Professional Documents
Culture Documents
A Sentiment and Review Analysis Based News Reliability Ranking Platform
A Sentiment and Review Analysis Based News Reliability Ranking Platform
A Sentiment and Review Analysis Based News Reliability Ranking Platform
Muhammad Talal………….L16-4047
Obaid Ur Rehman…………L16-4062
Syed Ahmad Saeed..………L16-4264
Date: 03/06/2020
Student 1
Name: Muhammad Talal
Signature: _______________________
Student 2
Name: Obaid Ur Rehman
Signature: _______________________
Student 3
Name: Syed Ahmad Saeed
Signature: _______________________
Table of Contents i
Table of Contents
Table of Contents .................................................................................................................... i
List of Tables .........................................................................................................................ii
List of Figures .......................................................................................................................iii
Abstract ...................................................................................................................................... 1
Introduction .............................................................................................................. 2
Goals and Objectives ....................................................................................................... 2
Scope of the Project ......................................................................................................... 2
Literature Survey / Related Work ............................................................................ 4
Text Classification ........................................................................................................... 4
Image Manipulation Detection ........................................................................................ 7
Requirements and Design ........................................................................................ 9
Functional Requirements ................................................................................................. 9
Non-Functional Requirements ......................................................................................... 9
Hardware and Software Requirements .......................................................................... 10
System Architecture ....................................................................................................... 10
Architectural Strategies .................................................................................................. 13
Use Cases ....................................................................................................................... 14
GUI ................................................................................................................................ 21
Database Design............................................................................................................. 23
System Requirements..................................................................................................... 24
Design Considerations ................................................................................................. 25
Development Methods ................................................................................................. 25
Class diagram ............................................................................................................... 26
Sequence diagram ........................................................................................................ 27
Policies and Tactics...................................................................................................... 37
Implementation and Test Cases ............................................................................. 39
Implementation .............................................................................................................. 39
Test Case Design and Description ................................................................................. 42
Test Metrics ................................................................................................................... 62
Experimental Results and Analysis ........................................................................ 63
Text Classifier Results and Analysis ............................................................................. 63
Image Tamper Detection Results and Analysis ............................................................. 65
Conclusion.............................................................................................................. 66
References ................................................................................................................................ 67
List of Tables ii
List of Tables
Table 1: Data Dictionary Table................................................................................................ 23
Table 2: Component ID and Name Mapping ........................................................................... 43
Table 3: Test Case ID and Name Mapping .............................................................................. 43
Table 4: Model Accuracies ...................................................................................................... 63
Table 5: Model Precision Values ............................................................................................. 64
Table 6: Model Recall Rate ..................................................................................................... 64
Table 7: Tamper Detection Model Performance ..................................................................... 65
List of Figures iii
List of Figures
Figure 1: Architecture of TI-CNN ............................................................................................. 4
Figure 2: CNN Architecture for Image Splicing Detection ....................................................... 7
Figure 3: System Architecture ................................................................................................. 12
Figure 4: Login Screen............................................................................................................. 21
Figure 5: User Register Screen ................................................................................................ 21
Figure 6: News Article Feed Screen ........................................................................................ 22
Figure 7: News Articles Details ............................................................................................... 22
Figure 8: ER Diagram .............................................................................................................. 23
Figure 9: Class Diagram .......................................................................................................... 26
Figure 10: User Login Sequence Diagram............................................................................... 27
Figure 11: User Register Sequence Diagram ........................................................................... 28
Figure 12: Show News Articles List Sequence Diagram......................................................... 29
Figure 13: View Article Details Sequence Diagram................................................................ 30
Figure 14: Post Comment Sequence Diagram ......................................................................... 31
Figure 15: Rate an Article Sequence Diagram ........................................................................ 32
Figure 16: Changing the Password Sequence Diagram ........................................................... 33
Figure 17: Posting a News Article ........................................................................................... 34
Figure 18: Resetting the Password ........................................................................................... 35
Figure 19: Updating the Profile ............................................................................................... 36
Figure 20: Viewing the Profile ................................................................................................ 37
A Sentiment and Review Analysis based News Reliability Ranking Platform 1
Abstract
In the current digital era, fake news dissemination has been one of the major problems. The
prevalence of digital news sources and social media has accelerated the spread of fake news on
the internet, moreover with common use of image editing software, fake news images are also
very common. The purpose of the project is to make an automated news classification and
ranking system that scrapes news articles from multiple online web sources and classifies and
ranks them on the basis of their authenticity. The project uses Computer Vision, Natural
Language Processing and Deep Learning techniques to classify and rank news articles. The
main parts of a news article are its text content and the image data in the article, our system
takes both features into account for ranking a given news article. FakeNewsNet dataset has
been used to train the text classification model and a synthetic dataset for image tamper
detection. The approach taken for classifying news text uses a 1D-CNN with an attention
mechanism that uses the article text (headline and body) and source features, the system is able
to classify text articles with good accuracy and precision. The image tamper detection model
is a Faster-RCNN network fine-tuned for tamper detection task. The image tamper detection
model is able to detect tampered images with good performance on various evaluation datasets
and human tampered images. The system uses the score from both of these models to robustly
rank the news articles. A web application is also developed to provide an interface to users so
that they can easily read reliable news articles which are ranked and checked by our system.
