RAW files are the initial measurement of scene radiance widely used in m...
The widespread use of face retouching filters on short-video platforms h...
In modern social networks, existing style transfer methods suffer from a...
The easy sharing of multimedia content on social media has caused a rapi...
Digital images are vulnerable to nefarious tampering attacks such as con...
Online social networks have stimulated communications over the Internet ...
Videos are prone to tampering attacks that alter the meaning and deceive...
The development of Internet technology has continuously intensified the
...
Image cropping is an inexpensive and effective operation of maliciously
...
Videos can be easily tampered, copied and redistributed by attackers for...
Multimodal fake news detection has attracted many research interests in
...
Deep learning has achieved enormous success in various industrial
applic...
We introduce Imuge, an image tamper resilient generative scheme for imag...
The existing image embedding networks are basically vulnerable to malici...
Previous image forensics schemes for crop detection are only limited on
...
Previous reversible data hiding in encrypted images (RDHEI) schemes can ...