no code implementations • 12 Jun 2023 • Yu Chen, Yang Yu, Rongrong Ni, Yao Zhao, Haoliang Li
Next, we design a phoneme-viseme awareness module for cross-modal feature fusion and representation alignment, so that the modality gap can be reduced and the intrinsic complementarity of the two modalities can be better explored.
no code implementations • 2 Feb 2021 • Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni
We assume that both the spliced regions and the background image have undergone a double JPEG compression, and use a local estimate of the primary quantization matrix to distinguish between spliced regions taken from different sources.
no code implementations • 26 Jan 2021 • Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, Alessandro Piva
Furthermore, it is capable of correctly identifying the operating system of the source device for most of the tampered videos.
no code implementations • 27 Oct 2020 • Yang Yu, Rongrong Ni, Yao Zhao
Recently, AI-manipulated face techniques have developed rapidly and constantly, which has raised new security issues in society.
no code implementations • 12 May 2020 • Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni
Transferability of adversarial examples is a key issue to apply this kind of attacks against multimedia forensics (MMF) techniques based on Deep Learning (DL) in a real-life setting.
no code implementations • 29 Mar 2018 • Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Haorui Wu
Instead of improving it, in this paper, the safety of deep learning based methods in the field of image forensics is taken into account.
no code implementations • 20 Feb 2018 • Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, Rongrong Ni
If sufficiently smooth, we pose a maximum a posteriori (MAP) problem using either a quadratic Laplacian regularizer or a graph total variation (GTV) term as signal prior.
no code implementations • 2 Feb 2018 • Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni
We address the problem of data-driven image manipulation detection in the presence of an attacker with limited knowledge about the detector.
Cryptography and Security
no code implementations • 15 Mar 2017 • Pengpeng Yang, Wei Zhao, Rongrong Ni, Yao Zhao
In this paper, we propose a solution to identify the source camera of the small-size images: content-adaptive fusion network.