An automated system like this could potentially mitigate the spread of fake news and allow
people to easily read news with minimal fact checking.
Introduction 2
Introduction
With the rise of internet and social media, digital news sources are rapidly becoming the most
dominant source of information. This in turn has also given rise to fake and misleading
information like biased articles or clickbait content. The trend of fake news in the recent times
has had a major impact on misleading the masses. Moreover, the increasing availability of
image editing tools like photoshop, GIMP etc. image tempering has become common and this
technique is often used by news sources to create fake evidence images. Fake news has
therefore become a huge issue in recent times.
The purpose of the project is to minimize the impact brought upon by fake news content. We
have used artificial intelligence techniques like Natural Language Processing (NLP), Deep
Learning and Computer Vision to identify and rank news articles from multiple news sources
over the web, based on their authenticity. We have performed sentiment analysis of news
article’s text in order to decide whether an article text seems authentic or not, moreover, we
have also incorporated Computer Vision techniques to analyze images to recognize
tempered/forged images used in articles which could further help verify the authenticity of the
news article.
Such a platform that can be potentially immune to fake news and eliminates bias can prove to
be a great news medium. The goal is to create a platform that collects news from sources over
the web in real time and assign a reliability rank and promote news that seems to be authentic.
Such a platform could potentially mitigate the misleading culture of fake news.
The first section gives the introduction of the project including scope and main objectives.
Second chapter gives the detailed literature review. Third chapter covers the requirements and
design specifications of the system. The fourth chapter describes the implementation. Fifth
chapter gives the final conclusion.
2. Implement a model to classify and rank authentic and false news articles.
3. Analyse image data within news articles to identify forged and tampered news images.
4. Maintain an update a reliability rank of sources based upon previous articles to help in
identifying possible misleading news.
5. Provide a platform for users, which allows them to read and discuss reliable news.
• Create a deep learning model to classify news articles using their text content and image
data.
• Cross match facts among similar news articles from different sources to filter
anomalous and deviant news articles.
• Create a platform for users to view, interact and post latest news according to the
ranking assigned by the proposed system.
Literature Survey / Related Work 4
Text Classification
For text classification, main methods used are using deep neural networks, which includes
sequence models or convolution neural network. Moreover, machine learning techniques such
as logistic regression are also used in the previous researches. Language modeling techniques
are also used in classification. The following section describes previous researches on fake
news classification.
Negative Log Likelihood is used as loss function and RMSprop is used as an optimizer. The
experiments show precision value of 0.9220, recall rate of 0.9277 and F1-score of 0.9210.
