Alert button
Picture for Rongrong Ni

Rongrong Ni

Alert button

NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake Detection

Add code
Bookmark button
Alert button
Jun 12, 2023
Yu Chen, Yang Yu, Rongrong Ni, Yao Zhao, Haoliang Li

Figure 1 for NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake Detection
Figure 2 for NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake Detection
Figure 3 for NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake Detection
Figure 4 for NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake Detection
Viaarxiv icon

Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering

Add code
Bookmark button
Alert button
Feb 02, 2021
Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni

Figure 1 for Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering
Figure 2 for Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering
Figure 3 for Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering
Figure 4 for Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering
Viaarxiv icon

Efficient video integrity analysis through container characterization

Add code
Bookmark button
Alert button
Jan 26, 2021
Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, Alessandro Piva

Figure 1 for Efficient video integrity analysis through container characterization
Figure 2 for Efficient video integrity analysis through container characterization
Figure 3 for Efficient video integrity analysis through container characterization
Figure 4 for Efficient video integrity analysis through container characterization
Viaarxiv icon

Mining Generalized Features for Detecting AI-Manipulated Fake Faces

Add code
Bookmark button
Alert button
Oct 27, 2020
Yang Yu, Rongrong Ni, Yao Zhao

Viaarxiv icon

Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks

Add code
Bookmark button
Alert button
May 12, 2020
Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni

Figure 1 for Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks
Figure 2 for Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks
Figure 3 for Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks
Figure 4 for Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks
Viaarxiv icon

Security Consideration For Deep Learning-Based Image Forensics

Add code
Bookmark button
Alert button
Apr 03, 2018
Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Haorui Wu

Figure 1 for Security Consideration For Deep Learning-Based Image Forensics
Figure 2 for Security Consideration For Deep Learning-Based Image Forensics
Figure 3 for Security Consideration For Deep Learning-Based Image Forensics
Figure 4 for Security Consideration For Deep Learning-Based Image Forensics
Viaarxiv icon

Non-Local Graph-Based Prediction For Reversible Data Hiding In Images

Add code
Bookmark button
Alert button
Feb 20, 2018
Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, Rongrong Ni

Figure 1 for Non-Local Graph-Based Prediction For Reversible Data Hiding In Images
Figure 2 for Non-Local Graph-Based Prediction For Reversible Data Hiding In Images
Figure 3 for Non-Local Graph-Based Prediction For Reversible Data Hiding In Images
Figure 4 for Non-Local Graph-Based Prediction For Reversible Data Hiding In Images
Viaarxiv icon

Source Camera Identification Based On Content-Adaptive Fusion Network

Add code
Bookmark button
Alert button
Mar 15, 2017
Pengpeng Yang, Wei Zhao, Rongrong Ni, Yao Zhao

Figure 1 for Source Camera Identification Based On Content-Adaptive Fusion Network
Figure 2 for Source Camera Identification Based On Content-Adaptive Fusion Network
Figure 3 for Source Camera Identification Based On Content-Adaptive Fusion Network
Figure 4 for Source Camera Identification Based On Content-Adaptive Fusion Network
Viaarxiv icon