Author of the publication

Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of double compression with the same bit rate in MPEG-2 videos., , and . ChinaSIP, page 306-309. IEEE, (2014)Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk., and . IEEE Signal Process. Lett., 23 (1): 169-173 (2016)Enhancing ROC performance of trustworthy camera source identification., , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788009. SPIE, (2011)Audio watermarking robust to geometrical distortions based on dyadic wavelet transform., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050A. SPIE, (2007)CDMA-based watermarking resisting to cropping., , and . ISCAS (2), page 25-28. IEEE, (2004)Efficient Tate Pairing Computation Using Double-Base Chains., , and . IACR Cryptology ePrint Archive, (2006)Double H.264/AVC compression detection using quantized nonzero AC coefficients., , , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 78800Q. SPIE, (2011)Automatic Steganographic Distortion Learning Using a Generative Adversarial Network., , , and . IEEE Signal Process. Lett., 24 (10): 1547-1551 (2017)Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images., and . IEEE Trans. Image Processing, 25 (3): 1312-1326 (2016)Verification of hidden speaker behind transformation disguised voices., , and . Digit. Signal Process., (2015)