Media Forensics and DeepFakes: An Overview
暂无分享,去创建一个
[1] Amit K. Roy-Chowdhury,et al. Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries , 2019, IEEE Transactions on Image Processing.
[2] Siwei Lyu,et al. Exposing DeepFake Videos By Detecting Face Warping Artifacts , 2018, CVPR Workshops.
[3] Benjamin Cohen,et al. Where and Who? Automatic Semantic-Aware Person Composition , 2017, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).
[4] Davide Cozzolino,et al. Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[5] Shilin Wang,et al. Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis , 2018, IEEE Transactions on Information Forensics and Security.
[6] Dorothea Kolossa,et al. Leveraging Frequency Analysis for Deep Fake Image Recognition , 2020, ICML.
[7] Gianluca Roscigno,et al. A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms , 2014, 2014 17th International Conference on Network-Based Information Systems.
[8] Hany Farid,et al. Photo forensics from JPEG dimples , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[9] Matthew C. Stamm,et al. The Video Authentication and Camera Identification Database: A New Database for Video Forensics , 2019, IEEE Access.
[10] Rainer Böhme,et al. Can we trust digital image forensics? , 2007, ACM Multimedia.
[11] Premkumar Natarajan,et al. Recurrent Convolutional Strategies for Face Manipulation Detection in Videos , 2019, CVPR Workshops.
[12] Alex ChiChung Kot,et al. Accurate Detection of Demosaicing Regularity for Digital Image Forensics , 2009, IEEE Transactions on Information Forensics and Security.
[13] Timo Aila,et al. A Style-Based Generator Architecture for Generative Adversarial Networks , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Gregory Dudek,et al. Detecting GAN generated errors , 2019, ArXiv.
[15] Anthony Hoogs,et al. A Coarse-to-fine Deep Convolutional Neural Network Framework for Frame Duplication Detection and Localization in Forged Videos , 2018, CVPR Workshops.
[16] Baoyuan Wu,et al. Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with Adversarial Perturbations , 2019, ArXiv.
[17] Yiannis Kompatsiaris,et al. Large-scale evaluation of splicing localization algorithms for web images , 2017, Multimedia Tools and Applications.
[18] Luisa Verdoliva,et al. Do GANs Leave Artificial Fingerprints? , 2018, 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
[19] Alessandro Piva,et al. Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[20] Matthew C. Stamm,et al. Exposing Fake Images With Forensic Similarity Graphs , 2020, IEEE Journal of Selected Topics in Signal Processing.
[21] Stefan Winkler,et al. COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[22] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[23] Andrew Owens,et al. Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.
[24] H. Farid. Photo Forensics , 2016 .
[25] Jing Dong,et al. CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[26] Jan Kautz,et al. Video-to-Video Synthesis , 2018, NeurIPS.
[27] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[28] Mo Chen,et al. Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.
[29] Oscar C. Au,et al. Inter-channel demosaicking traces for digital image forensics , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[30] Anderson Rocha,et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..
[31] Hugo Proença,et al. Real or Fake? Spoofing State-Of-The-Art Face Synthesis Detection Systems , 2019, ArXiv.
[32] Junfeng He,et al. Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.
[33] Giulia Boato,et al. RAISE: a raw images dataset for digital image forensics , 2015, MMSys.
[34] Hongxia Wang,et al. Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[35] Jaakko Lehtinen,et al. Analyzing and Improving the Image Quality of StyleGAN , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[36] Julian Fierrez,et al. GANprintR: Improved Fakes and Evaluation of the State of the Art in Face Manipulation Detection , 2019, IEEE Journal of Selected Topics in Signal Processing.
[37] Davide Cozzolino,et al. Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[38] Davide Cozzolino,et al. Camera-based Image Forgery Localization using Convolutional Neural Networks , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[39] David Vazquez-Padin,et al. Detection of video double encoding with GOP size estimation , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[40] Davide Cozzolino,et al. Multiple Classifier Systems for Image Forgery Detection , 2013, ICIAP.
[41] Arnav Bhavsar,et al. Detecting Deepfakes with Metric Learning , 2020, 2020 8th International Workshop on Biometrics and Forensics (IWBF).
