Media Forensics Integrity Analytics

Media Forensics (MediFor)

Publications

Journal Papers

1) C.-C. Jay Kuo, "Understanding convolutional neural networks with a mathematical model", Journal of Visual Communications and Image Representation, vol. 41, pp. 406-413, Best Paper Award, November 2016. DOI: 10.1016/J.JVCIR.2016.11.003

2) G. Marmerola, M. Oikawa, Z. Dias, S. Goldenstein, A. Rocha, "On the Reconstruction of Text Phylogeny Trees: Evaluation and Analysis of Textual Relationships", PLOSONE, vol. 11, no. 12, pp. 1–35, December 2016. DOI: 10.1371/journal.pone.0167822

3) L. Bondi, L. Baroffio, D. Güera, P. Bestagini, E. J. Delp, S. Tubaro, "First Steps Towards Camera Model Identification with Convolutional Neural Networks", IEEE Signal Processing Letters, vol. 24, no. 3, pp. 259-263, March 2017. DOI: 10.1109/LSP.2016.2641006

4) C.-C. Jay Kuo, "The CNN as a guided multi-layer RECOS transform", IEEE Signal Processing Magazine, vol. 34, no. 3, pp. 81-89, May 2017. DOI: 10.1109/MSP.2017.2671158

5) S. Taspinar, M. Mohanty, N. Memon, "PRNU-based camera attribution from multiple seam-carved images", IEEE Transactions on Information Forensics and Security, 12(12), pp.3065-3080, May 2017. DOI: 10.1109/TIFS.2017.2737961

6) S. Vatansever, A. E. Dirik, N. Memon, "Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach", IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1463-1467, October 2017. DOI: 10.1109/LSP.2017.2741440

7) M. Barni, L. Bondi, N. Bonettini, P. Bestagini, A. Costanzo, M. Maggini, B. Tondi, S. Tubaro, "Aligned and non-aligned double JPEG detection using convolutional neural networks", Journal of Visual Communication and Image Representation, vol. 49, pp. 153-163, November 2017. DOI: 10.1016/J.JVCIR.2017.09.003

8) F. Costa, A. Oliveira, P. Ferrara, Z. Dias, S. Goldenstein, A. Rocha, "New Dissimilarity Measures for Image Phylogeny Reconstruction", Pattern Analysis and Applications, vol. 20, no. 4, pp. 1289-1305, November 2017. DOI: 10.1007/s10044-017-0616-9

9) R. Salloum, Y. Ren, C.-C. Jay Kuo, "Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN)", Journal of Visual Communication and Image Representation, vol. 51, pp. 201-209, January 2018. DOI: 10.1016/J.JVCIR.2018.01.010

10) C.-C. Jay Kuo, Y. Chen, "On data-driven Saak transform", Journal of Visual Communication and Image Representation, vol. 50, pp. 237-246, January 2018. DOI: 10.1016/J.JVCIR.2017.11.023

11) D. Moreira, A. Bharati, J. Brogan, A. Pinto, M. Parowski, K. W. Bowyer, P. J. Flynn, A. Rocha, W. J. Scheirer, "Image Provenance Analysis at Scale", IEEE Transactions on Image Processing, vol. 27, no. 12, pp. 6109-6123, July 2018. DOI: 10.1109/TIP.2018.2865674

12) L. Bondi, P. Bestagini, F. Pérez-González, S. Tubaro, "Improving PRNU Compression through Preprocessing, Quantization and Coding", IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, pp. 608-620, July 2018. DOI: 10.1109/TIFS.2018.2859587

13) M. Barni, H. Santoyo-Garcia, B. Tondi, "An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack", IEEE Signal Processing Letters, vol. 25, no. 10, pp. 1435-1439, October 2018. DOI: 10.1109/LSP.2018.2863045

14) B. Tondi, "Pixel-domain Adversarial Examples Against CNN-based Manipulation Detectors", Electronics Letters, Vol. 54, No. 21, pp 1220 - 1222, October 2018. DOI: 10.1049/el.2018.6469

15) R. Salloum, C.-C. Jay Kuo, "Efficient Image Splicing Localization via Contrastive Feature Extraction", arXiv:1901.07172, January 2019.

