Quantization Step Estimation for JPEG Image Forensics | 0 | 0.34 | 2022 |
Detection of Double JPEG Compression With the Same Quantization Matrix via Convergence Analysis | 0 | 0.34 | 2022 |
Detection of AI-Manipulated Fake Faces via Mining Generalized Features | 0 | 0.34 | 2022 |
MFAN: Multi-Level Features Attention Network for Fake Certificate Image Detection | 0 | 0.34 | 2022 |
ET: Edge-Enhanced Transformer for Image Splicing Detection | 0 | 0.34 | 2022 |
Exploring Complementarity of Global and Local Spatiotemporal Information for Fake Face Video Detection. | 0 | 0.34 | 2022 |
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering | 0 | 0.34 | 2021 |
Enhancing Adversarial Examples Transferability via Ensemble Feature Manifolds | 0 | 0.34 | 2021 |
Dual-Domain Fusion Convolutional Neural Network for Contrast Enhancement Forensics | 0 | 0.34 | 2021 |
Anti-Forensics Of Image Contrast Enhancement Based On Generative Adversarial Network | 0 | 0.34 | 2021 |
Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios. | 0 | 0.34 | 2021 |
Attention Guided Spatio-Temporal Artifacts Extraction for Deepfake Detection. | 0 | 0.34 | 2021 |
Pvo-Based Reversible Data Hiding Using Adaptive Multiple Histogram Generation And Modification | 0 | 0.34 | 2021 |
A Survey of Deep Learning-Based Source Image Forensics | 3 | 0.36 | 2020 |
Improved PPVO-based high-fidelity reversible data hiding. | 4 | 0.38 | 2020 |
Double compression detection for H.264 videos with adaptive GOP structure | 2 | 0.37 | 2020 |
Efficient Video Integrity Analysis Through Container Characterization | 1 | 0.35 | 2020 |
Primary Quality Factor Estimation Of Resized Double Compressed Jpeg Images | 0 | 0.34 | 2020 |
Source camera identification based on content-adaptive fusion residual networks | 5 | 0.46 | 2019 |
Reversible data hiding based on pairwise embedding and optimal expansion path. | 3 | 0.37 | 2019 |
An enhanced approach for detecting double JPEG compression with the same quantization matrix | 4 | 0.42 | 2019 |
Robust median filtering detection based on the difference of frequency residuals | 2 | 0.37 | 2019 |
Improved reversible data hiding based on PVO and adaptive pairwise embedding | 3 | 0.38 | 2019 |
An approach to detect video frame deletion under anti-forensics | 1 | 0.34 | 2019 |
Detection And Localization Of Video Object Removal By Spatio-Temporal Lbp Coherence Analysis | 0 | 0.34 | 2019 |
A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution | 0 | 0.34 | 2019 |
Cycle Gan-Based Attack On Recaptured Images To Fool Both Human And Machine | 0 | 0.34 | 2018 |
Robust Contrast Enhancement Forensics Using Convolutional Neural Networks. | 0 | 0.34 | 2018 |
Copy-Move Forgery Localization Using Convolutional Neural Networks and CFA Features | 1 | 0.34 | 2018 |
A New Dataset for Source Identification of High Dynamic Range Images. | 1 | 0.36 | 2018 |
Security Consideration For Deep Learning-Based Image Forensics | 1 | 0.36 | 2018 |
Facial Expression Recognition Using Weighted Mixture Deep Neural Network Based on Double-Channel Facial Images. | 4 | 0.39 | 2018 |
Nonoverlapping Blocks Based Copy-Move Forgery Detection | 1 | 0.43 | 2018 |
Median filtering detection of small-size image based on CNN. | 7 | 0.54 | 2018 |
Secure Detection of Image Manipulation by Means of Random Feature Selection | 3 | 0.35 | 2018 |
Anomaly Detection in Moving Crowds through Spatiotemporal Autoencoding and Additional Attention | 1 | 0.34 | 2018 |
Double JPEG Compression Detection by Exploring the Correlations in DCT Domain. | 1 | 0.36 | 2018 |
Detection of various image operations based on CNN. | 0 | 0.34 | 2017 |
Source Camera Identification Based On Content-Adaptive Fusion Network. | 1 | 0.37 | 2017 |
A gradient-based pixel-domain attack against SVM detection of global image manipulations | 1 | 0.34 | 2017 |
A 3D mesh watermarking based on improved vertex grouping and piecewise mapping function | 0 | 0.34 | 2017 |
Robust median filtering detection based on local difference descriptor. | 11 | 0.53 | 2017 |
Detection of operation chain: JPEG-Resampling-JPEG. | 0 | 0.34 | 2017 |
A new detector for JPEG decompressed bitmap identification. | 0 | 0.34 | 2017 |
Detection of Seam Carving and Contrast Enhancement Operation Chain | 0 | 0.34 | 2015 |
Detection for Operation Chain: Histogram Equalization and Dither-like Operation. | 0 | 0.34 | 2015 |
Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding. | 21 | 0.61 | 2015 |
On the Security of Image Manipulation Forensics | 0 | 0.34 | 2015 |
Redundancy filtering and fusion verification for video copy detection | 1 | 0.35 | 2015 |
An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens. | 3 | 0.54 | 2015 |