[42] Matthew C. Stamm,et al. Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification , 2019, IEEE Transactions on Information Forensics and Security.
[43] Victor Lempitsky,et al. Few-Shot Adversarial Learning of Realistic Neural Talking Head Models , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[44] Wei Lu,et al. Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..
[45] Davide Cozzolino,et al. Residual-based forensic comparison of video sequences , 2017, 2017 IEEE International Conference on Image Processing (ICIP).
[46] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[47] Tal Hassner,et al. FSGAN: Subject Agnostic Face Swapping and Reenactment , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[48] Khaled Salah,et al. Combating Deepfake Videos Using Blockchain and Smart Contracts , 2019, IEEE Access.
[49] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[50] Margret Keuper,et al. Watch Your Up-Convolution: CNN Based Generative Deep Neural Networks Are Failing to Reproduce Spectral Distributions , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Yao Zhao,et al. A gradient-based pixel-domain attack against SVM detection of global image manipulations , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[52] Weihong Wang,et al. Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.
[53] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[54] Luisa Verdoliva,et al. On the vulnerability of deep learning to adversarial attacks for camera model identification , 2018, Signal Process. Image Commun..
[55] Premkumar Natarajan,et al. ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[56] Paolo Bestagini,et al. Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier , 2018, Media Watermarking, Security, and Forensics.
[57] Junichi Yamagishi,et al. MesoNet: a Compact Facial Video Forgery Detection Network , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[58] Yuxing Wu,et al. Exposing video inter-frame forgery based on velocity field consistency , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[59] Paolo Bestagini,et al. Local tampering detection in video sequences , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[60] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[61] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[62] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[63] Alberto Del Bimbo,et al. Deepfake Video Detection through Optical Flow Based CNN , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).
[64] Sonja Grgic,et al. CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.
[65] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2018, CCS.
[66] Y.-L. Chen,et al. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.
[67] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[68] Chen Change Loy,et al. DeeperForensics-1.0: A Large-Scale Dataset for Real-World Face Forgery Detection , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[69] Hany Farid,et al. Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.
[70] Mauro Barni,et al. Copy Move Source-Target Disambiguation Through Multi-Branch CNNs , 2021, IEEE Transactions on Information Forensics and Security.
[71] Chia-Wen Lin,et al. Video forgery detection using correlation of noise residue , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[72] Matthew C. Stamm,et al. Learned Forensic Source Similarity for Unknown Camera Models , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[73] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[74] Davide Cozzolino,et al. Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.
[75] Marina Del Rey,et al. Deep Matching and Validation Network: An End-to-End Solution to Constrained Image Splicing Localization and Detection , 2017, ACM Multimedia.
[76] Matthew C. Stamm,et al. Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration , 2018, IEEE Transactions on Information Forensics and Security.
[77] Paolo Bestagini,et al. A Counter-Forensic Method for CNN-Based Camera Model Identification , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[78] Tiberio Uricchio,et al. Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[79] Edward J. Delp,et al. Deepfake Video Detection Using Recurrent Neural Networks , 2018, 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[80] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[81] Bin Li,et al. Identification of deep network generated images using disparities in color components , 2020, Signal Process..
[82] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[83] Heung-Kyu Lee,et al. Double JPEG Detection in Mixed JPEG Quality Factors Using Deep Convolutional Neural Network , 2018, ECCV.
[84] C.-C. Jay Kuo,et al. Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN) , 2017, J. Vis. Commun. Image Represent..
[85] Edward Y. Chang,et al. RelGAN: Multi-Domain Image-to-Image Translation via Relative Attributes , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[86] Aleksander Madry,et al. Adversarial Robustness as a Prior for Learned Representations , 2019 .
[87] Pavel Korshunov,et al. Tampered Speaker Inconsistency Detection with Phonetically Aware Audio-visual Features , 2019, ICML 2019.
[88] Bernt Schiele,et al. Adversarial Scene Editing: Automatic Object Removal from Weak Supervision , 2018, NeurIPS.
