A survey of deep learning-based source image forensics

P Yang, D Baracchi, R Ni, Y Zhao, F Argenti, A Piva - Journal of Imaging, 2020 - mdpi.com
Image source forensics is widely considered as one of the most effective ways to verify in a
blind way digital image authenticity and integrity. In the last few years, many researchers …

Robust detection of image operator chain with two-stream convolutional neural network

X Liao, K Li, X Zhu, KJR Liu - IEEE Journal of Selected Topics …, 2020 - ieeexplore.ieee.org
Many forensic techniques have recently been developed to determine whether an image
has undergone a specific manipulation operation. When multiple consecutive operations are …

A survey on digital camera identification methods

J Bernacki - Forensic Science International: Digital Investigation, 2020 - Elsevier
Digital forensics is a topic that has attracted many attention. One of the most common tasks
in digital forensics is imaging sensor identification. It may be understood as recognizing …

Learning generalized deep feature representation for face anti-spoofing

H Li, P He, S Wang, A Rocha, X Jiang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel framework leveraging the advantages of the
representational ability of deep learning and domain generalization for face spoofing …

Intelligent phishing detection scheme using deep learning algorithms

MA Adebowale, KT Lwin, MA Hossain - Journal of Enterprise …, 2023 - emerald.com
Purpose Phishing attacks have evolved in recent years due to high-tech-enabled economic
growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the …

Enhancing unsupervised neural networks based text summarization with word embedding and ensemble learning

N Alami, M Meknassi, N En-Nahnahi - Expert systems with applications, 2019 - Elsevier
The vast amounts of data being collected and analyzed have led to invaluable source of
information, which needs to be easily handled by humans. Automatic Text Summarization …

Deep learning-based forgery attack on document images

L Zhao, C Chen, J Huang - IEEE Transactions on Image …, 2021 - ieeexplore.ieee.org
With the ongoing popularization of online services, the digital document images have been
used in various applications. Meanwhile, there have emerged some deep learning-based …

Source camera identification based on content-adaptive fusion residual networks

P Yang, R Ni, Y Zhao, W Zhao - Pattern Recognition Letters, 2019 - Elsevier
Source camera identification is still a hard task in forensics community, especially for the
case of the query images with small size. In this paper, we propose a solution to identify the …

Computer graphics identification combining convolutional and recurrent neural networks

P He, X Jiang, T Sun, H Li - IEEE Signal Processing Letters, 2018 - ieeexplore.ieee.org
In this letter, a deep-learning-based pipeline is proposed to distinguish photographics (PGs)
from computer-graphics (CGs) combining convolutional neural network (CNN) and recurrent …

A diverse large-scale dataset for evaluating rebroadcast attacks

S Agarwal, W Fan, H Farid - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
We describe the acquisition of a large, diverse set of rebroadcast images captured by a
screen-grab, scanning a printed photo, or rephotographing a displayed or a printed photo …