
{"id":3990,"date":"2022-09-20T13:27:54","date_gmt":"2022-09-20T13:27:54","guid":{"rendered":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers\/"},"modified":"2026-03-19T11:36:04","modified_gmt":"2026-03-19T06:06:04","slug":"identifying-problematic-images-tips-and-resources-for-peer-reviewers","status":"publish","type":"post","link":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers","title":{"rendered":"Identifying problematic images: Tips and resources for peer reviewers"},"content":{"rendered":"<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Inappropriate image manipulation has become increasingly prevalent in research publishing. Unfortunately, because of the evolution of new technologies that allow such manipulation, this problem is likely to persist for some time. For example, artificial intelligence (AI)-generated deepfakes are the recent addition to the expanding types of falsified images<sup>1<\/sup>. <\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">One silver bullet to address this huge problem is automated assessment of images for authenticity, but we are not there yet. Of course, there has been some progress on how falsified images are detected, with the introduction of novel methods for image forensics, AI\u2013\/machine learning\u2013based tools to detect image duplication<sup>2<\/sup>, services provided by data-integrity professionals, etc. But the crucial element in combatting this challenge is still the peer review process.<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>Role of peer reviewers in upholding research integrity<\/b><\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Peer reviewers are the first line of defense that can prevent doctored images seeping through published literature. However, in several cases, potentially fraudulent images have escaped the scrutiny of peer review because of lack of either vigilance or skill in identifying problems. <\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">One such example is the infamous story of Hwang Woo Suk, a veterinarian researcher who was accused of research misconduct and of manipulating images in a stem cell\u2013research article that was published in a major scientific journal<sup>3<\/sup>. Grave concerns were raised about potentially fraudulent data slipping through the cracks. Other examples include the controversies surrounding cancer researcher Min-Jean Yin<sup>4<\/sup> and immunologist Silvia Bulfone-Paus<sup>5<\/sup>, several of whose papers were discovered to have included forged images. Thus, peer reviewers bear an important responsibility identifying such cases and upholding research and publication integrity.<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Many cases of problematic images are identified by researchers after papers are published. Some of these researchers\u2014who often also serve as peer reviewers otherwise\u2014have driven research-integrity initiatives and set up companies based on their work. Mike Rossner was one of the earliest pioneers of such initiatives<sup>6<\/sup>. More recently, biologist Enrico Bucci detected image duplication and other data errors in a homeopathy study published in Scientific Reports<sup>7<\/sup>.<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">For the research community to detect potentially problematic images early on, peer reviewers need to equip themselves with skills to identify red flags during the review stage itself. Reviewing research that claims major impact on science and society may sometimes overwhelm peer reviewers. Thus, it is especially crucial to perform a robust scrutiny of image data in manuscripts reporting novel path-breaking results, because of the potential harm caused by erroneous claims. This is challenging because reviewers are not always formally trained in such inquiry.<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">As research frauds have made their way up to journals with the highest impact factors, discipline-specific expertise is not sufficient to detect these. It is now also important to develop a keen eye for fake images and the ability to judge if the image data provided are reliable enough to support research claims.<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>Steps to develop skills required to identify problematic images<\/b><\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>1. Familiarize yourself with journal guidelines<\/b><\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Many journals provide guidelines on what they consider inappropriate beautification or cutting and stitching of images. Before you review a manuscript, familiarize yourself with the requirements and norms of the journal you are reviewing for.<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>2. Learn about the most common types of falsified images<\/b><\/span><\/span><\/p>\n<p style=\"margin-left: 36.0pt; margin: 0cm; margin-right: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Elisabeth Bik, an image-integrity expert, describes three major categories of problematic images<sup>8<\/sup>:<\/span><\/span><\/p>\n<ul>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Duplication or use of the same image in a single figure panel or across figure panels to report different experimental conditions<\/span><\/span><\/li>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Duplication along with repositioning of an image or a part of it<\/span><\/span><\/li>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Duplication with alteration involving \u201cstamping\u201d (a specific area duplicated multiple times) or \u201cpatching\u201d (part of an image covered by an area with a different background)<\/span><\/span><\/li>\n<\/ul>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><strong>3.