no code implementations • 17 Jun 2019 • Wei Sun, Jawadul H. Bappy, Shanglin Yang, Yi Xu, Tianfu Wu, Hui Zhou
In order to formulate the framework, we employ one generator and two discriminators for image synthesis.
no code implementations • IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops 2019 • Ghazal Mazaheri, Niluthpol Chowdhury Mithun, Jawadul H. Bappy, Amit K. Roy-Chowdhury
In order to exploit these traces in localizing the tampered regions, we propose an encoder-decoder based network where we fuse representations from early layers in the encoder (which are richer in low-level spatial cues, like edges) by skip pooling with representations of the last layer of the decoder and use for manipulation detection.
no code implementations • 15 Mar 2019 • Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, Arjuna Flenner, Jawadul H. Bappy, Amit K. Roy-Chowdhury, B. S. Manjunath
The advent of Generative Adversarial Networks (GANs) has brought about completely novel ways of transforming and manipulating pixels in digital images.
1 code implementation • 6 Mar 2019 • Jawadul H. Bappy, Cody Simons, Lakshmanan Nataraj, B. S. Manjunath, Amit K. Roy-Chowdhury
This paper proposes a high-confidence manipulation localization architecture which utilizes resampling features, Long-Short Term Memory (LSTM) cells, and encoder-decoder network to segment out manipulated regions from non-manipulated ones.
no code implementations • 9 Feb 2018 • Tajuddin Manhar Mohammed, Jason Bunk, Lakshmanan Nataraj, Jawadul H. Bappy, Arjuna Flenner, B. S. Manjunath, Shivkumar Chandrasekaran, Amit K. Roy-Chowdhury, Lawrence Peterson
Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods.
no code implementations • ICCV 2017 • Jawadul H. Bappy, Amit K. Roy-Chowdhury, Jason Bunk, Lakshmanan Nataraj, B. S. Manjunath
In order to formulate the framework, we employ a hybrid CNN-LSTM model to capture discriminative features between manipulated and non-manipulated regions.
1 code implementation • 3 Jul 2017 • Jason Bunk, Jawadul H. Bappy, Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Arjuna Flenner, B. S. Manjunath, Shivkumar Chandrasekaran, Amit K. Roy-Chowdhury, Lawrence Peterson
In this paper, we propose two methods to detect and localize image manipulations based on a combination of resampling features and deep learning.
no code implementations • CVPR 2017 • Jawadul H. Bappy, Sujoy Paul, Ertem Tuncel, Amit K. Roy-Chowdhury
In computer vision, selection of the most informative samples from a huge pool of training data in order to learn a good recognition model is an active research problem.
1 code implementation • Computer Vision and Pattern Recognition (CVPR) 2017 • Sujoy Paul, Jawadul H. Bappy, Amit Roy-Chowdhury
We construct a graph from the unlabeled data to represent the underlying structure, such that each node represents a data point, and edges represent the inter-relationships between them.