Abstract is missing.
- Detecting Synthetic Speech Manipulation in Real Audio RecordingsMd. Hafizur Rahman, Martin Graciarena, Diego Castán, Chris Cobo-Kroenke, Mitchell McLaren, Aaron Lawson. 1-6 [doi]
- Deepfake audio detection by speaker verificationAlessandro Pianese, Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva. 1-6 [doi]
- Robust Blind Video Watermarking by Constructing Spread-Spectrum MatrixFei Zhang, Hongxia Wang, Ling Yang, Mingze He. 1-6 [doi]
- Digital twins of physical printing-imaging channelYury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy. 1-6 [doi]
- Phase-Only Artificial Noise for Secure Communication with Multiple Antennas Using Simultaneous OrthogonalizationAdam I. Rose, Bindu Chandna, Kevin B. Burke. 1-6 [doi]
- T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic SteganographyZhen Yang, Zihan Xu, Ru Zhang, Yongfeng Huang 0001. 1-6 [doi]
- Using Set Covering to Generate Databases for Holistic SteganalysisRony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný. 1-6 [doi]
- Proof-of-Concept of Polar Codes for Biometric Identification and AuthenticationYicheng Bao, Linghui Zhou, Tobias J. Oechtering. 1-6 [doi]
- Open Challenges in Synthetic Speech DetectionLuca Cuccovillo, Christoforos Papastergiopoulos, Anastasios Vafeiadis, Artem Yaroshchuk, Patrick Aichroth, Konstantinos Votis, Dimitrios Tzovaras. 1-6 [doi]
- Rethinking Adversarial Examples for Location Privacy ProtectionTrung-Nghia Le, Ta Gu, Huy H. Nguyen, Isao Echizen. 1-6 [doi]
- Microphone Identification based on Spectral Entropy with Convolutional Neural NetworkGianmarco Baldini, Irene Amerini. 1-6 [doi]
- Few-shot Learning for Multi-modal Social Media Event FilteringJosé Nascimento, João Phillipe Cardenuto, Jing Yang, Anderson Rocha 0001. 1-6 [doi]
- A Two-Step Method for Ensuring Printed Document Integrity using Crossing Number DistancesFelix Yriarte, Pauline Puteaux, Iuliia Tkachenko. 1-6 [doi]
- ROSE: A RObust and SEcure DNN WatermarkingKassem Kallas, Teddy Furon. 1-6 [doi]
- Anomaly localization for copy detection patterns through print estimationsBrian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy. 1-6 [doi]
- Printing variability of copy detection patternsRoman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy. 1-6 [doi]
- The Sound of Silence: Efficiency of First Digit Features in Synthetic Audio DetectionDaniele Mari, Federica Latora, Simone Milani. 1-6 [doi]
- Environment Classification via Blind Roomprints EstimationMalte Baum, Luca Cuccovillo, Artem Yaroshchuk, Patrick Aichroth. 1-6 [doi]
- Exploring the Synthetic Speech Attribution Problem Through Data-Driven DetectorsDavide Salvi, Paolo Bestagini, Stefano Tubaro. 1-6 [doi]
- Toward Reliable JPEG Steganalysis (at QF100)Etienne Levecque, John Klein, Patrick Bas, Jan Butora. 1-6 [doi]
- Graph-based Robust Model HashingYitong Tao, Chuan Qin. 1-6 [doi]
- ECU Identification using Neural Network Classification and Hyperparameter TuningKunaal Verma, Mansi Girdhar, Azeem Hafeez, Selim S. Awad. 1-6 [doi]
- Authorship Attribution of Small Messages Through Language ModelsAntonio Theophilo, Anderson Rocha 0001. 1-6 [doi]
- Mathematical model of printing-imaging channel for blind detection of fake copy detection patternsJoakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy. 1-6 [doi]
- Supervised GAN Watermarking for Intellectual Property ProtectionJianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni. 1-6 [doi]
- Demosaicing to Detect Demosaicing and Image ForgeriesQuentin Bammey, Rafael Grompone von Gioi, Jean-Michel Morel. 1-6 [doi]
- Optimal Energy Efficient Design of Artificial Noise to Prevent Side-Channel AttacksShan Jin, Minghua Xu 0003, Riccardo Bettati, Mihai Christodorescu. 1-6 [doi]
- PRIDE: A Privacy-Preserving Decentralised Key Management SystemDavid Kester, Tianyu Li 0002, Zekeriya Erkin. 1-6 [doi]