A survey of deep learning-based source image forensics
Image source forensics is widely considered as one of the most effective ways to verify in a
blind way digital image authenticity and integrity. In the last few years, many researchers …
blind way digital image authenticity and integrity. In the last few years, many researchers …
Robust detection of image operator chain with two-stream convolutional neural network
Many forensic techniques have recently been developed to determine whether an image
has undergone a specific manipulation operation. When multiple consecutive operations are …
has undergone a specific manipulation operation. When multiple consecutive operations are …
A survey on digital camera identification methods
J Bernacki - Forensic Science International: Digital Investigation, 2020 - Elsevier
Digital forensics is a topic that has attracted many attention. One of the most common tasks
in digital forensics is imaging sensor identification. It may be understood as recognizing …
in digital forensics is imaging sensor identification. It may be understood as recognizing …
Learning generalized deep feature representation for face anti-spoofing
In this paper, we propose a novel framework leveraging the advantages of the
representational ability of deep learning and domain generalization for face spoofing …
representational ability of deep learning and domain generalization for face spoofing …
Intelligent phishing detection scheme using deep learning algorithms
Purpose Phishing attacks have evolved in recent years due to high-tech-enabled economic
growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the …
growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the …
Enhancing unsupervised neural networks based text summarization with word embedding and ensemble learning
N Alami, M Meknassi, N En-Nahnahi - Expert systems with applications, 2019 - Elsevier
The vast amounts of data being collected and analyzed have led to invaluable source of
information, which needs to be easily handled by humans. Automatic Text Summarization …
information, which needs to be easily handled by humans. Automatic Text Summarization …
Deep learning-based forgery attack on document images
With the ongoing popularization of online services, the digital document images have been
used in various applications. Meanwhile, there have emerged some deep learning-based …
used in various applications. Meanwhile, there have emerged some deep learning-based …
Source camera identification based on content-adaptive fusion residual networks
Source camera identification is still a hard task in forensics community, especially for the
case of the query images with small size. In this paper, we propose a solution to identify the …
case of the query images with small size. In this paper, we propose a solution to identify the …
Computer graphics identification combining convolutional and recurrent neural networks
In this letter, a deep-learning-based pipeline is proposed to distinguish photographics (PGs)
from computer-graphics (CGs) combining convolutional neural network (CNN) and recurrent …
from computer-graphics (CGs) combining convolutional neural network (CNN) and recurrent …
A diverse large-scale dataset for evaluating rebroadcast attacks
We describe the acquisition of a large, diverse set of rebroadcast images captured by a
screen-grab, scanning a printed photo, or rephotographing a displayed or a printed photo …
screen-grab, scanning a printed photo, or rephotographing a displayed or a printed photo …