default search action
14th WIFS 2022: Shanghai, China
- IEEE International Workshop on Information Forensics and Security, WIFS 2022, Shanghai, China, December 12-16, 2022. IEEE 2022, ISBN 979-8-3503-0967-6
- Kassem Kallas, Teddy Furon:
ROSE: A RObust and SEcure DNN Watermarking. 1-6 - Zhen Yang, Zihan Xu, Ru Zhang, Yongfeng Huang:
T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography. 1-6 - David Kester, Tianyu Li, Zekeriya Erkin:
PRIDE: A Privacy-Preserving Decentralised Key Management System. 1-6 - Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy:
Printing variability of copy detection patterns. 1-6 - Md. Hafizur Rahman, Martin Graciarena, Diego Castán, Chris Cobo-Kroenke, Mitchell McLaren, Aaron Lawson:
Detecting Synthetic Speech Manipulation in Real Audio Recordings. 1-6 - Felix Yriarte, Pauline Puteaux, Iuliia Tkachenko:
A Two-Step Method for Ensuring Printed Document Integrity using Crossing Number Distances. 1-6 - Shan Jin, Minghua Xu, Riccardo Bettati, Mihai Christodorescu:
Optimal Energy Efficient Design of Artificial Noise to Prevent Side-Channel Attacks. 1-6 - Trung-Nghia Le, Ta Gu, Huy H. Nguyen, Isao Echizen:
Rethinking Adversarial Examples for Location Privacy Protection. 1-6 - Fei Zhang, Hongxia Wang, Ling Yang, Mingze He:
Robust Blind Video Watermarking by Constructing Spread-Spectrum Matrix. 1-6 - Etienne Levecque, John Klein, Patrick Bas, Jan Butora:
Toward Reliable JPEG Steganalysis (at QF100). 1-6 - Kunaal Verma, Mansi Girdhar, Azeem Hafeez, Selim S. Awad:
ECU Identification using Neural Network Classification and Hyperparameter Tuning. 1-6 - Daniele Mari, Federica Latora, Simone Milani:
The Sound of Silence: Efficiency of First Digit Features in Synthetic Audio Detection. 1-6 - Gianmarco Baldini, Irene Amerini:
Microphone Identification based on Spectral Entropy with Convolutional Neural Network. 1-6 - Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Supervised GAN Watermarking for Intellectual Property Protection. 1-6 - Malte Baum, Luca Cuccovillo, Artem Yaroshchuk, Patrick Aichroth:
Environment Classification via Blind Roomprints Estimation. 1-6 - Antonio Theophilo, Anderson Rocha:
Authorship Attribution of Small Messages Through Language Models. 1-6 - Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy:
Anomaly localization for copy detection patterns through print estimations. 1-6 - Yitong Tao, Chuan Qin:
Graph-based Robust Model Hashing. 1-6 - Alessandro Pianese, Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva:
Deepfake audio detection by speaker verification. 1-6 - José Nascimento, João Phillipe Cardenuto, Jing Yang, Anderson Rocha:
Few-shot Learning for Multi-modal Social Media Event Filtering. 1-6 - Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný:
Using Set Covering to Generate Databases for Holistic Steganalysis. 1-6 - Luca Cuccovillo, Christoforos Papastergiopoulos, Anastasios Vafeiadis, Artem Yaroshchuk, Patrick Aichroth, Konstantinos Votis, Dimitrios Tzovaras:
Open Challenges in Synthetic Speech Detection. 1-6 - Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy:
Digital twins of physical printing-imaging channel. 1-6 - Davide Salvi, Paolo Bestagini, Stefano Tubaro:
Exploring the Synthetic Speech Attribution Problem Through Data-Driven Detectors. 1-6 - Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy:
Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns. 1-6 - Quentin Bammey, Rafael Grompone von Gioi, Jean-Michel Morel:
Demosaicing to Detect Demosaicing and Image Forgeries. 1-6 - Adam I. Rose, Bindu Chandna, Kevin B. Burke:
Phase-Only Artificial Noise for Secure Communication with Multiple Antennas Using Simultaneous Orthogonalization. 1-6 - Yicheng Bao, Linghui Zhou, Tobias J. Oechtering:
Proof-of-Concept of Polar Codes for Biometric Identification and Authentication. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.