Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints
暂无分享,去创建一个
Mario Fritz | Ning Yu | Larry Davis | Larry S. Davis | Mario Fritz | Larry Davis | Ning Yu
[1] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Efstathios Stamatatos,et al. A survey of modern authorship attribution methods , 2009, J. Assoc. Inf. Sci. Technol..
[3] Justus Thies,et al. Face2Face: real-time face capture and reenactment of RGB videos , 2019, Commun. ACM.
[4] Andrew Owens,et al. Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.
[5] Yoav Goldberg,et al. A Primer on Neural Network Models for Natural Language Processing , 2015, J. Artif. Intell. Res..
[6] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[7] Patrick Pérez,et al. State of the Art on Monocular 3D Face Reconstruction, Tracking, and Applications , 2018, Comput. Graph. Forum.
[8] Alexei A. Efros,et al. Toward Multimodal Image-to-Image Translation , 2017, NIPS.
[9] Carlos D. Castillo,et al. SfSNet: Learning Shape, Reflectance and Illuminance of Faces 'in the Wild' , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[10] Roland Vollgraf,et al. Texture Synthesis with Spatial Generative Adversarial Networks , 2016, ArXiv.
[11] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[12] Andreas Rössler,et al. FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces , 2018, ArXiv.
[13] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[14] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[15] Junichi Yamagishi,et al. MesoNet: a Compact Facial Video Forgery Detection Network , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[16] Larry S. Davis,et al. Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[17] Jeff Donahue,et al. Large Scale GAN Training for High Fidelity Natural Image Synthesis , 2018, ICLR.
[18] Ira Kemelmacher-Shlizerman,et al. Synthesizing Obama , 2017, ACM Trans. Graph..
[19] Arthur Gretton,et al. Demystifying MMD GANs , 2018, ICLR.
[20] Bolin Chen,et al. Fake Faces Identification via Convolutional Neural Network , 2018, IH&MMSec.
[21] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[22] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[23] D. Dowson,et al. The Fréchet distance between multivariate normal distributions , 1982 .
[24] Bolei Zhou,et al. GAN Dissection: Visualizing and Understanding Generative Adversarial Networks , 2018, ICLR.
[25] Seong Joon Oh,et al. Towards Reverse-Engineering Black-Box Neural Networks , 2017, ICLR.
[26] Luisa Verdoliva,et al. Do GANs Leave Artificial Fingerprints? , 2018, 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
[27] H. Farid. Photo Forensics , 2016 .
[28] Shin'ichi Satoh,et al. Embedding Watermarks into Deep Neural Networks , 2017, ICMR.
[29] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[30] Kusuma Kumari. A Survey of Digital Watermarking Techniques and its Applications , 2013 .
[31] Roland Vollgraf,et al. Learning Texture Manifolds with the Periodic Spatial GAN , 2017, ICML.
[32] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[33] Chuan Li,et al. Precomputed Real-Time Texture Synthesis with Markovian Generative Adversarial Networks , 2016, ECCV.
[34] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[35] Andreas Rössler,et al. ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection , 2018, ArXiv.
[36] Davide Cozzolino,et al. A PatchMatch-Based Dense-Field Algorithm for Video Copy–Move Detection and Localization , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[37] Jean-Luc Dugelay,et al. Face aging with conditional generative adversarial networks , 2017, 2017 IEEE International Conference on Image Processing (ICIP).
[38] Aaron C. Courville,et al. Improved Training of Wasserstein GANs , 2017, NIPS.
[39] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[40] B. S. Manjunath,et al. Exploiting Spatial Structure for Localizing Manipulated Image Regions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[41] Alexei A. Efros,et al. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[42] Léon Bottou,et al. Wasserstein Generative Adversarial Networks , 2017, ICML.
[43] Dani Lischinski,et al. Non-stationary texture synthesis by adversarial expansion , 2018, ACM Trans. Graph..
[44] Alexei A. Efros,et al. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[45] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[46] Davide Cozzolino,et al. Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.
[47] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[48] Vishal Shrivastava,et al. A Survey of Digital Watermarking Techniques and its Applications , 2014, ArXiv.
[49] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[50] Edward H. Adelson,et al. The Laplacian Pyramid as a Compact Image Code , 1983, IEEE Trans. Commun..
[51] Davide Cozzolino,et al. Detection of GAN-Generated Fake Images over Social Networks , 2018, 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
[52] L Sirovich,et al. Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.
[53] Marc G. Bellemare,et al. The Cramer Distance as a Solution to Biased Wasserstein Gradients , 2017, ArXiv.
[54] Eli Shechtman,et al. Texture Mixer: A Network for Controllable Synthesis and Interpolation of Texture , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[55] Paolo Bestagini,et al. Local tampering detection in video sequences , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[56] Yinda Zhang,et al. LSUN: Construction of a Large-scale Image Dataset using Deep Learning with Humans in the Loop , 2015, ArXiv.
[57] Nasir Memon,et al. Digital Image Forensics: There is More to a Picture than Meets the Eye , 2012 .
[58] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[59] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[60] Bolei Zhou,et al. Visualizing and Understanding Generative Adversarial Networks (Extended Abstract) , 2019, ArXiv.
[61] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[62] Justus Thies,et al. Real-time expression transfer for facial reenactment , 2015, ACM Trans. Graph..
[63] Davide Cozzolino,et al. Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.
[64] Simon S. Woo,et al. Detecting Both Machine and Human Created Fake Face Images In the Wild , 2018, MPS@CCS.
[65] Yuichi Yoshida,et al. Spectral Normalization for Generative Adversarial Networks , 2018, ICLR.
[66] Ariel Stolerman,et al. Doppelgänger Finder: Taking Stylometry to the Underground , 2014, 2014 IEEE Symposium on Security and Privacy.
[67] Hui Wu,et al. Protecting Intellectual Property of Deep Neural Networks with Watermarking , 2018, AsiaCCS.
[68] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[69] Sepp Hochreiter,et al. GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium , 2017, NIPS.