B. Bayar and M. C. Stamm, Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection, IEEE Transactions on Information Forensics and Security, vol.13, issue.11, pp.2691-2706, 2018.

L. Bondi, L. Baroffio, D. Güera, P. Bestagini, E. J. Delp et al., First steps toward camera model identification with convolutional neural networks, IEEE Signal Processing Letters, vol.24, issue.3, pp.259-263, 2017.

D. Cozzolino, G. Poggi, and L. Verdoliva, Splicebuster: A new blind image splicing detector, Proceedings of the IEEE International Workshop on Information Forensics and Security, pp.1-6, 2015.

D. Cozzolino, J. Thies, A. Rössler, C. Riess, M. Nießner et al., Forensictransfer: Weakly-supervised domain adaptation for forgery detection, pp.1-12, 2018.

W. Fan, K. Wang, and F. Cayre, General-purpose image forensics using patch likelihood under image statistical models, Proceedings of the IEEE International Workshop on Information Forensics and Security, pp.1-6, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01240755

T. Gloe and R. Böhme, The Dresden image database for benchmarking digital image forensics, Proceedings of the ACM Symposium on Applied Computing, pp.1585-1591, 2010.

A. Ker and T. Pevný, A mishmash of methods for mitigating the model mismatch mess, Proceedings of the SPIE Media Watermarking, Security, and Forensics, vol.9028, 2014.

J. Kodovský and J. Fridrich, Effect of image downsampling on steganographic security, IEEE Transactions on Information Forensics and Security, vol.9, issue.5, pp.752-762, 2014.

J. Kodovský, V. Sedighi, and J. Fridrich, Study of cover source mismatch in steganalysis and ways to mitigate its impact, Proceedings of the SPIE Media Watermarking, Security, and Forensics, vol.9028, 2014.

H. Li, W. Luo, X. Qiu, and J. Huang, Identification of various image operations using residual-based features, IEEE Transactions on Circuits and Systems for Video Technology, vol.28, issue.1, pp.31-45, 2018.

M. Oquab, L. Bottou, I. Laptev, and J. Sivic, Is object localization for free? -Weaklysupervised learning with convolutional neural networks, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.685-694, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01015140

A. Piva, An overview on image forensics, ISRN Signal Processing, issue.496701, pp.1-22, 2013.

X. Qiu, H. Li, W. Luo, and J. Huang, A universal image forensic strategy based on steganalytic model, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp.165-170, 2014.

W. Quan, K. Wang, D. M. Yan, and X. Zhang, Distinguishing between natural and computer-generated images using convolutional neural networks, IEEE Transactions on Information Forensics and Security, vol.13, issue.11, pp.2772-2787, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01789442

J. Snell, K. Swersky, and R. S. Zemel, Prototypical networks for few-shot learning, Proceedings of the Advances in Neural Information Processing Systems, pp.4077-4087, 2017.

O. Vinyals, C. Blundell, T. Lillicrap, K. Kavukcuoglu, and D. Wierstra, Matching networks for one shot learning, Proceedings of the Advances in Neural Information Processing Systems, pp.3630-3638, 2016.

Y. Wu, W. Abd-almageed, and P. Natarajan, Busternet: Detecting copy-move image forgery with source/target localization, Proceedings of the European Conference on Computer Vision, pp.170-186, 2018.