The system proposed in [2] uses speaker profiles incorporated with attention-based LSTM
model. Adding a speaker profile greatly improved the accuracy of the model. Linguistic limited
approach is not enough for the fake news detection as it is media/topic dependent hence it
reduces scalability. There are 2 LSTM cells used. 1st cell is used for the retrieval of the
representation of the news article and the second cell is used for the vector representation of
the speaker profile. Two attention factors are constructed using speaker profile. first cell
accommodates the speaker profile while the second one accommodates information about
topics of the news articles. The two representations obtained from both cells are then chained
together in the soft-max function for classification. Evaluations are performed using the LIAR
dataset [23]. There is a total of 12836 short statements in the dataset and a total of 3341 speakers
which wraps a total of 141 topics from politifact.com. Each news includes text content as well
as speaker’s information. The experiment was conducted using different combinations of the
speaker profile attributes. Inclusion of Credit history in evaluation gave an improvement in
accuracy by 3%. Location of speaker along with job title and party affiliation gave more
improvement (2.3%). When all attributes were incorporated in evaluation the performance
surged to over 40% in accuracy as compared to basic LSTM model with net increase of 14.5%
in accuracy.
Method discussed in [3] uses hybrid deep learning model which uses features from 3 major
characteristics of a news article, which are article text, source and user information for
automated classification of news articles. CSI is and abbreviation for Capture Score and
Integrate, these are the three modules working the neural network model. In the capture
module, a RNN learns the feature for representing the articles. The second module known as
score module uses a fully connected neural network that takes user features as an input and
outputs a resultant score vector for the users. Integrate module combines the resultant feature
vectors from capture and score module and uses that vector to classify the news article. The
dataset used contains articles from Twitter and Weibu [4], contains article’s textual data as well
as information about user engagements. CSI model achieved an accuracy of 0.892 and F1-
Score of 0.894 on Twitter articles and an accuracy of 0.953 and F1-Score of 0.954.
worked exceptionally well. Logistic Regression had an accuracy of more than 99% while
harmonic BLC had an accuracy of 99.4%.
classification power of the several classic models have been evaluated using three basic types
of features in [6]. The dataset had of 2282 labeled BuzzFeed news articles with comment,
shares and Facebook post reactions related to the elections of 2016 in the United States of
America extracted from Buzzface [24]. Main features used for the detection of fake news
articles were: news content features, features extracted from the sources of news articles, and
the environment features such as user engagement. a model was trained for each classifier from
a set of labeled datasets, and later then used for classifying whether an article is fake or real.
The best results were obtained by Random Forest and XGB classifiers with 0.85 (± 0.007) and
0.86 (± 0.006) for AUC, respectively.
is not required by the system. The Exchangeable image file format (EXIF) features are used a
supervisory signal in training the classifier. A separate classifier is learned for each EXIF tag
and all the classifiers are combined to calculate the self-consistency of an image with its EXIF
metadata. The whole image is divided into patches of resolution 128x128, then Siamese Neural
Network is used to predict the probability that a given path is consistent with the EXIF features
of the image. The network outputs 4096-dimensional feature vectors, these vectors are
concatenated and passed through a Multi-Layer-Perceptron network with 4 layers, this network
predicts the probability that all the patches share the same value for each metadata attribute.
The network is trained with image patches randomly sampled from 400,000 Flickr photos.
After calculating consistency for each patch, overall consistency is computed for the image.
Five datasets were used for evaluation Columbia dataset [27], Carvalho et al. [19], Realistic
Tampering [20], Images scraped from The Onion and Reddit Photoshop Battles, In-the-Wild
forensics dataset [18] and dataset of Hays and Efros [21]. The model had the highest result on
each data set except one. In Columbia dataset method achieved 94% accuracy, in Carvalho
dataset accuracy was 64% and in Hays, accuracy was 65% and 59% in In-the-Wild dataset.
From the literature survey it can be seen that supervised deep learning techniques provide better
results, the self-supervised techniques also provide promising results however, in real world
news article images meta data is not present. Hence, supervised techniques are more suitable.
A Sentiment and Review Analysis based News Reliability Ranking Platform 9
2. The system shall store the scrapped news articles in a relational database.
3. The system shall classify a given news article according to its authenticity.
4. The system shall separately analyse image data extracted from the news article to detect
image manipulation.
5. The system shall rank the news articles based on their image and text classification
labels.
7. The system shall allow users to view the news articles from various news sources
ranked to their according their authenticity.