\u00a0<\/strong><b>Educate yourself about image forensics tools<\/b><\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Software that helps in manipulating images can also be helpful in detecting inappropriate manipulations. Such tools include <i>Image J<\/i>, frequently used to detect errors in gel pictures; <i>Photoshop droplets<\/i>, which can catch light\/contrast adjustments; and <i>Adobe bridge<\/i>,<b> <\/b>which is used for reviewing large image panels. <i>Forensically<\/i>\u2014a set of free tools for digital image forensics<sup>9<\/sup>\u2014has helped Elisabeth Bik spot several problematic images<sup>10<\/sup>. You may also visit the websites of the HEADT Centre<sup>11<\/sup> and the Office of Research Integrity (ORI)<sup>12<\/sup> to check how software is used to spot tampered images. You may not be directly using such tools yet\u2014and some are not free\u2014but familiarizing yourself with how they are used will sharpen your ability to detect doctored images.<\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>4. Attend workshops and webinars on research integrity<\/b><\/span><\/span><\/p>\n<p style=\"margin-top: 12.0pt; margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Several organizations, including ORI and the HEADT Centre, organize workshops and webinars to generate awareness about image manipulation and ways to tackle it. Watch out for such opportunities.<\/span><\/span><\/p>\n<p style=\"margin-top: 12.0pt; margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>5. Follow research-integrity professionals and science journalists covering these topics on social media<\/b><\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Read up on the work being undertaken by several research-integrity professionals. Many of them discuss their observations, results, and learnings on their blogs or social media accounts. Science communicators and journalists often share any articles they write on research fraud and their interviews with data-integrity professionals on social media. Following a network of professionals via these channels can help you stay updated on evolving methods to detect image manipulation.<\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>6. Visit online platforms where researchers identify problematic research <\/b>Discussion forums like PubPeer<sup>13<\/sup> and blogs like Retraction watch<sup>14<\/sup> are online spaces that highlight and discuss recent cases of fraud or potentially problematic research, including image manipulation.<\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>7. Connect the important dots<\/b><\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">When reviewing a manuscript, focus on understanding connections between the research context, the methodology adopted or equipment used to generate image data, and the manner in which authors use the data to support a research claim. Careful attention paid to these connections can help you to spot any inconsistencies or red flags better.<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>8. The best critical lens are your eyes<\/b><\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">A good way to start is to carefully study an important image (the one that ties most crucially with the research claim). You may look for<\/span><\/span><\/p>\n<ul>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Any edges that appear different<\/span><\/span><\/li>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Glows, extra-clean background, color variations that may suggest alteration\/addition of objects in an image<\/span><\/span><\/li>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Consistency in size, angle, positioning\u00a0 of individual objects<\/span><\/span><\/li>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Similarity or overlap in textures and patterns of objects or background elements <\/span><\/span><\/li>\n<\/ul>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>9. Use your research experience to your advantage<\/b><\/span><\/span><\/p>\n<ul>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">The authentic images you encounter in your own research experience can serve as benchmarks to compare any suspicious images with. Pay attention to aspects that seem different from what you typically see in true images. Use Google\u2019s image search function to find pre-existing images if you suspect that the images are not original.<\/span><\/span><\/li>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Draw insights based on your memory. For example, if you regularly review manuscripts with Western blots, train yourself to remember if you have seen a similar images\/image features in case you suspect a problem.<\/span><\/span><\/li>\n<li style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Leverage your own image-editing experience. Photoshop tools can reveal odd pixelation in images suggestive of deliberate alterations. The picture reset tool in PowerPoint can help you find underlying original images.