|
|
|
Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existin...
ver más
|
|
|
|
|
|
|
Georgios Karantaidis and Constantine Kotropoulos
The detection of computer-generated (CG) multimedia content has become of utmost importance due to the advances in digital image processing and computer graphics. Realistic CG images could be used for fraudulent purposes due to the deceiving recognition ...
ver más
|
|
|
|
|
|
|
Diana Cri?an, Alexandru Irimia, Dan Gota, Liviu Miclea, Adela Puscasiu, Ovidiu Stan and Honoriu Valean
The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ...
ver más
|
|
|
|
|
|
|
Li Fan, Wei Li and Xiaohui Cui
Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks. Therefore, understanding the i...
ver más
|
|
|
|
|
|
|
Aminollah Khormali and Jiann-Shiun Yuan
Recent advancements of Generative Adversarial Networks (GANs) pose emerging yet serious privacy risks threatening digital media?s integrity and trustworthiness, specifically digital video, through synthesizing hyper-realistic images and videos, i.e., Dee...
ver más
|
|
|
|
|
|
|
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet...
ver más
|
|
|
|
|
|
|
Qian Li, Rangding Wang and Dawen Xu
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveill...
ver más
|
|
|
|