8. The system shall allow users to post their comment on the news articles.
Non-Functional Requirements
Following are the non-functional requirements of the system.
• A cloud server for deployment of web platform. The cloud server shall be capable of
handling moderate user traffic.
• ProxyCrawl [36]
• Google Colab
• TensorFlow
• Keras
• Gensim
• NLTK
• Django
• Angular 8+
• Scrapy
• PostgreSQL
• pgAdmin 4
• Bootstrap 4
System Architecture
This section describes the architecture of the system.
3.4.1.4.1 Backend
This is the server side of the web application which will by based on Python Django
Framework. It will be responsible for managing the user data and news articles and providing
Requirements and Design 12
the appropriate responses to the requests made by user from the frontend. It will communicate
with the final structured news database to fetch ranked news articles as well as store pending
articles to the database.
3.4.1.4.2 Frontend
This is the client side of the web application which will be based on Angular Framework. It
will be responsible for providing user with an interface to interact with and post news articles.
It will communicate with the backend to fetch the data for the user and to update user data and
post news articles.
3.4.2.2 ProxyCrawl
ProxyCrawl is a web API based service which provides the functionality of scrapping websites
using continuously changing proxies. The system will use ProxyCrawl to extract news articles
content in order to avoid getting banned by news sources. Additionally, ProxyCrawl also
provides the service of scrapping JavaScript based pages therefore the system will also use
ProxyCrawl for grabbing the content of any news sources that use JavaScript pages.
Architectural Strategies
Following architectural strategies are decided for the project.
• We will we using AWS S3 bucket [35] for storing user uploaded images as well as
images from scrapped articles.
• The system will use ProxyCrawl web API service to scrap external news articles.
• We can target more types of fake news to enhance our text ranking model.
• We can extend our website to add more functionalities for user interaction like rating
sources, functionality for sources to add their website on the platform for automatic
news capturing.
• We will be using parallel processing on the backend application so that the application
is able to handle multiple users simultaneously.
Use Cases
Following are the main use cases of the system.
3.6.2 Login
Name Login
Actors User
Summary User shall login into the website
Pre-
User is on the login page and user is registered
Conditions
Post-
User is signed in
Conditions
Special
None
Requirements
Basic Flow
Actor Action System Response
Verifies that the account exists and
1 User enters email and password. 2
displays homepage to user.
Alternative Flow
User inputs an invalid email or System prompts invalid email or password
1 2-A
password. error.
1 User enters an empty field. 2-B System prompt missing field error.
A Sentiment and Review Analysis based News Reliability Ranking Platform 15
GUI
This section provides the prototype interface screens of the project.
Database Design
This section provides Entity Relationship Diagram along with Data Dictionary.
3.8.1 ER Diagram
Figure 8: ER Diagram
Figure shows ER diagram for the database design
System Requirements
The product shall require the following features on the system to work as expected
• A stable working internet connection
Design Considerations
This section describes the design considerations for the system.
3.10.1 Assumptions
Following are the assumptions made for specifications
• RSS feeds are available for every news source website
• The user should know the basic usage of internet and web browsers.
3.10.2 Dependencies
Following are the dependencies are present for the system
• Since it is a web-based application, a constant internet connection is required all the
time.
• Our daily news update depends on how frequently our news sources update their
websites since our scope is to only rank news articles.
• Our system’s web crawler solely depends on ProxyCrawl. It’s a web service that keeps
on changing the request IP address so that the website does not ban our crawler.
• We will be using Amazon Web Services for the deployment of our system on cloud.
3.10.3 Constraints
Following are the constraints on the project
• Since model training requires high GPU power, we will need Google Colab for training
our model.
• ProxyCrawl is a paid service. It has request limits for a certain price plan.
Development Methods
We will use scrum development design model for the development of our web application.
Scrum is one of the implementations of agile methodology which is based on iterative and
incremental methodologies. We will divide our work into goals that can be achieved within
one timeboxed iteration (sprints). This timebox will be no longer than one week. The complete
progress will be tracked and re-planned in 15-minute stand-up meetings (daily scrum) every
week.
