detector, Near duplicate detection, Visual location estimation and Network analysis and visualization.
Presentation of the InVID tool for social media verificationInVID Project
Presentation of the InVID tool for social media verification through contextual analysis, at the Media Informatics Lab meeting on detection and verification of socially shared videos.
Video & AI: capabilities and limitations of AI in detecting video manipulationsVasileiosMezaris
Invited presentation given by Dr. Vasileios Mezaris during the Greek Media Literacy Week 2019; specifically, presented in the international conference on "Disinformation in Cyberspace: Media literacy meets Artificial Intelligence" that was organized as part of the Media Literacy Week 2019 in Athens, Greece, on November 15, 2019.
Techniques and Tools for fact-checking a presentation by Ochaya Jackson Amos in an online training session organised by 211 Check with support from the International Fact-checking Network (IFCN)
Video recommendations and Machine Learning by Jerónimo Macanas at Big Data Sp...Big Data Spain
A good content recommendation system is key for any video content provider. Machine Learning video recommendations provide a unique opportunity for broadcasters, Pay-TV operators, TV Networks, and any content distributor to increase engagement and reduce churn through content personalization.
https://www.bigdataspain.org/2017/talk/video-recommendations-and-machine-learning
Big Data Spain 2017
16th - 17th Kinépolis Madrid
The Black Hole of Video Analytics- KISSmetrics / Viddler WebinarViddler Inc.
Eric McClatchy, Marketing Manager of Viddler, presented a video analytics webinar for KISSmetrics.
"The Black Hole of Video Analytics" prevents your ability to relate your video analytics to your website goals and metrics, severely limiting the insights your video analytics can bring.
Topics Covered:
- What is the "Black Hole"
- How to Avoid the "Black Hole"
- Advanced video reports and charts
- Experiments to improve video effectiveness
Context Aggregation and Analysis: A tool for User-Generated Video VerificationOlga Papadopoulou
The uncontrolled dissemination of User-Generated Content (UGC) through social media and video platforms raises increasing concerns about the intentional or unintentional spread of misleading information. As a result, people who are turning to the Internet for their daily news, need tools that help them distinguish between reliable and unreliable content. Here we present the Context Aggregation and Analysis tool, with the aim to facilitate the investigation of the veracity of User-Generated videos (UGVs). The tool collects and calculates a set of verification cues based on the video context, that is the information surrounding the video rather than the video itself, and then creates a verification report. The cues include information about the video and user that posted it, as well as the activity of other users surrounding it (what we call 'wisdom of the crowd'), cross-checking with previous cases of fakes ('wisdom of the past'), and employing machine learning systems trained on past cases of real and fake videos ('wisdom of the machine'). We evaluate the tool in two ways: i) we carry out a user study where end users are manually assessing the tool's features on a set of UGVs from a real-world dataset of news-related videos, and ii) we quantitatively evaluate the automatic verification component of the tool. The tool assisted successfully with the debunking of 132 out of 200 fake videos, the verification of 142 out of 180 real videos and the performance of the classifiers reached an F-score of 0.72.
Publishers and video: What we know and what we don'tParse.ly
With video starting to take over readers' news feeds, many publishers have also made it a priority for editorial strategy. What’s your plan when it comes producing and distributing video content? Watch this recording to hear from two publishers that have prioritized video as part of their overall content strategy. They will share with us what they've learned thus far and what they are still figuring out.
Speakers:
- Travis Bernard, Director of Audience Development, TechCrunch
- Annie Lennon Carroll, General Manager, Video, AT Media (Apartment Therapy, The Kitchn)
- Sachin Kamdar, CEO, Parse.ly
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxraju957290
MN502 Overview of Network Security Page 6 of 6
Assessment Details and Submission Guidelines
Unit Code
MN502
Unit Title
Overview of Network Security
Assessment Type
Individual Assessment
Assessment Title
Demonstration of a network security tool
Purpose of the assessment (with ULO Mapping)
a) Discuss common threats and attacks on networked information systems
b) Identify most common intrusion detection attacks, and discuss how to prevent them
c) Apply skills to analyse complex problems in network security under supervision
Weight
15%
Total Marks
20
Word limit
Not Applicable
Due Date
W Week 7
Submission Guidelines
· All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
· If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
· Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For further information, please refer to the Academic Integrity Section in your Unit Description.
