8.2

Further reading

A curated annotated bibliography organized by category. Papers, books, court opinions, and reporting that shaped the current landscape and continue to inform working practice.

The reading list below is the non-specification reference material that consistently informs work in this field. The specifications index covers the technical standards; this list covers everything else. Entries are organized by category and within each category roughly by their continuing relevance. Items are annotated with one or two sentences explaining what the source contributes and why a reader of this site might consult it.

Foundational books and surveys

  1. Hany Farid, "Photo Forensics" (MIT Press, 2016). The standard textbook on classical image forensics, covering ELA, JPEG analysis, CFA artifacts, lighting consistency, and statistical techniques. Farid's continued work at Berkeley updates many of the techniques; the book remains the right starting point.
  2. Hany Farid, "Fake Photos" (MIT Press, 2019). A shorter, more accessible companion to the 2016 textbook, written for a non-specialist audience. Useful for newsroom staff and policy readers who need to understand the techniques without implementing them.
  3. David King, "The Commissar Vanishes" (Metropolitan Books, 1997). The standard historical reference on Stalin-era photo retouching. Useful background for understanding that institutional manipulation predates digital tools by a century.
  4. Errol Morris, "Believing Is Seeing: Observations on the Mysteries of Photography" (Penguin Press, 2011). A series of essays on photographic truth and manipulation, focused on specific cases. Particularly useful on the Capa "Falling Soldier" controversy and on Civil War-era staging debates.
  5. Susan Sontag, "On Photography" (Farrar, Straus and Giroux, 1977). The foundational essay collection on photography's relationship to truth. Predates digital concerns but frames the underlying questions that current debates inherit.
  6. Ingrid Sischy, ed., "Photography and Memory" (various editions). A collection on photography's relationship to historical record. Useful for thinking about evidentiary photography across periods.

Generative AI and synthetic media

  1. Ian Goodfellow et al., "Generative Adversarial Nets" (NeurIPS 2014). The foundational GAN paper that opened the modern synthesis era.
  2. Tero Karras et al., "A Style-Based Generator Architecture for Generative Adversarial Networks" (CVPR 2019). The StyleGAN paper. The architecture that made photorealistic synthetic faces possible.
  3. Robin Rombach et al., "High-Resolution Image Synthesis with Latent Diffusion Models" (CVPR 2022). The Stable Diffusion paper, which moved diffusion models to a computationally efficient latent-space architecture and enabled the open-weights era.
  4. Aditya Ramesh et al., "Zero-Shot Text-to-Image Generation" (2021). The original DALL·E paper. Established text-to-image as a viable research direction with consumer applications.
  5. Chitwan Saharia et al., "Photorealistic Text-to-Image Diffusion Models with Deep Language Understanding" (NeurIPS 2022). The Imagen paper. Established the high-quality diffusion-model lineage that Google's commercial deployments use.
  6. Yang Song and Stefano Ermon, "Generative Modeling by Estimating Gradients of the Data Distribution" (NeurIPS 2019). The score-based generative modeling paper that became the foundation of much of the diffusion literature.

Watermarking

  1. Ingemar Cox, Matthew Miller, Jeffrey Bloom, "Digital Watermarking and Steganography" (Morgan Kaufmann, 2nd ed., 2007). The standard textbook on classical watermarking techniques. Pre-AI-era but covers the engineering principles that underlie modern schemes.
  2. Cox, Kilian, Leighton, Shamoon, "Secure Spread Spectrum Watermarking for Multimedia" (1997). The seminal frequency-domain watermarking paper. Foundation of much of the classical watermarking literature.
  3. Pierre Fernandez et al., "The Stable Signature: Rooting Watermarks in Latent Diffusion Models" (2023). The Meta paper on in-model watermarking for diffusion outputs.
  4. Yuxin Wen et al., "Tree-Rings Watermarks: Invisible Fingerprints for Diffusion Images" (NeurIPS 2023). The tree-ring watermarking approach for diffusion models.
  5. Zijin Yang et al., "Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models" (CVPR 2024). A diffusion-model watermarking scheme with strong robustness properties.
  6. Mehrdad Saberi et al., "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks" (2023). The widely-cited paper establishing fundamental limits on watermark robustness against adversarial attacks.
  7. Xuandong Zhao et al., "Invisible Image Watermarks Are Provably Removable Using Generative AI" (2023). The formal analysis of the regeneration attack against watermarks.
  8. Bang An, Mucong Ding et al., "Benchmarking the Robustness of Image Watermarks" (2024). Comprehensive benchmarking of production and academic watermark schemes against standardized adversarial conditions.
  9. Sumanth Dathathri et al., "Scalable watermarking for identifying large language model outputs" (Nature, 2024). The SynthID-Text paper. The text variant is more documented than the image variant; useful background.