[89] Mo Chen,et al. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries , 2007, Information Hiding.
[90] Daniel Cohen-Or,et al. Bringing portraits to life , 2017, ACM Trans. Graph..
[91] Hao Li,et al. Protecting World Leaders Against Deep Fakes , 2019, CVPR Workshops.
[92] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[93] Mauro Barni,et al. A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.
[94] Jing Dong,et al. Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.
[95] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[96] Siwei Lyu,et al. Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[97] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[98] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[99] Chip-Hong Chang,et al. A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification , 2020, IEEE Transactions on Information Forensics and Security.
[100] Justus Thies,et al. Deferred neural rendering , 2019, ACM Trans. Graph..
[101] Davide Cozzolino,et al. Extracting camera-based fingerprints for video forensics , 2019, CVPR Workshops.
[102] Junichi Yamagishi,et al. Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[103] Jing Dong,et al. On the generalization of GAN image forensics , 2019, CCBR.
[104] Bernt Schiele,et al. Generative Adversarial Text to Image Synthesis , 2016, ICML.
[105] Yiannis Kompatsiaris,et al. A corpus of debunked and verified user-generated videos , 2019, Online Inf. Rev..
[106] Priyanka Singh,et al. Robust Homomorphic Image Hashing , 2019, CVPR Workshops.
[107] Paolo Bestagini,et al. Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks , 2017, J. Vis. Commun. Image Represent..
[108] Babak Mahdian,et al. Using noise inconsistencies for blind image forensics , 2009, Image Vis. Comput..
[109] Jean-Luc Dugelay,et al. Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones , 2017, Media Watermarking, Security, and Forensics.
[110] Jeff Donahue,et al. Large Scale GAN Training for High Fidelity Natural Image Synthesis , 2018, ICLR.
[111] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[112] Heung-Kyu Lee,et al. Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks , 2018, IEEE Signal Processing Letters.
[113] Alessandro Piva,et al. Image and Video Processing History Recovery , 2015 .
[114] Larry S. Davis,et al. Generate, Segment, and Refine: Towards Generic Manipulation Segmentation , 2018, AAAI.
[115] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[116] Alex ChiChung Kot,et al. Blurred Image Splicing Localization by Exposing Blur Type Inconsistency , 2015, IEEE Transactions on Information Forensics and Security.
[117] Shaziya .P.S. Khan,et al. Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .
[118] Xu Zhang,et al. Detecting and Simulating Artifacts in GAN Fake Images , 2019, 2019 IEEE International Workshop on Information Forensics and Security (WIFS).
[119] Anderson Rocha,et al. Video Phylogeny: Recovering near-duplicate video relationships , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[120] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[121] Dan Boneh,et al. How Relevant Is the Turing Test in the Age of Sophisbots? , 2019, IEEE Security & Privacy.
[122] Jiwu Huang,et al. Evaluation of random field models in multi-modal unsupervised tampering localization , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[123] Francesco G. B. De Natale,et al. 3D-Model-Based Video Analysis for Computer Generated Faces Identification , 2015, IEEE Transactions on Information Forensics and Security.
[124] Sumit Kumar Jha,et al. Predicting Heart Rate Variations of Deepfake Videos using Neural ODE , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).
[125] Cristian Canton-Ferrer,et al. The Deepfake Detection Challenge (DFDC) Preview Dataset , 2019, ArXiv.
[126] Jiwu Huang,et al. Localization of Deep Inpainting Using High-Pass Fully Convolutional Network , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[127] Sébastien Marcel,et al. DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.
[128] Jessica J. Fridrich,et al. Deep Learning for Detecting Processing History of Images , 2018, Media Watermarking, Security, and Forensics.
[129] Li Chen,et al. SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression , 2018, KDD.
[130] Mauro Barni,et al. Identification of cut & paste tampering by means of double-JPEG detection and image segmentation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[131] Rainer Böhme,et al. Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.
[132] Nenghai Yu,et al. Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..
[133] Apostol Natsev,et al. YouTube-8M: A Large-Scale Video Classification Benchmark , 2016, ArXiv.
