Search Results - "Stamm, Matthew C."
-
1
Information Forensics: An Overview of the First Decade
Published in IEEE access (2013)“…In recent decades, we have witnessed the evolution of information technologies from the development of VLSI technologies, to communication and networking…”
Get full text
Journal Article -
2
Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
Published in IEEE transactions on information forensics and security (01-11-2018)“…Identifying the authenticity and processing history of an image is an important task in multimedia forensics. By analyzing traces left by different image…”
Get full text
Journal Article -
3
TIMIT-TTS: a Text-to-Speech Dataset for Multimodal Synthetic Media Detection
Published in IEEE access (01-01-2023)“…With the rapid development of deep learning techniques, the generation and counterfeiting of multimedia material has become increasingly simple. Current…”
Get full text
Journal Article -
4
Forensic Similarity for Digital Images
Published in IEEE transactions on information forensics and security (2020)“…In this paper, we introduce a new digital image forensics approach called forensic similarity, which determines whether two image patches contain the same…”
Get full text
Journal Article -
5
The Video Authentication and Camera Identification Database: A New Database for Video Forensics
Published in IEEE access (2019)“…Modern technologies have made the capture and sharing of digital video commonplace; the combination of modern smartphones, cloud storage, and social media…”
Get full text
Journal Article -
6
Exposing Fake Images With Forensic Similarity Graphs
Published in IEEE journal of selected topics in signal processing (01-08-2020)“…In this paper, we propose new image forgery detection and localization algorithms by recasting these problems as graph-based community detection problems. To…”
Get full text
Journal Article -
7
Attacking Image Splicing Detection and Localization Algorithms Using Synthetic Traces
Published in IEEE transactions on information forensics and security (2024)“…Recent advances in deep learning have enabled forensics researchers to develop a new class of image splicing detection and localization algorithms. These…”
Get full text
Journal Article -
8
Robust Median Filtering Forensics Using an Autoregressive Model
Published in IEEE transactions on information forensics and security (01-09-2013)“…In order to verify the authenticity of digital images, researchers have begun developing digital forensic techniques to identify image editing. One editing…”
Get full text
Journal Article -
9
Robust camera model identification using demosaicing residual features
Published in Multimedia tools and applications (01-03-2021)“…In this paper, we propose a new framework for performing accurate and robust camera model identification by fully exploiting demosaicing information in a…”
Get full text
Journal Article -
10
Anti-forensics of digital image compression
Published in IEEE transactions on information forensics and security (01-09-2011)“…As society has become increasingly reliant upon digital images to communicate visual information, a number of forensic techniques have been developed to verify…”
Get full text
Journal Article -
11
Open Set Video Camera Model Verification
Published in ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-05-2020)“…We introduce a new open set video forensics problem called video camera model verification. The video camera model verification task is to determine if two…”
Get full text
Conference Proceeding -
12
Temporal Forensics and Anti-Forensics for Motion Compensated Video
Published in IEEE transactions on information forensics and security (01-08-2012)“…Due to the ease with which digital information can be altered, many digital forensic techniques have been developed to authenticate multimedia content…”
Get full text
Journal Article -
13
Forensic detection of image manipulation using statistical intrinsic fingerprints
Published in IEEE transactions on information forensics and security (01-09-2010)“…As the use of digital images has increased, so has the means and the incentive to create digital image forgeries. Accordingly, there is a great need for…”
Get full text
Journal Article -
14
VideoFACT: Detecting Video Forgeries Using Attention, Scene Context, and Forensic Traces
Published in 2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) (03-01-2024)“…Fake videos represent an important misinformation threat. While existing forensic networks have demonstrated strong performance on image forgeries, recent…”
Get full text
Conference Proceeding -
15
Deepfake Speech Detection Through Emotion Recognition: A Semantic Approach
Published in ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (23-05-2022)“…In recent years, audio and video deepfake technology has advanced relentlessly, severely impacting people's reputation and reliability. Several factors have…”
Get full text
Conference Proceeding -
16
An Efficient Strategy for Online Performance Monitoring of Datacenters via Adaptive Sampling
Published in IEEE transactions on cloud computing (01-01-2019)“…Performance monitoring of datacenters provides vital information for dynamic resource provisioning, anomaly detection, and capacity planning decisions. Online…”
Get full text
Journal Article -
17
Information Theoretical Limit of Media Forensics: The Forensicability
Published in IEEE transactions on information forensics and security (01-04-2016)“…While more and more forensic techniques have been proposed to detect the processing history of multimedia content, one starts to wonder if there exists a…”
Get full text
Journal Article -
18
Do Deepfakes Feel Emotions? A Semantic Approach to Detecting Deepfakes Via Emotional Inconsistencies
Published in 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (01-06-2021)“…Recent advances in deep learning and computer vision have spawned a new class of media forgeries known as deepfakes, which typically consist of artificially…”
Get full text
Conference Proceeding -
19
Camera model identification framework using an ensemble of demosaicing features
Published in 2015 IEEE International Workshop on Information Forensics and Security (WIFS) (01-11-2015)“…Existing approaches to camera model identification frequently operate by building a parametric model of a camera component, then using an estimate of these…”
Get full text
Conference Proceeding -
20
Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification
Published in IEEE transactions on information forensics and security (2024)“…Recently, deep learning techniques have gained popularity in multimedia forensics research designed to accomplish tasks such as camera model identification…”
Get full text
Journal Article