<\/span><\/span><\/li>\n<\/ul>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>Communicating concerns to the journal editor <\/b><\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">As a peer reviewer, you have the ethical responsibility to protect research integrity by reporting any suspicions to journal editors. Here are a few pointers on how to go about this:<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>1. Treat raising a concern as a professional duty towards science<\/b>. Reporting a concern about the work of fellow researchers may seem a highly unpleasant prospect. So, treating it as a professional obligation may help overcome any feelings of being overwhelmed or anxious.<\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>2. Be objective.<\/b> Your comments should focus on describing the suspected flaws in an honest, clear, and specific manner. Your aim should be to provide the journal editor enough context and detail to help them decide their next steps.<\/span><\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 36pt; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>3. Be kind and cautious.<\/b> Remember that you are raising a suspicion and not delivering a verdict. Thus, avoid making personal remarks about the authors or claiming intent to commit fraud. Word your report in a neutral and appropriate manner and leave room for a just inquiry.<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Automated detection of image manipulation may soon serve as a more efficient way to prevent potentially fraudulent research from becoming part of the scholarly record. Until then, the contribution of peer reviewers in doing this will be crucial. Additionally, flagging of problematic images by reviewers can enrich the data bank of false images and eventually support efforts to automate their detection.<\/span><\/span><\/p>\n<h2 style=\"margin: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b>References<\/b><\/span><\/span><\/h2>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">1. Wang, L., Zhou, L., Yang, W. &amp; Yu, R. Deepfakes: A new threat to image fabrication in scientific publications? <i>Patterns<\/i> <b>3<\/b>, 100509 (2022).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">2. Noorden, R. V. Journals adopt AI to spot duplicated images in manuscripts. <i>Nature<\/i> https:\/\/www.nature.com\/articles\/d41586-021-03807-6 (2021).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">3. Lemonick, M. D. The Rise and Fall of the Cloning King &#8211; TIME. <i>TIME<\/i> http:\/\/content.time.com\/time\/magazine\/article\/0,9171,1145236,00.html (2006).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">4. Terry, M. Former Pfizer Cancer Scientist Gets All 5 Papers Retracted. <i>BioSpace<\/i> https:\/\/www.biospace.com\/article\/former-pfizer-cancer-scientist-gets-all-5-papers-retracted-\/ (2017).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">5. Schiermeier, Q. German research centre widens misconduct probe | Nature. <i>Nature<\/i> https:\/\/www.nature.com\/articles\/news.2010.671 (2010).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">6. Rossner, M. &amp; Yamada, K. M. What\u2019s in a picture? The temptation of image manipulation. <i>J. Cell Biol.<\/i> <b>166<\/b>, 11\u201315 (2004).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">7. Guglielmi, G. Peer-reviewed homeopathy study sparks uproar in Italy. <i>Nature<\/i> https:\/\/www.nature.com\/articles\/d41586-018-06967-0 (2018).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">8. Bik, E. M., Casadevall, A. &amp; Fang, F. C. The Prevalence of Inappropriate Image Duplication in Biomedical Research Publications. <i>mBio<\/i> <b>7<\/b>, e00809-16 (2016).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">9. Forensically, free online photo forensics tools. https:\/\/29a.ch\/photo-forensics\/.<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">10. Turan, J. The science and art of detecting data manipulation and fraud: An interview with Elisabeth Bik. <i>The Physiological Society<\/i> (2020).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">11.\u00a0Thorsten S. Beck. HEADT Centre &#8211; How to Detect Image Manipulations? Part 3. <i>The Headt Centre<\/i> https:\/\/headt.eu\/How-to-Detect-Image-Manipulations-Part-3\/ (2017).<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">12. Forensic Tools | ORI &#8211; The Office of Research Integrity. https:\/\/ori.hhs.gov\/forensic-tools.<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">13. PubPeer &#8211; Search publications and join the conversation. https:\/\/pubpeer.com\/.<\/span><\/span><\/p>\n<p class=\"MsoBibliography\" style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">14. Retraction Watch. <i>Retraction Watch<\/i> https:\/\/retractionwatch.com\/.<\/span><\/span><\/p>\n<p style=\"margin-top: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"background: white;\"><span style=\"font-family: 'Times New Roman',serif;\"><b><span lang=\"EN-US\" style=\"color: black;\" xml:lang=\"EN-US\">Additional reading<\/span><\/b><\/span><\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\">Beck, Thorsten S. <i>Shaping Images. Scholarly Perspectives on Image Manipulation<\/i>. (Humboldt-Universitat zu Berlin, 2016)<\/span><\/span><\/p>\n<p style=\"margin: 0cm; margin-right: 0cm; margin-left: 0cm;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Times New Roman',serif;\"><b><i>Note<\/i><\/b><i>: Interested in learning more about how peer reviewers can support research integrity by identifying problematic images? <a href=\"https:\/\/www.editage.com\/insights\/building-sustainable-peer-review-processes-to-foster-research-integrity-a-conversation-with-jigisha-patel-0?utm_source=editageinsights&amp;utm_medium=article&amp;utm_campaign=editageinsights-insights-site-prw-podcast--row\" target=\"_blank\" rel=\"noopener\">Listen<\/a> to the views of an expert panel, including Elisabeth Bik (independent science integrity volunteer) and Michael Streeter (Director of Research Integrity &amp; Publication Ethics, Wiley).