[134] Christian Riess,et al. Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations , 2019, 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW).
[135] Hany Farid,et al. Digital Image Ballistics from JPEG Quantization , 2006 .
[136] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[137] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[138] Siwei Lyu,et al. How realistic is photorealistic , 2005 .
[139] Shih-Fu Chang,et al. A Data Set of Authentic and Spliced Image Blocks , 2004 .
[140] Paolo Bestagini,et al. We Need No Pixels: Video Manipulation Detection Using Stream Descriptors , 2019, ArXiv.
[141] Hany Farid,et al. Evading Deepfake-Image Detectors with White- and Black-Box Attacks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[142] Xing Zhang,et al. Exposing Region Splicing Forgeries with Blind Local Noise Estimation , 2013, International Journal of Computer Vision.
[143] Saniat Javid Sohrawardi,et al. Poster: Towards Robust Open-World Detection of Deepfakes , 2019, CCS.
[144] Ilke Demir,et al. FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals , 2019, IEEE transactions on pattern analysis and machine intelligence.
[145] Qing Wang,et al. Double JPEG compression forensics based on a convolutional neural network , 2016, EURASIP J. Inf. Secur..
[146] Adam Finkelstein,et al. Text-based editing of talking-head video , 2019, ACM Trans. Graph..
[147] Pawel Korus,et al. Digital image integrity - a survey of protection and verification techniques , 2017, Digit. Signal Process..
[148] Joon Son Chung,et al. You said that? , 2017, BMVC.
[149] Jinseok Park,et al. Two-Stream Network for Detecting Double Compression of H.264 Videos , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[150] Babak Mahdian,et al. IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images , 2020, 2020 IEEE Winter Applications of Computer Vision Workshops (WACVW).
[151] Davide Cozzolino,et al. Autoencoder with recurrent neural networks for video forgery detection , 2017, Media Watermarking, Security, and Forensics.
[152] Vasudeva Varma,et al. MVAE: Multimodal Variational Autoencoder for Fake News Detection , 2019, WWW.
[153] Hagit Hel-Or,et al. Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.
[154] Jia Li,et al. Zooming into Face Forensics: A Pixel-level Analysis , 2019, ArXiv.
[155] Xia Hu,et al. Towards Generalizable Deepfake Detection with Locality-aware AutoEncoder , 2019, CIKM.
[156] Christian Riess,et al. Image Forensics from Chroma Subsampling of High-Quality JPEG Images , 2019, IH&MMSec.
[157] Xin Yang,et al. Exposing GAN-synthesized Faces Using Landmark Locations , 2019, IH&MMSec.
[158] Andreas Rössler,et al. SpoC: Spoofing Camera Fingerprints , 2019, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[159] A. Piva,et al. overview paper An overview on video forensics , 2012 .
[160] Andrew Owens,et al. CNN-Generated Images Are Surprisingly Easy to Spot… for Now , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[161] Larry S. Davis,et al. Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[162] Ira Kemelmacher-Shlizerman,et al. Synthesizing Obama , 2017, ACM Trans. Graph..
[163] Antoine Doucet,et al. Find it! Fraud Detection Contest Report , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).
[164] B. S. Manjunath,et al. Detecting GAN generated Fake Images using Co-occurrence Matrices , 2019, Media Watermarking, Security, and Forensics.
[165] Marco Fontani,et al. A Video Forensic Framework for the Unsupervised Analysis of MP4-Like File Container , 2019, IEEE Transactions on Information Forensics and Security.
[166] Giulia Boato,et al. Physiologically-based detection of computer generated faces in video , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[167] Davide Cozzolino,et al. Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.
[168] Nasir D. Memon,et al. Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[169] Cristiano Saltori,et al. Incremental learning for the detection and classification of GAN-generated images , 2019, 2019 IEEE International Workshop on Information Forensics and Security (WIFS).
[170] Siwei Lyu,et al. In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[171] Xianfeng Zhao,et al. Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution , 2019, IEEE Transactions on Information Forensics and Security.
