Picture for Luisa Verdoliva

Luisa Verdoliva

SpoC: Spoofing Camera Fingerprints

Add code
Nov 27, 2019
Figure 1 for SpoC: Spoofing Camera Fingerprints
Figure 2 for SpoC: Spoofing Camera Fingerprints
Figure 3 for SpoC: Spoofing Camera Fingerprints
Figure 4 for SpoC: Spoofing Camera Fingerprints
Viaarxiv icon

Incremental learning for the detection and classification of GAN-generated images

Add code
Oct 06, 2019
Figure 1 for Incremental learning for the detection and classification of GAN-generated images
Figure 2 for Incremental learning for the detection and classification of GAN-generated images
Figure 3 for Incremental learning for the detection and classification of GAN-generated images
Figure 4 for Incremental learning for the detection and classification of GAN-generated images
Viaarxiv icon

A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection

Add code
Sep 15, 2019
Figure 1 for A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection
Figure 2 for A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection
Figure 3 for A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection
Figure 4 for A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection
Viaarxiv icon

Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers

Add code
Feb 20, 2019
Figure 1 for Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers
Figure 2 for Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers
Figure 3 for Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers
Figure 4 for Perceptual Quality-preserving Black-Box Attack against Deep Learning Image Classifiers
Viaarxiv icon

FaceForensics++: Learning to Detect Manipulated Facial Images

Add code
Jan 25, 2019
Figure 1 for FaceForensics++: Learning to Detect Manipulated Facial Images
Figure 2 for FaceForensics++: Learning to Detect Manipulated Facial Images
Figure 3 for FaceForensics++: Learning to Detect Manipulated Facial Images
Figure 4 for FaceForensics++: Learning to Detect Manipulated Facial Images
Viaarxiv icon

Do GANs leave artificial fingerprints?

Add code
Dec 31, 2018
Figure 1 for Do GANs leave artificial fingerprints?
Figure 2 for Do GANs leave artificial fingerprints?
Figure 3 for Do GANs leave artificial fingerprints?
Figure 4 for Do GANs leave artificial fingerprints?
Viaarxiv icon

ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection

Add code
Dec 06, 2018
Figure 1 for ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection
Figure 2 for ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection
Figure 3 for ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection
Figure 4 for ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection
Viaarxiv icon

Guided patch-wise nonlocal SAR despeckling

Add code
Nov 28, 2018
Figure 1 for Guided patch-wise nonlocal SAR despeckling
Figure 2 for Guided patch-wise nonlocal SAR despeckling
Figure 3 for Guided patch-wise nonlocal SAR despeckling
Figure 4 for Guided patch-wise nonlocal SAR despeckling
Viaarxiv icon

Camera-based Image Forgery Localization using Convolutional Neural Networks

Add code
Aug 29, 2018
Figure 1 for Camera-based Image Forgery Localization using Convolutional Neural Networks
Figure 2 for Camera-based Image Forgery Localization using Convolutional Neural Networks
Figure 3 for Camera-based Image Forgery Localization using Convolutional Neural Networks
Figure 4 for Camera-based Image Forgery Localization using Convolutional Neural Networks
Viaarxiv icon

Analysis of adversarial attacks against CNN-based image forgery detectors

Add code
Aug 25, 2018
Figure 1 for Analysis of adversarial attacks against CNN-based image forgery detectors
Figure 2 for Analysis of adversarial attacks against CNN-based image forgery detectors
Figure 3 for Analysis of adversarial attacks against CNN-based image forgery detectors
Figure 4 for Analysis of adversarial attacks against CNN-based image forgery detectors
Viaarxiv icon