Information Forensics and Security (IFS) is an active R D area whose g...
Despite the wide variety of methods developed for synthetic image
attrib...
The highly realistic image quality achieved by current image generative
...
Classification of AI-manipulated content is receiving great attention, f...
In this paper, we propose a Universal Defence based on Clustering and
Ce...
Disordered photonic structures are promising materials for the realizati...
Due to the proliferation and widespread use of deep neural networks (DNN...
Due to the reduction of technological costs and the increase of satellit...
We propose a watermarking method for protecting the Intellectual Propert...
Predicting the country where a picture has been taken from has many pote...
Watermarking has been proposed as a way to protect the Intellectual Prop...
We propose a stealthy clean-label video backdoor attack against Deep Lea...
Nowadays, 2D barcodes have been widely used for advertisement, mobile
pa...
In this paper, we address a new image forensics task, namely the detecti...
Together with impressive advances touching every aspect of our society, ...
Research on the detection of AI-generated videos has focused almost
excl...
Although significant progress in automatic learning of steganographic co...
We introduce a new attack against face verification systems based on Dee...
Protecting the Intellectual Property Rights (IPR) associated to Deep Neu...
Detection of inconsistencies of double JPEG artefacts across different i...
DNN watermarking is receiving an increasing attention as a suitable mean...
Transferability of adversarial examples is a key issue to study the secu...
Adversarial examples represent a great security threat for deep learning...
We propose a method to identify the source and target regions of a copy-...
In this paper, we study the vulnerability of anti-spoofing methods based...
CNN-based steganalysis has recently achieved very good performance in
de...
Protecting image manipulation detectors against perfect knowledge attack...
Backdoor attacks against CNNs represent a new threat against deep learni...
Recent studies have shown that Convolutional Neural Networks (CNN) are
r...
Detection of contrast adjustments in the presence of JPEG postprocessing...
We propose a new statistic to improve the pooled version of the triangle...
Biometrics security is a dynamic research area spurred by the need to pr...
Historically, steganographic schemes were designed in a way to preserve ...
We study a binary hypothesis testing problem in which a defender must de...
We address the problem of data-driven image manipulation detection in th...
Due to the wide diffusion of JPEG coding standard, the image forensic
co...
We study a variant of the source identification game with training data ...