Search Results for author: Benedetta Tondi

Found 29 papers, 11 papers with code

JMA: a General Algorithm to Craft Nearly Optimal Targeted Adversarial Example

1 code implementation2 Jan 2024 Benedetta Tondi, Wei Guo, Mauro Barni

Most of the approaches proposed so far to craft targeted adversarial examples against Deep Learning classifiers are highly suboptimal and typically rely on increasing the likelihood of the target class, thus implicitly focusing on one-hot encoding settings.

Multi-Label Classification

Robust Retraining-free GAN Fingerprinting via Personalized Normalization

no code implementations9 Nov 2023 Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni

In recent years, there has been significant growth in the commercial applications of generative models, licensed and distributed by model developers to users, who in turn use them to offer services.

Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs

no code implementations25 Oct 2023 Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni

We present the results of extensive experiments showing that the presence of the watermark has a negligible impact on the quality of the generated images, and proving the superior robustness of the watermark against model modification and surrogate model attacks.

Quantization

A Siamese-based Verification System for Open-set Architecture Attribution of Synthetic Images

1 code implementation19 Jul 2023 Lydia Abady, Jun Wang, Benedetta Tondi, Mauro Barni

In the second setting, the system verifies a claim about the architecture used to generate a synthetic image, utilizing one or multiple reference images generated by the claimed architecture.

Attribute Image Generation +1

Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture

no code implementations11 Apr 2023 Jun Wang, Omran Alamayreh, Benedetta Tondi, Mauro Barni

Classification of AI-manipulated content is receiving great attention, for distinguishing different types of manipulations.

Attribute Classification +2

Universal Detection of Backdoor Attacks via Density-based Clustering and Centroids Analysis

1 code implementation11 Jan 2023 Wei Guo, Benedetta Tondi, Mauro Barni

Experiments carried out on several classification tasks and network architectures, considering different types of backdoor attacks (with either clean or corrupted labels), and triggering signals, including both global and local triggering signals, as well as sample-specific and source-specific triggers, reveal that the proposed method is very effective to defend against backdoor attacks in all the cases, always outperforming the state of the art techniques.

Backdoor Attack Clustering

An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images

no code implementations19 Sep 2022 Lydia Abady, Edoardo Daniele Cannas, Paolo Bestagini, Benedetta Tondi, Stefano Tubaro, Mauro Barni

While we focus mostly on forensic techniques explicitly tailored to the detection of AI-generated synthetic contents, we also review some methods designed for general splicing detection, which can in principle also be used to spot AI manipulate images

Misinformation

Supervised GAN Watermarking for Intellectual Property Protection

no code implementations7 Sep 2022 Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni

The aim is to watermark the GAN model so that any image generated by the GAN contains an invisible watermark (signature), whose presence inside the image can be checked at a later stage for ownership verification.

Which country is this picture from? New data and methods for DNN-based country recognition

1 code implementation2 Sep 2022 Omran Alamayreh, Giovanna Maria Dimitri, Jun Wang, Benedetta Tondi, Mauro Barni

Notably, we found that asking the network to identify the country provides better results than estimating the geo-coordinates and then tracing them back to the country where the picture was taken.

Robust and Large-Payload DNN Watermarking via Fixed, Distribution-Optimized, Weights

1 code implementation23 Aug 2022 Benedetta Tondi, Andrea Costanzo, Mauro Barni

The design of an effective multi-bit watermarking algorithm hinges upon finding a good trade-off between the three fundamental requirements forming the watermarking trade-off triangle, namely, robustness against network modifications, payload, and unobtrusiveness, ensuring minimal impact on the performance of the watermarked network.

Model Compression Transfer Learning

A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection

no code implementations2 Jun 2022 Wei Guo, Benedetta Tondi, Mauro Barni

We propose a stealthy clean-label video backdoor attack against Deep Learning (DL)-based models aiming at detecting a particular class of spoofing attacks, namely video rebroadcast attacks.

Backdoor Attack

An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities

no code implementations14 May 2022 Jun Wang, Omran Alamayreh, Benedetta Tondi, Mauro Barni

In this paper, we address a new image forensics task, namely the detection of fake flood images generated by ClimateGAN architecture.

Image Forensics

An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences

no code implementations16 Nov 2021 Wei Guo, Benedetta Tondi, Mauro Barni

The classification guiding the analysis is based on the amount of control that the attacker has on the training process, and the capability of the defender to verify the integrity of the data used for training, and to monitor the operations of the DNN at training and test time.