Assessment Cover Sheet
Student ID:
Student Surname:
Given Name:
Course:
School:
Unit Code:
Unit Title:
Due Date:
Date Submitted:
Campus:
Lecturer:
Tutor:
All work must be submitted on Moodle by the due date. If an extension of time to submit work is required, a Special Consideration Application must be submitted. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For fu ...
This presentation shows how network visualization technology can be used to identify fraud. Fraud almost always involves the fabrication of a connection, so using KeyLines to highlight and understand those connections makes fraud detection more effective and efficient
Presentation / invited talk by Kalina Bontcheva at Digilience 2019, Oct 2019Weverify
Presentation "WEVERIFY: ASSISTIVE AI TOOLS FOR ANALYSING FALSE CONTENT, DISINFORMATION FLOWS, AND ONLINE INFLUENCE CAMPAIGNS". By Kalina Bontcheva. Oct 2019.
While the use of Data Analytics produces excellent results, they’re commonly applied in a tactical way for specific functional areas within an organization. This tactical approach often falls short of realizing the full potential of Data Analytics. Going beyond initial results, a more systematic approach to Data Analytics can help drive organizational learning (human and machine) from the various remediation processes.
In this Webinar, we’ll discuss 3 areas of Analytics Automation: (1) Producing the findings, (2) Managing the findings, and (3) Learning from the findings.
Key takeaways:
· The value of Analytics Automation
· Understanding the various technologies (i.e. RPA, AI, etc.)
· Practical ideas for deploying and managing Analytics Automation
· Using a more structured approach to remediation exceptions
· Benefits of Root Cause Analysis
· Using Analytics Automation to get a broader, more complete view of your organization over time
A presentation I did in Summer 2015 to Nespresso's HQ Marketing Department to explain in simple words how video is produced, edited and distributed on the web.
(Open in slideshare for notes and links!)
Similar to Context Aggregation and Analysis: A Tool for User- Generated Video Verification. By Olga Papadopoulou et al (20)
TTO2021: Cross-Lingual Rumour Stance Classification: a First Study with BERT...Weverify
By Carolina Scarton. Presentation at the Truth and Trust Online Conference (TTO 2021). Link: https://truthandtrustonline.com/wp-content/uploads/2021/10/TTO2021_paper_31.pdf
Operation-wise Attention Network for Tampering Localization Fusion.Weverify
In this work, we present a deep learning-based approach for image tampering localization fusion. This approach is designed to combine the outcomes of multiple image forensics algorithms and provides a fused tampering localization map, which requires no expert knowledge and is easier to interpret by end users. Our fusion framework includes a set of five individual tampering localization methods for splicing localization on JPEG images. The proposed deep learning fusion model is an adapted architecture, initially proposed for the image restoration task, that performs multiple operations in parallel, weighted by an attention mechanism to enable the selection of proper operations depending on the input signals. This weighting process can be very beneficial for cases where the input signal is very diverse, as in our case where the output signals of multiple image forensics algorithms are combined. Evaluation in three publicly available forensics datasets demonstrates that the performance of the proposed approach is competitive, outperforming the individual forensics techniques as well as another recently proposed fusion framework in the majority of cases.
DETECTING AND VERIFYING ONLINE DISINFORMATION:
HOW NLP AND DATA ANALYSIS CAN HELP.
By Carolina Scarton
Youtube link: https://www.youtube.com/watch?v=JPq3WFhbgsY
LIMITS AND RISKS OF USING AI FOR FACT-CHECKING:
QUESTIONS OF EFFECTIVENESS AND LEGALITY OF AI-DRIVEN DISINFORMATION DETECTION AND MODERATION.
EDMO workshop.