<\/i><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Inappropriate image manipulation has become increasingly prevalent in research publishing. Unfortunately, because of the evolution of new technologies that allow such manipulation, this problem is likely to persist for some time. For example, artificial intelligence (AI)-generated deepfakes are the recent addition to the expanding types of falsified images1. One silver bullet to address this huge [&hellip;]<\/p>\n","protected":false},"author":2641,"featured_media":45583,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2418],"tags":[2581,1760,2772],"new_categories":[],"new_tags":[],"series":[],"class_list":["post-3990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-ethics","tag-ethics-of-research","tag-peer-review-week","tag-peer-review-week-2022"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identifying problematic images: Tips and resources for peer reviewers<\/title>\n<meta name=\"description\" content=\"Inappropriate image manipulation has become increasingly prevalent in research publishing. This article talks about peer reviewers&#039; role in flagging unethical elements in research, tips to develop the proficiency to identify manipulated images, and how to escalate the issue to the journal.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identifying problematic images: Tips and resources for peer reviewers\" \/>\n<meta property=\"og:description\" content=\"Inappropriate image manipulation has become increasingly prevalent in research publishing. This article talks about peer reviewers&#039; role in flagging unethical elements in research, tips to develop the proficiency to identify manipulated images, and how to escalate the issue to the journal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers\" \/>\n<meta property=\"og:site_name\" content=\"Editage Insights\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Editage\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-20T13:27:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T06:06:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"704\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adita Joshi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Editage\" \/>\n<meta name=\"twitter:site\" content=\"@Editage\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adita Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers\"},\"author\":{\"name\":\"Adita Joshi\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/8b428254350df4885f48684a8105c432\"},\"headline\":\"Identifying problematic images: Tips and resources for peer reviewers\",\"datePublished\":\"2022-09-20T13:27:54+00:00\",\"dateModified\":\"2026-03-19T06:06:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers\"},\"wordCount\":1660,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg\",\"keywords\":[\"Ethics of Research\",\"peer review week\",\"Peer Review Week 2022\"],\"articleSection\":[\"Research Ethics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers\",\"url\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers\",\"name\":\"Identifying problematic images: Tips and resources for peer reviewers\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg\",\"datePublished\":\"2022-09-20T13:27:54+00:00\",\"dateModified\":\"2026-03-19T06:06:04+00:00\",\"description\":\"Inappropriate image manipulation has become increasingly prevalent in research publishing. This article talks about peer reviewers' role in flagging unethical elements in research, tips to develop the proficiency to identify manipulated images, and how to escalate the issue to the journal.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#primaryimage\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg\",\"width\":704,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editage.com\/insights\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identifying problematic images: Tips and resources for peer reviewers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editage.com\/insights\/#website\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"name\":\"Editage Insights\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editage.com\/insights\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\",\"name\":\"Editage Insights\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"width\":2560,\"height\":324,\"caption\":\"Editage Insights\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Editage\",\"https:\/\/x.com\/Editage\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/8b428254350df4885f48684a8105c432\",\"name\":\"Adita Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf0c153b7311f05bf9278d01b1ace1e6cf628c67db57eebf3087cb7fdd746527?