Backdoor Attack

Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering

no code implementations2 Feb 2021 Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni

We assume that both the spliced regions and the background image have undergone a double JPEG compression, and use a local estimate of the primary quantization matrix to distinguish between spliced regions taken from different sources.

Clustering Quantization

Spread-Transform Dither Modulation Watermarking of Deep Neural Network

no code implementations28 Dec 2020 Yue Li, Benedetta Tondi, Mauro Barni

DNN watermarking is receiving an increasing attention as a suitable mean to protect the Intellectual Property Rights associated to DNN models.

Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture

1 code implementation1 Dec 2020 Benedetta Tondi, Andrea Costranzo, Dequ Huang, Bin Li

The method is based on a Convolutional Neural Network (CNN) that is trained to solve the estimation as a standard regression problem.

Image Forensics Quantization +1

CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis

no code implementations25 Jul 2020 Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi

Last-generation GAN models allow to generate synthetic images which are visually indistinguishable from natural ones, raising the need to develop tools to distinguish fake and natural images thus contributing to preserve the trustworthiness of digital images.

Increased-confidence adversarial examples for deep learning counter-forensics

no code implementations12 May 2020 Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni

Transferability of adversarial examples is a key issue to apply this kind of attacks against multimedia forensics (MMF) techniques based on Deep Learning (DL) in a real-life setting.

Image Forensics

Challenging the adversarial robustness of DNNs based on error-correcting output codes

no code implementations26 Mar 2020 Bowen Zhang, Benedetta Tondi, Xixiang Lv, Mauro Barni

The existence of adversarial examples and the easiness with which they can be generated raise several security concerns with regard to deep learning systems, pushing researchers to develop suitable defense mechanisms.

Adversarial Attack Adversarial Robustness +2

Copy Move Source-Target Disambiguation through Multi-Branch CNNs

1 code implementation29 Dec 2019 Mauro Barni, Quoc-Tin Phan, Benedetta Tondi

We propose a method to identify the source and target regions of a copy-move forgery so allow a correct localisation of the tampered area.

Two-sample testing

Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples

1 code implementation25 Oct 2019 Mauro Barni, Ehsan Nowroozi, Benedetta Tondi, Bo-Wen Zhang

We investigate if the random feature selection approach proposed in [1] to improve the robustness of forensic detectors to targeted attacks, can be extended to detectors based on deep learning features.

feature selection Image Manipulation +1

Attacking CNN-based anti-spoofing face authentication in the physical domain

no code implementations1 Oct 2019 Bowen Zhang, Benedetta Tondi, Mauro Barni

In this paper, we study the vulnerability of anti-spoofing methods based on deep learning against adversarial perturbations.

Cryptography and Security

Primary quantization matrix estimation of double compressed JPEG images via CNN

1 code implementation9 Aug 2019 Yakun Niu, Benedetta Tondi, Yao Zhao, Mauro Barni

Available model-based techniques for the estimation of the primary quantization matrix in double-compressed JPEG images work only under specific conditions regarding the relationship between the first and second compression quality factors, and the alignment of the first and second JPEG compression grids.

Quantization

A new Backdoor Attack in CNNs by training set corruption without label poisoning

1 code implementation12 Feb 2019 Mauro Barni, Kassem Kallas, Benedetta Tondi

In this paper we present a new backdoor attack without label poisoning Since the attack works by corrupting only samples of the target class, it has the additional advantage that it does not need to identify beforehand the class of the samples to be attacked at test time.

Backdoor Attack General Classification

On the Transferability of Adversarial Examples Against CNN-Based Image Forensics

1 code implementation5 Nov 2018 Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi

In this paper, we investigate if attack transferability also holds in image forensics applications.

Cryptography and Security

CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing

no code implementations29 May 2018 Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi

Detection of contrast adjustments in the presence of JPEG postprocessing is known to be a challenging task.

Secure Detection of Image Manipulation by means of Random Feature Selection

no code implementations2 Feb 2018 Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni

We address the problem of data-driven image manipulation detection in the presence of an attacker with limited knowledge about the detector.

Cryptography and Security

Adversarial Source Identification Game with Corrupted Training

no code implementations27 Mar 2017 Mauro Barni, Benedetta Tondi

We study a variant of the source identification game with training data in which part of the training data is corrupted by an attacker.

LEMMA

Cannot find the paper you are looking for? You can Submit a new open access paper.