Requirements and Design 26
Scrum is a framework for managing intricate works. Since our project is fairly complex in
nature which requires spending time on both research and development, scrum is the best suited
methodology for it.
Class diagram
The section shows the class diagram of the system.
Sequence diagram
Following are the sequence diagrams for the system.
one image serves as background and a random rectangular block is chosen from second image
as foreground image. The foreground image is spliced onto the background image at a random
region for creating a tampered image, the bounding of the random region of background image
is saved for annotation.
The synthetics dataset consists of 35000 annotated tampered images along with their 35000
pristine counterparts.
The classification algorithms were trained using multiple features. The features were the
Article Text, Article Body, News Source Credibility Features (News Source Star Ratings and
Number of Followers of News Source on Twitter).
Various combinations of these features were embedded in the model and performance was
evaluated.
communication with backend. The system allows the user to navigate through the ranked
articles fetched from news sources and post comments on them.
The frontend module first displays a Sign In page where user inputs his credentials and then
the frontend module authenticates the user from the backend by using an API call. The
authentic user can then view the ranked list of articles, which frontend module fetches from the
backend using an API call. User can also read complete article using the interface provided the
frontend application.
Test Metrics
Following the test metrics and their results after the testing process.
Metric Value
Number of Test Cases: 26
Number of Test Cases Passed: 26
Number of Test Cases Failed: 0
Test Case Defect Density: 0
Because of class imbalance, precision is also a good metric for performance assessment.
Precision values after hyperparameter tuning are shown in Table 5.
Experimental Results and Analysis 64
Precision alone cannot give confidence in the performance of algorithm. So, recall rate is
necessary for evaluation. Table 6 shows recall of the tested models.
Table 6: Model Recall Rate
Table shows model recall using various architectures and input features.
Input Feature LSTM GRU CNN
Article Headline 0.61 0.63 0.65
Article Body 0.65 0.67 0.70
Article Body + Headline 0.70 0.72 0.73
Article Body + Headline + Source Rating + Number of
0.77 0.80 0.84
Followers
Article Headline (Balanced Dataset) 0.74 0.76 0.76
Article Body (Balanced Dataset) 0.81 0.80 0.82
Article Body + Headline (Balanced Dataset) 0.82 0.83 0.84
Article Body + Headline + Source Rating + Number of
0.87 0.88 0.89
Followers (Balanced Dataset)
From the results it can be seen that the proposed Convolution Neural Network outperforms the
other two by a slight margin in case of both accuracy and precision. Moreover, CNN is also
faster to train as compared to other architectures and way simpler than LSTM and GRU.
Incorporating additional features of the news source improved the recall of our classifier
greatly. Sequence models i.e. GRU and LSTM show almost same test performance, however,
CNN outperforms both. Another advantage that CNN is that the time to train per and time to
predict is almost half as compared to LSTM and GRU.
The final model we deployed in our system is the CNN with attention mechanism.
A Sentiment and Review Analysis based News Reliability Ranking Platform 65
The model was also tested using some human tampered images of a photoshop expert. These
image much more challenging than the images in the evaluation data. There were 23 of these
images and our model was able to correctly classify these images.
Considering that a synthetic dataset was used for training, model was able to perform very well
and was able to classify majority of the forged samples given to it. The method could be made
even better if a large annotated public dataset of human done forgeries is available.
The final result by our model is a harmonic mean of the score given by the tamper detection
model and the text classification model.
Conclusion 66
Conclusion
Fake news is a major problem of digital era, the proposed system aims to tackle this problem
using both the textual and image data. Textual and image data within a news article are main
features for classification and ranking of news articles. For the classification and ranking of
news articles we are primarily using deep learning techniques for classification of textual data
and image manipulation detection in the news article. The features used are the text content
and source credibility (source ratings and number of followers). After dataset collection and
structuring, article text is then preprocessed and is trained on three well known deep learning
architectures namely Convolution Neural Network, Long Short-Term Memory Network
(LSTM) and Gated Recurrent Unit (GRU), attention mechanism is used in all architectures as
well. After parameter tuning CNN with attention mechanism outperforms other architectures,
which is our proposed model.