Detection and forensics

  1. Sheng-Yu Wang et al., "CNN-generated images are surprisingly easy to spot... for now" (CVPR 2020). The foundational paper on frequency-domain detection of GAN-generated images; the "for now" in the title has proven prescient.
  2. Davide Cozzolino et al., "On the Generalization of Detection Methods for Synthetic Images" (2024). The benchmarking study documenting cross-model detector brittleness across major model families.
  3. Andreas Rossler et al., "FaceForensics++: Learning to Detect Manipulated Facial Images" (ICCV 2019). The benchmark dataset that defined detection-research evaluation for several years.
  4. Hany Farid, "Exposing Digital Forgeries from JPEG Ghosts" (IEEE Transactions on Information Forensics and Security, 2009). The formal paper on the JPEG ghost technique.
  5. Eric Kee, Hany Farid, "Exposing Photo Manipulation from Shading and Shadows" (ACM Transactions on Graphics, 2014). Quantitative tests for lighting consistency in composite imagery.
  6. Jessica Fridrich and Jan Lukáš, "Estimation of Primary Quantization Matrix in Double Compressed JPEG Images" (DFRWS 2003). Early foundational work on JPEG forensic analysis.
  7. Mo Chen, Jessica Fridrich, Miroslav Goljan, "Determining Image Origin and Integrity Using Sensor Noise" (IEEE Transactions on Information Forensics and Security, 2008). The PRNU technique for camera-source identification.

C2PA and Content Credentials

  1. The C2PA Technical Specification and supporting documents (c2pa.org). Primary references for any implementation work.
  2. Content Authenticity Initiative documentation (contentauthenticity.org). The CAI's developer guides, user guides, and policy material. Less rigorous than the specification but useful for context.
  3. Project Origin published practice notes (projectorigin.org and partner sites). Editorial-side practice for credentialed journalism.
  4. Adobe's published case studies on Content Credentials deployment. Useful for understanding production-grade integration patterns even where they reflect Adobe's specific interests.

Policy and regulation

  1. Daniel Solove and Paul Schwartz, "Information Privacy Law" (Aspen Publishing, current edition). The standard privacy-law casebook. Background reading for understanding the legal framework into which credentialing privacy concerns must fit.
  2. Future of Privacy Forum, "Generative AI and Privacy" reports (various). Ongoing policy analysis of the intersection of generative AI and privacy frameworks.
  3. Brennan Center for Justice, "Election Deepfake Legislation Tracker" (brennancenter.org). Continuously updated tracker of US state election-deepfake statutes. Essential reference for the regulatory patchwork.
  4. Witness.org publications on synthetic media. Witness has produced extensive practical and policy material on synthetic-media verification with a human-rights focus.
  5. Partnership on AI, "Responsible Practices for Synthetic Media". The PAI framework for industry practice on synthetic media, periodically updated.
  6. NIST AI Risk Management Framework and companion publications. The US federal touchpoint for AI governance practice.
  7. European Commission AI Office published guidance. Ongoing guidance on AI Act implementation, including the provenance-relevant provisions.

Journalism and verification

  1. Craig Silverman, ed., "Verification Handbook" (European Journalism Centre, various editions). The standard practical handbook for journalistic verification of user-generated content. Several editions; the most recent reflects current digital-verification practice.
  2. Bellingcat, "Bellingcat Online Investigations Toolkit" (bellingcat.com). A continuously updated practical guide to OSINT verification techniques.
  3. First Draft (now Information Futures Lab), published guides on visual verification. Foundational practical material for newsroom verification work.
  4. Reuters Handbook of Journalism, sections on image manipulation and verification. The wire-service standard reference. Available through Reuters and reproduced in journalism education contexts.
  5. Associated Press News Values and Principles. The AP's published editorial standards including specific provisions on image use and verification.
  6. BBC Editorial Guidelines. Detailed editorial standards including verification requirements for user-generated content and synthetic media.

Reporting and case studies

  1. The reporting on the Adnan Hajj affair (Reuters, 2006) and subsequent industry response. Useful for understanding how wire services have historically responded to manipulation scandals.
  2. The pope-in-puffer-jacket reporting (various outlets, March 2023). The canonical case study of a viral AI-generated image and how detection and verification practices responded.
  3. The 2024 Biden robocall reporting (various outlets, January 2024). The election-cycle case study that drove much of the subsequent US state legislation.
  4. The Washington Post's Visual Forensics unit's body of work. Multi-day reconstructions of specific incidents demonstrate what extended forensic-journalism analysis can produce.
  5. BBC Verify's on-air analyses. The public transparency of the verification process is itself instructive for how the work can be communicated.
  6. The Bellingcat MH17 investigation and its successor projects. The reference case study for open-source investigation methodology, with extensive published documentation of methods.

History and culture

  1. Robert Hirsch, "Seizing the Light: A Social History of Photography" (McGraw-Hill, current edition). General survey of photographic history with substantial attention to manipulation across periods.
  2. Mia Fineman, "Faking It: Manipulated Photography Before Photoshop" (Metropolitan Museum of Art, 2012). The exhibition catalog from the Met's 2012 exhibition. Excellent visual reference for pre-digital photographic manipulation.
  3. Allan Sekula, "Photography Against the Grain" (Press of the Nova Scotia College of Art and Design, 1984; reissued). Critical-theory framing of photography's relationship to power and truth.
  4. Geoffrey Batchen, "Burning with Desire: The Conception of Photography" (MIT Press, 1999). On the prehistory of photography and the cultural expectations the medium inherited.
Note The bibliography emphasizes sources that continue to inform current practice rather than completeness. Several historically significant works are omitted because their substantive contribution has been absorbed into later, more accessible references. For deeper academic work, the citation graphs in the cited papers and books will lead readers further than any curated bibliography can.