Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection, IEEE Transactions on Information Forensics and Security, vol.13, issue.11, pp.2691-2706, 2018. ,
First steps toward camera model identification with convolutional neural networks, IEEE Signal Processing Letters, vol.24, issue.3, pp.259-263, 2017. ,
Splicebuster: A new blind image splicing detector, Proceedings of the IEEE International Workshop on Information Forensics and Security, pp.1-6, 2015. ,
Forensictransfer: Weakly-supervised domain adaptation for forgery detection, pp.1-12, 2018. ,
General-purpose image forensics using patch likelihood under image statistical models, Proceedings of the IEEE International Workshop on Information Forensics and Security, pp.1-6, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01240755
The Dresden image database for benchmarking digital image forensics, Proceedings of the ACM Symposium on Applied Computing, pp.1585-1591, 2010. ,
A mishmash of methods for mitigating the model mismatch mess, Proceedings of the SPIE Media Watermarking, Security, and Forensics, vol.9028, 2014. ,
Effect of image downsampling on steganographic security, IEEE Transactions on Information Forensics and Security, vol.9, issue.5, pp.752-762, 2014. ,
Study of cover source mismatch in steganalysis and ways to mitigate its impact, Proceedings of the SPIE Media Watermarking, Security, and Forensics, vol.9028, 2014. ,
Identification of various image operations using residual-based features, IEEE Transactions on Circuits and Systems for Video Technology, vol.28, issue.1, pp.31-45, 2018. ,
Is object localization for free? -Weaklysupervised learning with convolutional neural networks, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.685-694, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01015140
An overview on image forensics, ISRN Signal Processing, issue.496701, pp.1-22, 2013. ,
A universal image forensic strategy based on steganalytic model, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp.165-170, 2014. ,
Distinguishing between natural and computer-generated images using convolutional neural networks, IEEE Transactions on Information Forensics and Security, vol.13, issue.11, pp.2772-2787, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01789442
Prototypical networks for few-shot learning, Proceedings of the Advances in Neural Information Processing Systems, pp.4077-4087, 2017. ,
Matching networks for one shot learning, Proceedings of the Advances in Neural Information Processing Systems, pp.3630-3638, 2016. ,
Busternet: Detecting copy-move image forgery with source/target localization, Proceedings of the European Conference on Computer Vision, pp.170-186, 2018. ,