[172] Alexei A. Efros,et al. Everybody Dance Now , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[173] A. De Rosa,et al. Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[174] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[175] Xiaojuan Qi,et al. Global Texture Enhancement for Fake Face Detection in the Wild , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[176] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[177] Marco Fontani,et al. VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.
[178] Davide Cozzolino,et al. PRNU-Based Forgery Localization in a Blind Scenario , 2017, ICIAP.
[179] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[180] Mario Fritz,et al. Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[181] Yiannis Kompatsiaris,et al. Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[182] Eli Shechtman,et al. PatchMatch: a randomized correspondence algorithm for structural image editing , 2009, ACM Trans. Graph..
[183] Jiwu Huang,et al. Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[184] Yao Zhao,et al. A New Dataset for Source Identification of High Dynamic Range Images , 2018, Sensors.
[185] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[186] Davide Cozzolino,et al. A feature-based approach for image tampering detection and localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[187] Farinaz Koushanfar,et al. Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples , 2020, ArXiv.
[188] Xia Hu,et al. Towards Generalizable Forgery Detection with Locality-aware AutoEncoder , 2019, ArXiv.
[189] François Chollet,et al. Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[190] Kiran B. Raja,et al. Fake Face Detection Methods: Can They Be Generalized? , 2018, 2018 International Conference of the Biometrics Special Interest Group (BIOSIG).
[191] Jiwu Huang,et al. Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.
[192] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[193] Junichi Yamagishi,et al. Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[194] Luisa Verdoliva,et al. Analysis of Adversarial Attacks against CNN-based Image Forgery Detectors , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[195] Luisa Verdoliva,et al. Counter-forensics in machine learning based forgery detection , 2015, Electronic Imaging.
[196] Sridha Sridharan,et al. Exploiting Human Social Cognition for the Detection of Fake and Fraudulent Faces via Memory Networks , 2019, ArXiv.
[197] Junichi Yamagishi,et al. Distinguishing computer graphics from natural images using convolution neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[198] Tal Hassner,et al. On Face Segmentation, Face Swapping, and Face Perception , 2017, 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018).
[199] Philip S. Yu,et al. An Introduction to Image Synthesis with Generative Adversarial Nets , 2018, ArXiv.
[200] Davide Cozzolino,et al. Guided filtering for PRNU-based localization of small-size image forgeries , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[201] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[202] Scott McCloskey,et al. Source Generator Attribution via Inversion , 2019, CVPR Workshops.
[203] Heiko Schuldt,et al. The PS-Battles Dataset - an Image Collection for Image Manipulation Detection , 2018, ArXiv.
[204] Scott McCloskey,et al. Detecting GAN-Generated Imagery Using Saturation Cues , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[205] Shih-Fu Chang,et al. Internet image archaeology: automatically tracing the manipulation history of photographs on the web , 2008, ACM Multimedia.
[206] Yang Wei,et al. RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[207] Jonathan G. Fiscus,et al. MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation , 2019, 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW).
[208] Fernando Pérez-González,et al. Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats , 2017, IEEE Transactions on Information Forensics and Security.
[209] Justus Thies,et al. Face2Face: real-time face capture and reenactment of RGB videos , 2019, Commun. ACM.
[210] Yiannis Kompatsiaris,et al. Content-aware detection of JPEG grid inconsistencies for intuitive image forensics , 2018, J. Vis. Commun. Image Represent..
[211] Wael Abd-Almageed,et al. BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.
[212] Chi-Man Pun,et al. An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection , 2020, IEEE Transactions on Information Forensics and Security.
[213] Jan Kautz,et al. Few-shot Video-to-Video Synthesis , 2019, NeurIPS.
[214] Tian-Tsong Ng,et al. Camera response function signature for digital forensics - Part II: Signature extraction , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[215] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[216] Arthur P. Dempster,et al. Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[217] Patrick J. Flynn,et al. Image Provenance Analysis at Scale , 2018, IEEE Transactions on Image Processing.
[218] Hao Li,et al. High-Resolution Image Inpainting Using Multi-scale Neural Patch Synthesis , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[219] Thomas Gloe,et al. Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics , 2010, Electronic Imaging.
