{"id":723907,"date":"2021-02-06T18:16:19","date_gmt":"2021-02-07T02:16:19","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&p=723907"},"modified":"2021-02-06T18:16:19","modified_gmt":"2021-02-07T02:16:19","slug":"multi-stakeholder-media-provenance-management-to-counter-synthetic-media-risks-in-news-publishing","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/multi-stakeholder-media-provenance-management-to-counter-synthetic-media-risks-in-news-publishing\/","title":{"rendered":"Multi-Stakeholder Media Provenance Management to Counter Synthetic Media Risks in News Publishing"},"content":{"rendered":"

The rise of indirect content distribution via third party social media platforms has
\nintroduced a new conduit for synthetic or manipulated content. That content purports to
\nbe legitimate news, or to come from legitimate news sources, and can present the
\nconsumer with apparent brand integrity markings, which convey authority.<\/p>\n

Three major global news organizations and a leading technology provider have come
\ntogether to demonstrate a mechanism to tackle this problem that can operate at scale. The
\nBBC, The New York Times Company, and CBC\/Radio\u2010Canada in cooperation with Microsoft
\nhave developed a proposed open standards approach which can be used by large and small
\nnews organizations to protect the provenance of news stories in audio\/visual\/textual
\nmedia.<\/p>\n","protected":false},"excerpt":{"rendered":"

The rise of indirect content distribution via third party social media platforms has introduced a new conduit for synthetic or manipulated content. That content purports to be legitimate news, or to come from legitimate news sources, and can present the consumer with apparent brand integrity markings, which convey authority. Three major global news organizations and […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"msr-content-type":[3],"msr-research-highlight":[],"research-area":[13558],"msr-publication-type":[193716],"msr-product-type":[],"msr-focus-area":[],"msr-platform":[],"msr-download-source":[],"msr-locale":[268875],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-723907","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_publishername":"","msr_edition":"","msr_affiliation":"","msr_published_date":"2020-9-1","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"","msr_chapter":"","msr_isbn":"","msr_journal":"","msr_volume":"","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":"","msr_related_uploader":[{"type":"url","viewUrl":"false","id":"false","title":"https:\/\/www.ibc.org\/technical-papers\/multi-stakeholder-media-provenance-management-to-counter-synthetic-media-risks-in-news-publishing\/6759.article","label_id":"243118","label":0}],"msr_attachments":[],"msr-author-ordering":[{"type":"text","value":"J. Aythora","user_id":0,"rest_url":false},{"type":"text","value":"R. Burke\u2010Ag\u00fcero","user_id":0,"rest_url":false},{"type":"edited_text","value":"A. Chamayou","user_id":38362,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=A. Chamayou"},{"type":"edited_text","value":"S. Clebsch","user_id":36368,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=S. Clebsch"},{"type":"edited_text","value":"M. Costa","user_id":32794,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=M. Costa"},{"type":"text","value":"N. Earnshaw","user_id":0,"rest_url":false},{"type":"text","value":"L. Ellis","user_id":0,"rest_url":false},{"type":"edited_text","value":"P. England","user_id":33226,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=P. England"},{"type":"edited_text","value":"C. Fournet","user_id":31819,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=C. Fournet"},{"type":"text","value":"M. Gaylor","user_id":0,"rest_url":false},{"type":"text","value":"C. Halford","user_id":0,"rest_url":false},{"type":"edited_text","value":"E. Horvitz","user_id":32033,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=E. Horvitz"},{"type":"text","value":"A. Jenks","user_id":0,"rest_url":false},{"type":"edited_text","value":"K. Kane","user_id":32554,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=K. Kane"},{"type":"text","value":"M. Lavallee","user_id":0,"rest_url":false},{"type":"text","value":"S. Lowenstein","user_id":0,"rest_url":false},{"type":"text","value":"B. MacCormack","user_id":0,"rest_url":false},{"type":"edited_text","value":"H. S. Malvar","user_id":32786,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=H. S. Malvar"},{"type":"text","value":"S. O'Brien","user_id":0,"rest_url":false},{"type":"text","value":"J. Parnall","user_id":0,"rest_url":false},{"type":"text","value":"E. M. Redmiles","user_id":0,"rest_url":false},{"type":"edited_text","value":"A. Shamis","user_id":30941,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=A. Shamis"},{"type":"text","value":"I. Sharma","user_id":0,"rest_url":false},{"type":"edited_text","value":"J. W. Stokes","user_id":32427,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=J. W. Stokes"},{"type":"text","value":"S. Wenker","user_id":0,"rest_url":false},{"type":"text","value":"A. Zaman","user_id":0,"rest_url":false}],"msr_impact_theme":[],"msr_research_lab":[199561,199565],"msr_event":[],"msr_group":[381431],"msr_project":[634311],"publication":[],"video":[],"download":[],"msr_publication_type":"inproceedings","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/723907"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/723907\/revisions"}],"predecessor-version":[{"id":723910,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/723907\/revisions\/723910"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=723907"}],"wp:term":[{"taxonomy":"msr-content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-content-type?post=723907"},{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=723907"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=723907"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=723907"},{"taxonomy":"msr-product-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-product-type?post=723907"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=723907"},{"taxonomy":"msr-platform","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-platform?post=723907"},{"taxonomy":"msr-download-source","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-download-source?post=723907"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=723907"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=723907"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=723907"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=723907"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=723907"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=723907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}