no code implementations • 14 Oct 2022 • Emily R. Bartusiak, Edward J. Delp
In other words, we consider some speech synthesizers to be "known" synthesizers (i. e., part of the closed set) and others to be "unknown" synthesizers (i. e., part of the open set).
no code implementations • 3 May 2022 • Emily R. Bartusiak, Edward J. Delp
Attackers may manipulate audio with the intent of presenting falsified reports, changing an opinion of a public figure, and winning influence and power.
no code implementations • 3 May 2022 • Emily R. Bartusiak, Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Stefano Tubaro, Fengqing M. Zhu, Edward J. Delp
In this paper, we describe the use of a Conditional Generative Adversarial Network (cGAN) to identify the presence of such spliced forgeries within satellite images.
no code implementations • 3 May 2022 • Emily R. Bartusiak, Edward J. Delp
Synthesized speech is common today due to the prevalence of virtual assistants, easy-to-use tools for generating and modifying speech signals, and remote work practices.
no code implementations • 26 Apr 2022 • Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao, Sriram Baireddy, Edward J. Delp
In this paper, we review recent work in media forensics for digital images, video, audio (specifically speech), and documents.
no code implementations • 14 Apr 2020 • Hanxiang Hao, Sriram Baireddy, Emily R. Bartusiak, Latisha Konz, Kevin LaTourette, Michael Gribbons, Moses Chan, Mary L. Comer, Edward J. Delp
When disaster strikes, accurate situational information and a fast, effective response are critical to save lives.