applsci-logo

Journal Browser

Journal Browser

Applications of Artificial Intelligence in Digital Cultural Heritage Analysis

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (20 March 2024) | Viewed by 1009

Special Issue Editors


E-Mail Website
Guest Editor
Department of Informatics, London South Bank University, London SE1 0AA, UK
Interests: computer science; software engineering; formal methods; history of computing; digital culture
Faculty of Medicine, Dentistry and Health Sciences, University of Melbourne, Parkville, VIC 3010, Australia
Interests: digital health informatics; emerging technology and participatory science; environmental health; artificial intelligence and open knowledge systems; cultural informatics (digital heritage)
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The human–machine interaction of large-scale learning models generating art and text presents enormous challenges for the cultural heritage sector, not only for their thorny copyright issues but also how their provenance is expressed in their metadata. Rather than duplicating images from stock photos or artist portfolios, AI-image generators are "trained" on enormous data sets to create images that are unique; however, they are often produced without their owner’s permission or even acknowledgement. At the same time, GPT text generators have a penchant for hallucinations and suggest strange verbiage that can range from the simple truth to total fiction. AI is currently experiencing its tulip mania moment as the explosion of new models become publicly accessible, confronting human creativity head on with a pastiche of prior art, prior words, and more profoundly, prior creativity. Some even say that we are hurtling towards an AI disaster with the release of gen AI already freely floating around the public domain, permeating and impersonating all forms of culture. This Special Issue will showcase research in a sector that is racing to keep up with the rapid developments in the cultural heritage sector, some welcome while others less so. These reverberations are felt across the sector, impacting and revolutionizing cinema, music, photography, and art when deep fakes and uncanny valley pastiche replace our cultural artifacts and our sense of what it is that makes us unique human beings—our culture.

Prof. Jonathan Bowen
Dr. Ann Borda
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • large-scale learning models
  • human–machine creativity
  • artificial intelligence, machine learning and deep learning
  • ontologies and semantics
  • copyright
  • deep fake
  • pastiche

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 2912 KiB  
Article
Research on Algorithm for Authenticating the Authenticity of Calligraphy Works Based on Improved EfficientNet Network
by Weijun Wang, Xuyao Jiang, Hai Yuan, Jinyuan Chen, Xintong Wang and Zucheng Huang
Appl. Sci. 2024, 14(1), 295; https://doi.org/10.3390/app14010295 - 28 Dec 2023
Cited by 1 | Viewed by 761
Abstract
Calligraphy works have high artistic value, but there is the rampant problem of forgery. Indeed, the authentication of traditional calligraphy heavily relies on calligraphers’ subjective judgment. Therefore, spurred by the recent development of neural networks, this paper proposes a method for authenticating calligraphy [...] Read more.
Calligraphy works have high artistic value, but there is the rampant problem of forgery. Indeed, the authentication of traditional calligraphy heavily relies on calligraphers’ subjective judgment. Therefore, spurred by the recent development of neural networks, this paper proposes a method for authenticating calligraphy works based on an improved EfficientNet network. Specifically, the developed method utilizes the character box algorithm to efficiently extract individual calligraphy characters, which are then augmented and used as the training set for the model. The training process employs CBAM and Self-Attention modules to enhance the attention mechanism of the EfficientNet network. The trained network model is used to judge the calligraphy works’ similarity; tested on authentic works, imitated works, and works from other calligraphers; and compared with other networks. The experimental results demonstrate that the proposed method effectively achieves the authentication of calligraphy works, and the improved CBAM-EfficientNet network and SA-EfficientNet network achieve better authentication performance. Full article
Show Figures

Figure 1

Back to TopTop