Despite the wide variety of methods developed for synthetic image
attrib...
Classification of AI-manipulated content is receiving great attention, f...
In this paper, we propose a Universal Defence based on Clustering and
Ce...
Due to the proliferation and widespread use of deep neural networks (DNN...
Due to the reduction of technological costs and the increase of satellit...
We propose a watermarking method for protecting the Intellectual Propert...
Predicting the country where a picture has been taken from has many pote...
Watermarking has been proposed as a way to protect the Intellectual Prop...
We propose a stealthy clean-label video backdoor attack against Deep Lea...
In this paper, we address a new image forensics task, namely the detecti...
Together with impressive advances touching every aspect of our society, ...
We introduce a new attack against face verification systems based on Dee...
Detection of inconsistencies of double JPEG artefacts across different i...
DNN watermarking is receiving an increasing attention as a suitable mean...
The problem of estimation of the primary quantization matrix in double J...
Transferability of adversarial examples is a key issue to study the secu...
Adversarial examples represent a great security threat for deep learning...
We propose a method to identify the source and target regions of a copy-...
In this paper, we study the vulnerability of anti-spoofing methods based...
CNN-based steganalysis has recently achieved very good performance in
de...
Protecting image manipulation detectors against perfect knowledge attack...
Backdoor attacks against CNNs represent a new threat against deep learni...
Recent studies have shown that Convolutional Neural Networks (CNN) are
r...
Detection of contrast adjustments in the presence of JPEG postprocessing...
We propose a new statistic to improve the pooled version of the triangle...
We study a binary hypothesis testing problem in which a defender must de...
We address the problem of data-driven image manipulation detection in th...
Due to the wide diffusion of JPEG coding standard, the image forensic
co...
We study a variant of the source identification game with training data ...