The system is also capable of detecting image splice forgery in news images using a two
channel Faster-RCNN. For that purpose, a dataset has been prepared which is used to train the
network which is used for image splice detection and localization in news article images. The
final score is a weighted sum of the results from image and text classification models. The live
news articles are ranked on base of this score.
Moreover, a web application has also been designed display the ranked list of news articles
based on their authenticity and view the article details. The application is single page web
applications, which has been developed using Angular 8 as a front-end framework. Python
Django web framework has been used to develop the backend of the system. A web scrapper
module has also been developed that extract news article text from an online news article. The
system ranks and displays them
The models can be further improved if a good news dataset is available with both news and
image content. Also, if a good source is available which could provide dependable news source
credibility features such as their ratings and user following of the source, because we have
found that source credibility information is not available for many sources, we tackled this
missing data by interpolation, but there is a need for a good source that analyses the sources,
as it could greatly help in detection of fake news.
A Sentiment and Review Analysis based News Reliability Ranking Platform 67
References
[1] Y. Yang, L. Zheng, J. Zhang, Q. Cui, X. Zhang, Z. Li and P. S. Yu, "TI-CNN:
Convolutional Neural Networks for Fake News Detection," arXiv, 2018.
[2] Y. Long , Q. Lu, R. Xiang, M. Li and C.-R. Huang, "Fake News Detection Through
Multi-Perspective Speaker Profiles," in International Joint Conference on Natural
Language Processing, Taipei, 2017.
[3] N. Ruchansky, S. Seo and Y. Liu, "CSI: A Hybrid Deep Model for Fake News
Detection," in Conference on Information and Knowledge Management, Singapore,
2017.
[4] J. Ma, W. Gao, P. Mitra, S. Kwon, B. J. Jansen, K.-F. Wong and M. Cha, "Detecting
rumors from microblogs with recurrent neural networks," in IJCAI'16 Proceedings of the
Twenty-Fifth International Joint Conference on Artificial Intelligence, New York, 2016.
[5] G. Ballarin, M. L. D. Vedova, E. Tacchini, S. Moret and L. d. Alfaro, "Some Like it
Hoax: Automated Fake News Detection in Social," in Workshop on Data Science for
Social Good (SoGood), Skopje, 2017.
[6] J. C. Reis, A. Correia, F. Murai, A. Veloso and F. Benevenuto, "Supervised Learning for
Fake News Detection," IEEE Intelligent Systems, vol. 34, no. 2, pp. 76-81, 2019.
[7] P. Bourgonje, J. M. Schneider and G. Rehm, "From Clickbait to Fake News Detection:
An Approach based on Detecting the Stance of Headlines to Articles," in EMNLP
Workshop on Natural Language Processing meets Journalism, Copenhagen, 2017.
[8] H. Ahmed, I. Traore and S. Saad, "Detection of Online Fake News Using N-Gram
Analysis and Machine Learning Techniques," in International Conference on Intelligent,
Secure, and Dependable Systems in Distributed and Cloud Environments, 2017.
[9] B. D. Horne and S. Adali, "This Just In: Fake News Packs a Lot in Title, Uses Simpler,
Repetitive Content in Text Body, More Similar to Satire than Real News," in
International Workshop on News and Public Opinion at ICWSM, 2017.
[10] F. Marra, D. Gragnaniello, D. Cozzolino and L. Verdoliva, "Detection of GAN-generated
Fake Images over Social Networks," in IEEE Conference on Multimedia Information
Processing and Retrieval, Miami, 2018.
[11] D. Cozzolino, G. Poggi and L. Verdoliva, "Recasting Residual-based Local Descriptors
as Convolutional Neural Networks: an Application to Image Forgery Detection," in ACM
Workshop on Information Hiding and Multimedia Security, Philadelphia, 2017.
[12] B. Bayer and C. M. Stamm, "A Deep Learning Approach to Universal Image
Manipulation Detection Using a New Convolutional Layer," in ACM Workshop on
Information Hiding and Multimedia Security, Vigo, 2016.
[13] C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens and Z. Wojna, "Rethinking the Inception
Architecture for Computer Vision," in IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), Las Vegas, 2016.
