no code implementations • 22 Feb 2024 • Amit Kumar Singh Yadav, Ziyue Xiang, Kratika Bhagtani, Paolo Bestagini, Stefano Tubaro, Edward J. Delp
We evaluate the detection performance of PS3DT on ASVspoof2019 dataset.
no code implementations • 6 Apr 2023 • Amit Kumar Singh Yadav, Kratika Bhagtani, Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp
We also visualize the representation obtained from DSVAE for 17 different speech synthesizers and verify that they are indeed interpretable and discriminate bona fide and synthetic speech from each of the synthesizers.
1 code implementation • 20 Oct 2022 • Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp
We denote our proposed technique as H. 264 Video Device Matching (H4VDM).
no code implementations • 26 Apr 2022 • Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao, Sriram Baireddy, Edward J. Delp
In this paper, we review recent work in media forensics for digital images, video, audio (specifically speech), and documents.
no code implementations • 13 May 2021 • Ziyue Xiang, János Horváth, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp
Such manipulations can leave traces in the metadata embedded in video files.
no code implementations • 22 Feb 2020 • Daniel E. Acuna, Ziyue Xiang
When there is a suspicious figure reuse case in science, research integrity investigators often find it difficult to rebut authors claiming that "it happened by chance".
no code implementations • 21 Jan 2020 • Ziyue Xiang, Daniel E. Acuna
Scientific image tampering is a problem that affects not only authors but also the general perception of the research community.