Secure detection of image manipulation by means of random feature selection Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni IEEE Transactions on Information Forensics and Security 14 (9), 2454-2469, 2019 | 33 | 2019 |
Detection of operation chain: JPEG-resampling-JPEG Z Chen, Y Zhao, R Ni Signal Processing: Image Communication 57, 8-20, 2017 | 31* | 2017 |
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder M Barni, Z Chen, B Tondi 2016 IEEE international workshop on information forensics and security (WIFS …, 2016 | 30 | 2016 |
A gradient-based pixel-domain attack against SVM detection of global image manipulations Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni 2017 IEEE workshop on information forensics and security (WIFS), 1-6, 2017 | 27 | 2017 |
Forensics of blurred images based on no-reference image quality assessment Z Chen, Y Zhao, R Ni 2013 IEEE China Summit and International Conference on Signal and …, 2013 | 7 | 2013 |
The Forensicability of Operation Detection in Image Operation Chain Z Chen, J Zhu, J Zhang IEEE Access 10, 68557-68569, 2022 | 3 | 2022 |
Detecting the operation chain in digital images by type and order fingerprint Z Chen, Y Zhao, R Ni 2014 12th International Conference on Signal Processing (ICSP), 1837-1842, 2014 | 1 | 2014 |
8th IEEE International Workshop on Information Forensics and Security M Barni, MFE Authentication, N Buescher, S Computation, M Chaumont, ... | | |