[14] G. Huang, Z. Liu, K. Q. Weinberger and L. van der Maaten, "Densely Connected
Convolutional Networks," in IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), Honolulu, 2017.
[15] F. Chollet, "Xception: Deep Learning with Depthwise Separable Convolutions," in IEEE
Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, 2017.
References 68
[16] J.-Y. Zhu, T. Park, P. Isola and A. A. Efros, "Unpaired Image-to-Image Translation
Using Cycle-Consistent Adversarial Networks," in IEEE International Conference on
Computer Vision (ICCV), Venice, 2017.
[17] Y. Rao and J. Ni, "A Deep Learning Approach to Detection of Splicing and Copy-Move
Forgeries in Images," in IEEE International Workshop on Information Forensics and
Security (WIFS), Abu Dhabi, 2016.
[18] M. Huh, A. Liu, A. Owens and A. A. Efros, "Fighting Fake News: Image Splice
Detection via Learned Self-Consistency," in European Conference on Computer Vision,
Munich, 2018.
[19] T. J. d. Carvalho, C. Riess, E. Angelopoulou, H. Pedrini and A. d. R. Rocha, "Exposing
Digital Image Forgeries by Illumination Color Classification," IEEE Transactions on
Information Forensics and Security, vol. 8, no. 7, pp. 1182-1194, 2013.
[20] P. Korus and J. Huang, "Evaluation of random field models in multi-modal unsupervised
tampering localization," in IEEE International Workshop on Information Forensics and
Security (WIFS), Abu Dhabi, 2016.
[21] J. Hays and A. A. Efros, "Scene Completion Using Millions of Photographs," in ACM
Transactions on Graphics, San Diego, 2007.
[22] M. Risdal, “Getting Real about Fake News,” Kaggle, 25-Nov-2016. [Online]. Available:
https://www.kaggle.com/mrisdal/fake-news.
[23] Wang and W. Yang, “‘Liar, Liar Pants on Fire’: A New Benchmark Dataset for Fake
News Detection,” arXiv.org, 01-May-2017. [Online]. Available:
https://arxiv.org/abs/1705.00648.
[24] Gsantia, “BuzzFace,” GitHub, 31-Jul-2018. [Online]. Available:
https://github.com/gsantia/BuzzFace.
[25] FakeNewsChallenge, “FakeNewsChallenge(FNC1),” GitHub, 15-Jun-2017. [Online].
Available: https://github.com/FakeNewsChallenge/fnc-1.
[26] P. Sovathana, “CASIA dataset,” Kaggle, 04-Oct-2018. [Online]. Available:
https://www.kaggle.com/sophatvathana/casia-dataset.
[27] “Columbia Image Splicing Detection Evaluation Dataset (DVMM),” Columbia Image
Splicing Detection Evaluation Dataset. [Online]. Available:
http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/dlform.html.
[28] Payamesfandiari, “payamesfandiari/fake_news_finder,” GitHub, 01-May-2018.
[Online]. Available:
https://github.com/payamesfandiari/fake_news_finder/tree/master/data/processed.
[29] K. Shu, D. Mahudeswaran, S. Wang, D. Lee and H. Liu, "FakeNewsNet: A Data
Repository with News Content, Social Context and Dynamic Information for Studying
Fake News on Social Media," ArXiv, 2018.
[30] “Gossip Cop,” Gossip Cop. [Online]. Available: https://www.gossipcop.com.
[31] “Fact-checking U.S. politics,” PolitiFact. [Online]. Available:
https://www.politifact.com/.
[32] “Knowledge Graph, AI Web Data Extraction and Crawling,” Diffbot. [Online].
Available: https://www.diffbot.com/.
[33] KaiDMML, “KaiDMML/FakeNewsNet,” GitHub, 19-Nov-2019. [Online]. Available:
https://github.com/KaiDMML/FakeNewsNet/tree/master/code.
[34] “EC2,” Amazon, 2006. [Online]. Available: https://aws.amazon.com/ec2/.
A Sentiment and Review Analysis based News Reliability Ranking Platform 69