Secure detection of image manipulation by means of random feature selection Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni IEEE Transactions on Information Forensics and Security 14 (9), 2454-2469, 2019 | 40 | 2019 |
A gradient-based pixel-domain attack against SVM detection of global image manipulations Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni 2017 IEEE workshop on information forensics and security (WIFS), 1-6, 2017 | 34 | 2017 |
Detection of operation chain: JPEG-resampling-JPEG Z Chen, Y Zhao, R Ni Signal Processing: Image Communication 57, 8-20, 2017 | 31* | 2017 |
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder M Barni, Z Chen, B Tondi 2016 IEEE international workshop on information forensics and security (WIFS …, 2016 | 30 | 2016 |
Forensics of blurred images based on no-reference image quality assessment Z Chen, Y Zhao, R Ni 2013 IEEE China Summit and International Conference on Signal and …, 2013 | 6 | 2013 |
The forensicability of operation detection in image operation chain Z Chen, J Zhu, J Zhang IEEE Access 10, 68557-68569, 2022 | 5 | 2022 |
Detecting the operation chain in digital images by type and order fingerprint Z Chen, Y Zhao, R Ni 2014 12th International Conference on Signal Processing (ICSP), 1837-1842, 2014 | 2 | 2014 |
Adversarial complementary learning for just noticeable difference estimation D Yu, J Jin, L Meng, Z Chen, H Zhang KSII Transactions on Internet and Information Systems, 2024 | | 2024 |
8th IEEE International Workshop on Information Forensics and Security M Barni, MFE Authentication, N Buescher, S Computation, M Chaumont, ... | | |