DFDM - A DeepFakes Detection Model Based on Steganography Forensic Network

[1]  Siwei Lyu,et al.  In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).

[2]  Padmavathi Kora,et al.  An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine , 2020, Biomed. Signal Process. Control..

[3]  Qiong Zhang,et al.  Image Forensics Based on Transfer Learning and Convolutional Neural Network , 2017, IH&MMSec.

[4]  Naixue Xiong,et al.  Abnormal event detection in crowded scenes based on deep learning , 2016, Multimedia Tools and Applications.

[5]  Hao Li,et al.  Protecting World Leaders Against Deep Fakes , 2019, CVPR Workshops.

[6]  Jiliu Zhou,et al.  Text Detection and Recognition for Natural Scene Images Using Deep Convolutional Neural Networks , 2019 .

[7]  M. S. Sannidhan,et al.  Evaluating the performance of face sketch generation using generative adversarial networks , 2019, Pattern Recognit. Lett..

[8]  Andreas Rössler,et al.  FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[9]  Khaled Salah,et al.  Combating Deepfake Videos Using Blockchain and Smart Contracts , 2019, IEEE Access.

[10]  Rasmus Nyholm Jørgensen,et al.  Generating artificial images of plant seedlings using generative adversarial networks , 2019, Biosystems Engineering.

[11]  Peyman Ayubi,et al.  A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map , 2019, Optik.

[12]  Xiaodong Liu,et al.  A Review on Deep Learning Approaches to Image Classification and Object Segmentation , 2019, Computers, Materials & Continua.

[13]  Naixue Xiong,et al.  Adaptive unequal protection for wireless video transmission over IEEE 802.11e networks , 2013, Multimedia Tools and Applications.

[14]  Naixue Xiong,et al.  A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications , 2011, IEEE Systems Journal.

[15]  Sakshi Agarwal,et al.  Limits of Deepfake Detection: A Robust Estimation Viewpoint , 2019, ArXiv.

[16]  Paul Babyn,et al.  Generative Adversarial Network in Medical Imaging: A Review , 2018, Medical Image Anal..

[17]  Chen Li,et al.  R2N: A Novel Deep Learning Architecture for Rain Removal from Single Image , 2019, Computers, Materials & Continua.

[18]  Thomas S. Huang,et al.  Image processing , 1971 .

[19]  Antonella Santone,et al.  Radiomic Features for Medical Images Tamper Detection by Equivalence Checking , 2019, KES.

[20]  Rajesh Kumar,et al.  Analysis of ResNet and GoogleNet models for malware detection , 2018, Journal of Computer Virology and Hacking Techniques.

[21]  Xin Yang,et al.  Exposing Deep Fakes Using Inconsistent Head Poses , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Cláudia Brito,et al.  Electrocardiogram Beat-Classification Based on a ResNet Network , 2019, MedInfo.