By Kalina Bontcheva
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Context Aggregation and Analysis: A Tool for User- Generated Video Verification. By Olga Papadopoulou et al
1. Context Aggregation and Analysis: A Tool for User-
Generated Video Verification
Olga Papadopoulou, Dimitrios Giomelakis, Lazaros Apostolidis,
Symeon Papadopoulos, Yiannis Kompatsiaris
Journalism department of AUTH
12 December 2019
2. CERTH was established in 2000
• 5 institutes, >700 employees (ITI is the largest with >300 employees)
• 1200 projects, 1100 international collaborations
• Among top-10 EU institutions in attracting competitive research projects
MKLab is among the biggest ITI labs with >60 researchers (20+ post-docs)
• Key areas: multimedia, social media, computer vision, data mining, machine
learning
• Since 2003, involved in more than 60 research projects and published >600
research papers
MeVer is a team that develops technologies and services for the detection of media-
based disinformation - https://mever.iti.gr/web/
• Datasets - https://mever.iti.gr/web/resources/
• Services - https://mever.iti.gr/web/resources/
• Context Aggregation and Analysis
• Near duplicate detection
• Image forensics
Follow us https://twitter.com/meverteam
MeVer @ MKLab - CERTH-ITI
3. InVID – WeVerify Plugin
https://weverify.eu/verification-plugin/
>17.000 users all over the world
CAA is integrated as component of the Verification plugin (Analysis)
4. User generated videos
Staged
Reuse
Tampered
Croatia right now - Fifa World
Cup Final 2018
$250,000 car gets windshield SMASHED
by kid on a skateboard!!!
https://www.youtube.com/watch?v=VBa4D9D6Gng
Lion Takes Revenge On Trophy Hunter!
https://www.youtube.com/watch?v=l7yt-VPYtOA
https://www.youtube.com/watch?v=l7yt-VPYtOA
5. Context Aggregation and Analysis
Platform APIs
CAA
COMPONENTS
Verification
report
https://caa.iti.gr
A tool that aims to facilitate the verification of user-generated
videos.
Provide URL Start Verification
6. Video and account metadata
Metadata about the video and the source
that posted the video:
• Video title
• Video description
• Create time
• …..
• Mentioned locations – extracted
by the text (title, description)
• Channel name
• Channel creation time
7. Video Comments
1. All comments left below the video
2. Verification comments – filtered by a list of
predefined verification related keywords
helpful for verification
3. Link comments, comments that contain
links to external sources
4. Free text comments, the user can provide
his/her own keyword and create subset
8. Reverse image search
The video thumbnails as returned by the
Platform APIs
Buttons for applying reverse image search
are included below each thumbnail for:
1. Google reverse image search
2. Yandex reverse image search
9. Twitter timeline
• Tweets sharing the URL of the video in
question are collected and visualized in
a timeline.
• The red line indicates the time that the
video was posted.
• Clicking on each box (tweet) the text of
the tweet appears along with a link to
the Tweet Verification Assistant ‘check
tweet veracity’ which extracts a score
indicating the tweet credibility.
10. Verification AI score
A score in the range of [0 1].
The higher the score the less credible the
video is.
The score is extracted using a machine
learning method. Although it is helpful,
indicator the accuracy of the algorithm is
~70% so it should be considered for the
verification process but the user should
not leverage only on it for the final result.
12. Twitter Timeline
Twitter timeline:
The tweets sharing the submitted video URL for YouTube and Facebook
videos.
The retweets of a submitted Twitter video.
A tweet is posted couple of hours
after the Video was shared on
YouTube (redline) and explains that
the claim of ISIS being the
target of the bombing is false.
Claim: Bombing over ISIS area
13. User Study
Tasks:
Debunking the 200 fake videos of the FVC
Verifying the 180 real videos of the FVC
Users:
A male with journalistic background
A female with computer engineering
background
Procedure:
1. Submit a video URL to the tool
2. Check and analyse the produced verification report
3. Decide about the video veracity
4. Record the results and the time spent on the task
Labels:
True: If a fake/real video is debunked/verified
False: if the debunking or veryfying of a fake/real video fails
Uncertain: there are indicators that create doubts about the
video credibility but there is no concrete evidence proving that the
video is fake or real.
Is Debunked # videos Time (sec)
True 132 208
False 46 272
Uncertain 22 270
~70% of the fake videos
were succesfully debunked
Is Verified # videos
True 140
False 29
Uncertain 11
~80% of the real videos
were succesfully verified
14. Report Results
1. Start Timer – Don’t forget to stop it when the
verification process is completed
2. Select the Verification Label
3. How certain are you for the Verification Label
4. Verification Features
5. Description: a free text description of the
procedure that you followed to verify the video
6. Submit
https://caa.iti.gr/annotation/
15. Thank you for your attention!
https://caa.iti.gr
https://twitter.com/meverteam
Follow us on Twitter:
Media Verification team website
https://mever.iti.gr/web/
Contact us: Olga Papadopoulou - olgapapa@iti.gr
Symeon Papadopoulos – papadop@iti.gr