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf0c153b7311f05bf9278d01b1ace1e6cf628c67db57eebf3087cb7fdd746527?s=96&d=mm&r=g\",\"caption\":\"Adita Joshi\"},\"url\":\"https:\/\/www.editage.com\/insights\/aditaj\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identifying problematic images: Tips and resources for peer reviewers","description":"Inappropriate image manipulation has become increasingly prevalent in research publishing. This article talks about peer reviewers' role in flagging unethical elements in research, tips to develop the proficiency to identify manipulated images, and how to escalate the issue to the journal.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers","og_locale":"en_US","og_type":"article","og_title":"Identifying problematic images: Tips and resources for peer reviewers","og_description":"Inappropriate image manipulation has become increasingly prevalent in research publishing. This article talks about peer reviewers' role in flagging unethical elements in research, tips to develop the proficiency to identify manipulated images, and how to escalate the issue to the journal.","og_url":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers","og_site_name":"Editage Insights","article_publisher":"https:\/\/www.facebook.com\/Editage","article_published_time":"2022-09-20T13:27:54+00:00","article_modified_time":"2026-03-19T06:06:04+00:00","og_image":[{"width":704,"height":384,"url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg","type":"image\/jpeg"}],"author":"Adita Joshi","twitter_card":"summary_large_image","twitter_creator":"@Editage","twitter_site":"@Editage","twitter_misc":{"Written by":"Adita Joshi","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#article","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers"},"author":{"name":"Adita Joshi","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/8b428254350df4885f48684a8105c432"},"headline":"Identifying problematic images: Tips and resources for peer reviewers","datePublished":"2022-09-20T13:27:54+00:00","dateModified":"2026-03-19T06:06:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers"},"wordCount":1660,"commentCount":0,"publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"image":{"@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg","keywords":["Ethics of Research","peer review week","Peer Review Week 2022"],"articleSection":["Research Ethics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers","url":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers","name":"Identifying problematic images: Tips and resources for peer reviewers","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#primaryimage"},"image":{"@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg","datePublished":"2022-09-20T13:27:54+00:00","dateModified":"2026-03-19T06:06:04+00:00","description":"Inappropriate image manipulation has become increasingly prevalent in research publishing. This article talks about peer reviewers' role in flagging unethical elements in research, tips to develop the proficiency to identify manipulated images, and how to escalate the issue to the journal.","breadcrumb":{"@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#primaryimage","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2022\/09\/Gemini_Generated_Image_mwxq8mwxq8mwxq8m.jpg","width":704,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/www.editage.com\/insights\/identifying-problematic-images-tips-and-resources-for-peer-reviewers#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editage.com\/insights\/"},{"@type":"ListItem","position":2,"name":"Identifying problematic images: Tips and resources for peer reviewers"}]},{"@type":"WebSite","@id":"https:\/\/www.editage.com\/insights\/#website","url":"https:\/\/www.editage.com\/insights\/","name":"Editage Insights","description":"","publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editage.com\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.editage.com\/insights\/#organization","name":"Editage Insights","url":"https:\/\/www.editage.com\/insights\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","width":2560,"height":324,"caption":"Editage Insights"},"image":{"@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Editage","https:\/\/x.com\/Editage"]},{"@type":"Person","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/8b428254350df4885f48684a8105c432","name":"Adita Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf0c153b7311f05bf9278d01b1ace1e6cf628c67db57eebf3087cb7fdd746527?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf0c153b7311f05bf9278d01b1ace1e6cf628c67db57eebf3087cb7fdd746527?s=96&d=mm&r=g","caption":"Adita Joshi"},"url":"https:\/\/www.editage.com\/insights\/aditaj"}]}},"_links":{"self":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/3990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/users\/2641"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/comments?post=3990"}],"version-history":[{"count":1,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/3990\/revisions"}],"predecessor-version":[{"id":42968,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/3990\/revisions\/42968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media\/45583"}],"wp:attachment":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media?parent=3990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/categories?post=3990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/tags?post=3990"},{"taxonomy":"new_categories","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_categories?post=3990"},{"taxonomy":"new_tags","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_tags?post=3990"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/series?post=3990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}