Image steganography is the art of concealing secret information in image...
Backdoor attack aims to compromise a model, which returns an adversary-w...
RAW files are the initial measurement of scene radiance widely used in m...
The widespread use of face retouching filters on short-video platforms h...
With the widespread applications of the deep neural network (DNN), how t...
In modern social networks, existing style transfer methods suffer from a...
Generative steganography (GS) is a new data hiding manner, featuring dir...
Generative steganography (GS) is an emerging technique that generates st...
The easy sharing of multimedia content on social media has caused a rapi...
Steganography is a technique for covert communication between two partie...
This letter proposes an improved CNN predictor (ICNNP) for reversible da...
Wild images on the web are vulnerable to backdoor (also called trojan)
p...
Face manipulation detection has been receiving a lot of attention for th...
Digital images are vulnerable to nefarious tampering attacks such as con...
Data hiding with deep neural networks (DNNs) has experienced impressive
...
Steganography usually modifies cover media to embed secret data. A new
s...
Online social networks have stimulated communications over the Internet ...
Videos are prone to tampering attacks that alter the meaning and deceive...
The development of Internet technology has continuously intensified the
...
Image cropping is an inexpensive and effective operation of maliciously
...
Videos can be easily tampered, copied and redistributed by attackers for...
Multimodal fake news detection has attracted many research interests in
...
Backdoor attacks are rapidly emerging threats to deep neural networks (D...
Deep learning has achieved enormous success in various industrial
applic...
We introduce Imuge, an image tamper resilient generative scheme for imag...
The existing image embedding networks are basically vulnerable to malici...
Previous image forensics schemes for crop detection are only limited on
...
Previous reversible data hiding in encrypted images (RDHEI) schemes can ...
In this paper, a novel perceptual image hashing scheme for color images ...
This paper proposes an idea of data computing in the covert domain (DCCD...