default search action
13th WIFS 2021: Montpellier, France
- IEEE International Workshop on Information Forensics and Security, WIFS 2021, Montpellier, France, December 7-10, 2021. IEEE 2021, ISBN 978-1-6654-1717-4
- Supriya Adhatarao, Cédric Lauradoux:
How are PDF files published in the Scientific Community? 1-6 - Thomas Thebaud, Gaël Le Lan, Anthony Larcher:
Spoofing Speaker Verification With Voice Style Transfer And Reconstruction Loss. 1-7 - Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu, Xinpeng Zhang:
Structural Watermarking to Deep Neural Networks via Network Channel Pruning. 1-6 - Onur Günlü, Rafael F. Schaefer, H. Vincent Poor:
Quality of Service Guarantees for Physical Unclonable Functions. 1-6 - Dongjie Chen, Sen-ching Samson Cheung, Chen-Nee Chuah, Sally Ozonoff:
Differentially Private Generative Adversarial Networks with Model Inversion. 1-6 - Yanmei Chen, Zehua Ma, Hang Zhou, Weiming Zhang:
3D Print-Scan Resilient Localized Mesh Watermarking. 1-6 - Kaiyu Ying, Rangding Wang, Diqun Yan:
Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing. 1-6 - Jelle Vos, Zekeriya Erkin, Christian Doerr:
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers. 1-6 - Hatef Otroshi-Shahreza, Vedrana Krivokuca Hahn, Sébastien Marcel:
On the Recognition Performance of BioHashing on state-of-the-art Face Recognition models. 1-6 - Toshiki Itagaki, Yuki Funabiki, Toru Akishita:
Robust Image Hashing for Detecting Small Tampering Using a Hyperrectangular Region. 1-6 - Elyes Khermaza, Iuliia Tkachenko, Justin Picard:
Can Copy Detection Patterns be copied? Evaluating the performance of attacks and highlighting the role of the detector. 1-6 - Michael Albright, Nitesh Menon, Kristy Roschke, Arslan Basharat:
Source Attribution of Online News Images by Compression Analysis. 1-6 - Zhenyu Li, Daofu Gong, Lei Tan, Xiangyang Luo, Fenlin Liu, Adrian G. Bors:
Self-embedding watermarking method for G-code used in 3D printing. 1-6 - Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy:
Machine learning attack on copy detection patterns: are $1\times 1$ patterns cloneable? 1-6 - Jing Yang, Didier Augusto Vega-Oliveros, Tais Seibt, Anderson Rocha:
Scalable Fact-checking with Human-in-the-Loop. 1-6 - Michele Pilia, Sara Mandelli, Paolo Bestagini, Stefano Tubaro:
Time Scaling Detection and Estimation in Audio Recordings. 1-6 - Tomer Itzhaki, Yassine Yousfi, Jessica J. Fridrich:
Data Augmentation for JPEG Steganalysis. 1-6 - Anselmo Ferreira, Changsheng Chen, Mauro Barni:
Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection. 1-6 - Mathias Ibsen, Lázaro J. González Soler, Christian Rathgeb, Pawel Drozdowski, Marta Gomez-Barrero, Christoph Busch:
Differential Anomaly Detection for Facial Images. 1-6 - Bhavin Jawade, Akshay Agarwal, Srirangaraj Setlur, Nalini K. Ratha:
Multi Loss Fusion For Matching Smartphone Captured Contactless Finger Images. 1-6 - Simon Kirchgasser, Christof Kauba, Andreas Uhl:
Assessment of Synthetically Generated Mated Samples from Single Fingerprint Samples Instances. 1-6 - Shashank Arora, Pradeep K. Atrey:
Secure Collaborative Editing Using Secret Sharing. 1-6 - Robert Jöchl, Andreas Uhl:
Apart from In-field Sensor Defects, are there Additional Age Traces Hidden in a Digital Image? 1-6 - Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas:
Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics. 1-6 - Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy:
Mobile authentication of copy detection patterns: how critical is to know fakes? 1-6 - Akshay Agarwal, Nalini K. Ratha, Mayank Vatsa, Richa Singh:
Impact of Super-Resolution and Human Identification in Drone Surveillance. 1-6 - Yassine Yousfi, Jan Butora, Jessica J. Fridrich:
CNN Steganalyzers Leverage Local Embedding Artifacts. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.