Adversarial examples in modern machine learning: A review
Recent research has found that many families of machine learning models are vulnerable to
adversarial examples: inputs that are specifically designed to cause the target model to …
adversarial examples: inputs that are specifically designed to cause the target model to …
A survey of deep learning-based source image forensics
Image source forensics is widely considered as one of the most effective ways to verify in a
blind way digital image authenticity and integrity. In the last few years, many researchers …
blind way digital image authenticity and integrity. In the last few years, many researchers …
Tampering detection and localization through clustering of camera-based CNN features
Due to the rapid proliferation of image capturing devices and user-friendly editing software
suites, image manipulation is at everyone's hand. For this reason, the forensic community …
suites, image manipulation is at everyone's hand. For this reason, the forensic community …
Aligned and non-aligned double JPEG detection using convolutional neural networks
Due to the wide diffusion of JPEG coding standard, the image forensic community has
devoted significant attention to the development of double JPEG (DJPEG) compression …
devoted significant attention to the development of double JPEG (DJPEG) compression …
By leaps and bounds: An exclusive look at how boston dynamics is redefining robot agility
E Guizzo - IEEE Spectrum, 2019 - ieeexplore.ieee.org
WITH THEIR JAW-DROPPING agility and animal-like reflexes, Boston Dynamics' bioinspired
robots have always seemed to have no equal. But that preeminence hasn't stopped the …
robots have always seemed to have no equal. But that preeminence hasn't stopped the …
Forensic similarity for digital images
In this paper, we introduce a new digital image forensics approach called forensic similarity,
which determines whether two image patches contain the same forensic trace or different …
which determines whether two image patches contain the same forensic trace or different …
The Forchheim image database for camera identification in the wild
B Hadwiger, C Riess - International Conference on Pattern Recognition, 2021 - Springer
Image provenance can represent crucial knowledge in criminal investigation and journalistic
fact checking. In the last two decades, numerous algorithms have been proposed for …
fact checking. In the last two decades, numerous algorithms have been proposed for …
[HTML][HTML] Recent advances in passive digital image security forensics: A brief review
With the development of sophisticated image editing and manipulation tools, the originality
and authenticity of a digital image is usually hard to determine visually. In order to detect …
and authenticity of a digital image is usually hard to determine visually. In order to detect …
[PDF][PDF] Computer-vision based object detection and recognition for service robot in indoor environment.
KJ Singh, DS Kapoor, K Thakur… - … , Materials & Continua, 2022 - researchgate.net
The near future has been envisioned as a collaboration of humans with mobile robots to
help in the day-to-day tasks. In this paper, we present a viable approach for a real-time …
help in the day-to-day tasks. In this paper, we present a viable approach for a real-time …
Learned forensic source similarity for unknown camera models
Information about an image's source camera model is important knowledge in many forensic
investigations. In this paper we propose a system that compares two image patches to …
investigations. In this paper we propose a system that compares two image patches to …