Search Results for author: Rongrong Ni

Found 9 papers, 0 papers with code

NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake Detection

no code implementations12 Jun 2023 Yu Chen, Yang Yu, Rongrong Ni, Yao Zhao, Haoliang Li

Next, we design a phoneme-viseme awareness module for cross-modal feature fusion and representation alignment, so that the modality gap can be reduced and the intrinsic complementarity of the two modalities can be better explored.

DeepFake Detection Face Swapping

Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering

no code implementations2 Feb 2021 Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni

We assume that both the spliced regions and the background image have undergone a double JPEG compression, and use a local estimate of the primary quantization matrix to distinguish between spliced regions taken from different sources.

Clustering Quantization

Efficient video integrity analysis through container characterization

no code implementations26 Jan 2021 Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, Alessandro Piva

Furthermore, it is capable of correctly identifying the operating system of the source device for most of the tampered videos.

Mining Generalized Features for Detecting AI-Manipulated Fake Faces

no code implementations27 Oct 2020 Yang Yu, Rongrong Ni, Yao Zhao

Recently, AI-manipulated face techniques have developed rapidly and constantly, which has raised new security issues in society.

Increased-confidence adversarial examples for deep learning counter-forensics

no code implementations12 May 2020 Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni

Transferability of adversarial examples is a key issue to apply this kind of attacks against multimedia forensics (MMF) techniques based on Deep Learning (DL) in a real-life setting.

Image Forensics

Security Consideration For Deep Learning-Based Image Forensics

no code implementations29 Mar 2018 Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Haorui Wu

Instead of improving it, in this paper, the safety of deep learning based methods in the field of image forensics is taken into account.

Image Forensics

Non-Local Graph-Based Prediction For Reversible Data Hiding In Images

no code implementations20 Feb 2018 Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, Rongrong Ni

If sufficiently smooth, we pose a maximum a posteriori (MAP) problem using either a quadratic Laplacian regularizer or a graph total variation (GTV) term as signal prior.

Secure Detection of Image Manipulation by means of Random Feature Selection

no code implementations2 Feb 2018 Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni

We address the problem of data-driven image manipulation detection in the presence of an attacker with limited knowledge about the detector.

Cryptography and Security

Source Camera Identification Based On Content-Adaptive Fusion Network

no code implementations15 Mar 2017 Pengpeng Yang, Wei Zhao, Rongrong Ni, Yao Zhao

In this paper, we propose a solution to identify the source camera of the small-size images: content-adaptive fusion network.

Cannot find the paper you are looking for? You can Submit a new open access paper.