[220] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[221] Mauro Barni,et al. On the Transferability of Adversarial Examples against CNN-based Image Forensics , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[222] Shih-Fu Chang,et al. Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection , 2010, IEEE Transactions on Information Forensics and Security.
[223] Nasir D. Memon,et al. Image manipulation detection , 2006, J. Electronic Imaging.
[224] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[225] A. Piva. An Overview on Image Forensics , 2013 .
[226] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[227] Andreas Rössler,et al. ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection , 2018, ArXiv.
[228] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[229] Davide Cozzolino,et al. A PatchMatch-Based Dense-Field Algorithm for Video Copy–Move Detection and Localization , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[230] James F. O'Brien,et al. Exposing photo manipulation with inconsistent shadows , 2013, TOGS.
[231] Davide Cozzolino,et al. Attacking the triangle test in sensor-based camera identification , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[232] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[233] Feng Liu,et al. On the Detection of Digital Face Manipulation , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[234] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[235] Bin Li,et al. Detection of Deep Network Generated Images Using Disparities in Color Components , 2018, ArXiv.
[236] Baining Guo,et al. Face X-Ray for More General Face Forgery Detection , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[237] Andrew Owens,et al. Detecting Photoshopped Faces by Scripting Photoshop , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[238] Wael Abd-Almageed,et al. Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network , 2018, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).
[239] Patrick Pérez,et al. Deep video portraits , 2018, ACM Trans. Graph..
[240] Xin Yang,et al. Exposing Deep Fakes Using Inconsistent Head Poses , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[241] Tsuhan Chen,et al. Image authentication by detecting traces of demosaicing , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[242] Luisa Verdoliva,et al. A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection , 2019, IEEE Access.
[243] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[244] Francesco G. B. De Natale,et al. Discrimination between computer generated and natural human faces based on asymmetry information , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[245] Takahiro Okabe,et al. Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions , 2010, IEEE Transactions on Information Forensics and Security.
[246] Alexei A. Efros,et al. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[247] Chi-Keung Tang,et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..
[248] Jiwu Huang,et al. A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[249] Jianhua Li,et al. Image splicing detection based on noncausal Markov model , 2013, 2013 IEEE International Conference on Image Processing.
[250] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[251] David Vazquez-Padin,et al. Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint , 2020, IEEE Transactions on Information Forensics and Security.
[252] Honggang Qi,et al. Celeb-DF: A New Dataset for DeepFake Forensics , 2019, ArXiv.
[253] Andreas Rössler,et al. FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces , 2018, ArXiv.
[254] Davide Cozzolino,et al. Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[255] Luisa Verdoliva,et al. A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.
[256] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[257] Xiaochun Cao,et al. Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map , 2012, IEEE Transactions on Information Forensics and Security.
[258] Xingming Sun,et al. Identification of Motion-Compensated Frame Rate Up-Conversion Based on Residual Signals , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[259] Nasir D. Memon,et al. Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[260] Fumin Shen,et al. Make a Face: Towards Arbitrary High Fidelity Face Manipulation , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[261] Gaël MAHFOUDI,et al. DEFACTO: Image and Face Manipulation Dataset , 2019, 2019 27th European Signal Processing Conference (EUSIPCO).
[262] Davide Cozzolino,et al. Detection of GAN-Generated Fake Images over Social Networks , 2018, 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
[263] Yiannis Kompatsiaris,et al. Detection and visualization of misleading content on Twitter , 2017, International Journal of Multimedia Information Retrieval.
[264] Matthew C. Stamm,et al. Adversarial Multimedia Forensics: Overview and Challenges Ahead , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[265] Matthias Kirchner,et al. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.
[266] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[267] Jung-Woo Ha,et al. StarGAN: Unified Generative Adversarial Networks for Multi-domain Image-to-Image Translation , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[268] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[269] Mauro Barni,et al. A video forensic technique for detecting frame deletion and insertion , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[270] Taesung Park,et al. Semantic Image Synthesis With Spatially-Adaptive Normalization , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[271] Shih-Fu Chang,et al. Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.