DFDM - A DeepFakes Detection Model Based on Steganography Forensic Network
暂无分享,去创建一个
Yang Zeng | Yu Yang | Xiaochun Guo | Rui Zhan | Yang Zeng | Xiaochun Guo | Yu Yang | Rui Zhan
[1] Siwei Lyu,et al. In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[2] Padmavathi Kora,et al. An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine , 2020, Biomed. Signal Process. Control..
[3] Qiong Zhang,et al. Image Forensics Based on Transfer Learning and Convolutional Neural Network , 2017, IH&MMSec.
[4] Naixue Xiong,et al. Abnormal event detection in crowded scenes based on deep learning , 2016, Multimedia Tools and Applications.
[5] Hao Li,et al. Protecting World Leaders Against Deep Fakes , 2019, CVPR Workshops.
[6] Jiliu Zhou,et al. Text Detection and Recognition for Natural Scene Images Using Deep Convolutional Neural Networks , 2019 .
[7] M. S. Sannidhan,et al. Evaluating the performance of face sketch generation using generative adversarial networks , 2019, Pattern Recognit. Lett..
[8] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[9] Khaled Salah,et al. Combating Deepfake Videos Using Blockchain and Smart Contracts , 2019, IEEE Access.
[10] Rasmus Nyholm Jørgensen,et al. Generating artificial images of plant seedlings using generative adversarial networks , 2019, Biosystems Engineering.
[11] Peyman Ayubi,et al. A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map , 2019, Optik.
[12] Xiaodong Liu,et al. A Review on Deep Learning Approaches to Image Classification and Object Segmentation , 2019, Computers, Materials & Continua.
[13] Naixue Xiong,et al. Adaptive unequal protection for wireless video transmission over IEEE 802.11e networks , 2013, Multimedia Tools and Applications.
[14] Naixue Xiong,et al. A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications , 2011, IEEE Systems Journal.
[15] Sakshi Agarwal,et al. Limits of Deepfake Detection: A Robust Estimation Viewpoint , 2019, ArXiv.
[16] Paul Babyn,et al. Generative Adversarial Network in Medical Imaging: A Review , 2018, Medical Image Anal..
[17] Chen Li,et al. R2N: A Novel Deep Learning Architecture for Rain Removal from Single Image , 2019, Computers, Materials & Continua.
[18] Thomas S. Huang,et al. Image processing , 1971 .
[19] Antonella Santone,et al. Radiomic Features for Medical Images Tamper Detection by Equivalence Checking , 2019, KES.
[20] Rajesh Kumar,et al. Analysis of ResNet and GoogleNet models for malware detection , 2018, Journal of Computer Virology and Hacking Techniques.
[21] Xin Yang,et al. Exposing Deep Fakes Using Inconsistent Head Poses , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[22] Cláudia Brito,et al. Electrocardiogram Beat-Classification Based on a ResNet Network , 2019, MedInfo.