Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deepfake detection by analyzing convolutional traces
The Deepfake phenomenon has become very popular nowadays thanks to the possibility to
create incredibly realistic images using deep learning tools, based mainly on ad-hoc …
create incredibly realistic images using deep learning tools, based mainly on ad-hoc …
Fighting deepfake by exposing the convolutional traces on images
Advances in Artificial Intelligence and Image Processing are changing the way people
interacts with digital images and video. Widespread mobile apps like FACEAPP make use of …
interacts with digital images and video. Widespread mobile apps like FACEAPP make use of …
Preliminary forensics analysis of deepfake images
One of the most terrifying phenomenon nowadays is the Deepfake: the possibility to
automatically replace a person's face in images and videos by exploiting algorithms based …
automatically replace a person's face in images and videos by exploiting algorithms based …
[HTML][HTML] CNN-based first quantization estimation of double compressed JPEG images
Multiple JPEG compressions leave artifacts in digital images: residual traces that could be
exploited in forensics investigations to recover information about the device employed for …
exploited in forensics investigations to recover information about the device employed for …
Exploiting AC Histogram Statistics for Misalignment Estimation in Double JPEG Compressed Images
A critical task in forensics investigation is the recovery of the manipulation history of the
image under analysis. To this aim, considering a typical life-cycle of a digital image, the …
image under analysis. To this aim, considering a typical life-cycle of a digital image, the …
Deep forgery discriminator via image degradation analysis
Generative adversarial network‐based deep generative model is widely applied in creating
hyper‐realistic face‐swap** images and videos. However, its malicious use has posed a …
hyper‐realistic face‐swap** images and videos. However, its malicious use has posed a …
First quantization estimation by a robust data exploitation strategy of DCT coefficients
It is well known that the JPEG compression pipeline leaves residual traces in the
compressed images that are useful for forensic investigations. Through the analysis of such …
compressed images that are useful for forensic investigations. Through the analysis of such …
Estimating previous quantization factors on multiple JPEG compressed images
The JPEG compression algorithm has proven to be efficient in saving storage and
preserving image quality thus becoming extremely popular. On the other hand, the overall …
preserving image quality thus becoming extremely popular. On the other hand, the overall …
Deepfake style transfer mixture: a first forensic ballistics study on synthetic images
Most recent style-transfer techniques based on generative architectures are able to obtain
synthetic multimedia contents, or commonly called deepfakes, with almost no artifacts …
synthetic multimedia contents, or commonly called deepfakes, with almost no artifacts …
A robust misalignment estimation approach in non-aligned double JPEG compression scenario
The estimation of the misalignment between consecutive JPEG compressions is a really
important task that can be useful in forensics investigation for first quantization matrix …
important task that can be useful in forensics investigation for first quantization matrix …