Unsupervised learning-based framework for deepfake video detection
L Zhang, T Qiao, M Xu, N Zheng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the continuous development of computer hardware equipment and deep learning
technology, it is easier for people to swap faces in videos by currently-emerging multimedia …
technology, it is easier for people to swap faces in videos by currently-emerging multimedia …
Blind PRNU-based image clustering for source identification
We address the problem of clustering a set of images, according to their source device, in
the absence of any prior information. Image similarity is computed based on noise residuals …
the absence of any prior information. Image similarity is computed based on noise residuals …
Image origin classification based on social network provenance
R Caldelli, R Becarelli, I Amerini - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Recognizing information about the origin of a digital image has been individuated as a
crucial task to be tackled by the image forensic scientific community. Understanding …
crucial task to be tackled by the image forensic scientific community. Understanding …
Image splicing detection, localization and attribution via JPEG primary quantization matrix estimation and clustering
Detection of inconsistencies of double JPEG artifacts across different image regions is often
used to detect local image manipulations, like image splicing, and to localize them. In this …
used to detect local image manipulations, like image splicing, and to localize them. In this …
Multimedia forensics: discovering the history of multimedia contents
Multimedia Forensics is devoted to analyse digital multimedia contents such as photo, video
and audio in order to produce evidences in the forensics domain. Specifically Image …
and audio in order to produce evidences in the forensics domain. Specifically Image …
Smartphone fingerprinting combining features of on-board sensors
I Amerini, R Becarelli, R Caldelli… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Many everyday activities involve the exchange of confidential information through the use of
a smartphone in mobility, ie, sending on e-mail, checking bank account, buying on-line …
a smartphone in mobility, ie, sending on e-mail, checking bank account, buying on-line …
Smartphones identification through the built-in microphones with convolutional neural network
The use of mobile phones or smartphones has become so widespread that most people rely
on them for many services and applications like sending e-mails, checking the bank …
on them for many services and applications like sending e-mails, checking the bank …
Accurate and scalable image clustering based on sparse representation of camera fingerprint
Clustering images according to their acquisition devices is a well-known problem in
multimedia forensics, which is typically faced by means of camera sensor pattern noise …
multimedia forensics, which is typically faced by means of camera sensor pattern noise …
Beyond prnu: Learning robust device-specific fingerprint for source camera identification
Source-camera identification tools assist image forensics investigators to associate an
image with a camera. The Photo Response Non-Uniformity (PRNU) noise pattern caused by …
image with a camera. The Photo Response Non-Uniformity (PRNU) noise pattern caused by …
Large-scale image retrieval based on compressed camera identification
Retrieving pictures from large collections according to a specific criterion is an increasingly
relevant task. An important, but so far overlooked, such criterion is the retrieval of pictures …
relevant task. An important, but so far overlooked, such criterion is the retrieval of pictures …