Picture for Rongrong Ni

Rongrong Ni

NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake Detection

Add code
Jun 12, 2023
Viaarxiv icon

Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering

Add code
Feb 02, 2021
Figure 1 for Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering
Figure 2 for Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering
Figure 3 for Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering
Figure 4 for Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering
Viaarxiv icon

Efficient video integrity analysis through container characterization

Add code
Jan 26, 2021
Figure 1 for Efficient video integrity analysis through container characterization
Figure 2 for Efficient video integrity analysis through container characterization
Figure 3 for Efficient video integrity analysis through container characterization
Figure 4 for Efficient video integrity analysis through container characterization
Viaarxiv icon

Mining Generalized Features for Detecting AI-Manipulated Fake Faces

Add code
Oct 27, 2020
Viaarxiv icon

Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks

Add code
May 12, 2020
Figure 1 for Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks
Figure 2 for Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks
Figure 3 for Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks
Figure 4 for Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks
Viaarxiv icon

Security Consideration For Deep Learning-Based Image Forensics

Add code
Apr 03, 2018
Figure 1 for Security Consideration For Deep Learning-Based Image Forensics
Figure 2 for Security Consideration For Deep Learning-Based Image Forensics
Figure 3 for Security Consideration For Deep Learning-Based Image Forensics
Figure 4 for Security Consideration For Deep Learning-Based Image Forensics
Viaarxiv icon

Non-Local Graph-Based Prediction For Reversible Data Hiding In Images

Add code
Feb 20, 2018
Figure 1 for Non-Local Graph-Based Prediction For Reversible Data Hiding In Images
Figure 2 for Non-Local Graph-Based Prediction For Reversible Data Hiding In Images
Figure 3 for Non-Local Graph-Based Prediction For Reversible Data Hiding In Images
Figure 4 for Non-Local Graph-Based Prediction For Reversible Data Hiding In Images
Viaarxiv icon

Source Camera Identification Based On Content-Adaptive Fusion Network

Add code
Mar 15, 2017
Figure 1 for Source Camera Identification Based On Content-Adaptive Fusion Network
Figure 2 for Source Camera Identification Based On Content-Adaptive Fusion Network
Figure 3 for Source Camera Identification Based On Content-Adaptive Fusion Network
Figure 4 for Source Camera Identification Based On Content-Adaptive Fusion Network
Viaarxiv icon