16) S. Vatansever, A. E. Dirik and N. Memon, "Analysis of Rolling Shutter Effect on ENF-Based Video Forensics", IEEE Transactions on Information Forensics and Security, January 2019. DOI: 10.1109/TIFS.2019.2895540

17) Z. Chen, B. Tondi, X. Li, R. Ni, Y. Zhao, M. Barni, "Secure Detection of Image Manimpulation by means of Random Feature Selection", IEEE Transactions on Information Forensics and Security, February 2019. DOI: 10.1109/TIFS.2019.2901826

18) C.-C. Jay Kuo, M. Zhang, S. Li, J. Duan, Y. Chen, "Interpretable Convolutional Neural Networks via Feedforward Design", Journal of Visual Communication and Image Representation, vol. 60, pp. 346-359, April 2019. DOI: 10.1016/J.JVCIR.2019.03.010

19) S. Taspinar, M. Mohanty, N. Memon, "Source Camera Attribution of Multi-Format Devices", arXiv:1904.01533, April 2019.

20) S. Taspinar, M. Mohanty, N. Memon, "Camera Fingerprint Extraction via Spatial Domain Averaged Frames", arXiv:1904.04573, September 2019.

21) Y. Chen, C.-C. Jay Kuo, "PixelHop: A Successive Subspace Learning (SSL) Method for Object Classification", Journal of Visual Communication and Image Representation, December 2019. DOI: 10.1016/J.JVCIR.2019.102749

22) Y.Niu, B. Tondi, Y.Zhao, M.Barni, "Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN", IEEE Signal Processing Letters, Vol. 27, pp 191 - 195, December 2019. DOI: 10.1109/LSP.2019.2962997

23) M.Barni, E. Nowroozi, B. Tondi, "Improving the Security of Image Manipulation Detection through One-and-a-half-class Multiple Classification", Multimedia Tools and Applications, Springer, 79, pp 2383–2408, January 2020. DOI: 10.1007/s11042-019-08425-z

Conference Papers

1) F. Costa, S. Lameri, P. Bestagini, Z. Dias, S. Tubaro, A. Rocha, "Hash-Based Frame Selection for Video Phylogeny", IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, December 2016. DOI: 10.1109/WIFS.2016.7823906

2) M. Barni, Z. Chen, B. Tondi, Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder", IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, December 2016. DOI: 10.1109/WIFS.2016.7823902

3) S Taspinar, M Mohanty, N Memon, "Source camera attribution using stabilized video", IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, December 2016. DOI: 10.1109/WIFS.2016.7823918

4) S. Milani, P. Bestagini, S. Tubaro, "Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localization", IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, December 2016. DOI: 10.1109/WIFS.2016.7823909

5) L. Bondi, D. Güera, L. Baroffio, P. Bestagini, E. J. Delp, S. Tubaro, "A Preliminary Study on Convolutional Neural Networks for Camera Model Identification", IS&T Electronic Imaging (EI), vol. 2017, no. 7, pp. 67-76, Burlingame, California, January 2017. Preprint: Link DOI: 10.2352/ISSN.2470-1173.2017.7.MWWSF-327

6) D. Güera, Y. Wang, L. Bondi, P. Bestagini, S. Tubaro, E. J. Delp, "A Counter-Forensic Method for CNN-Based Camera Model Identification", IEEE Conference on Computer Vision and Pattern Recognition Workshop (CVPRW), pp. 1840-1847, Honolulu, Hawaii, July 2017. DOI: 10.1109/CVPRW.2017.230

7) L. Bondi, S. Lameri, D. Güera, P. Bestagini, E. J. Delp, S. Tubaro, "Tampering Detection and Localization through Clustering of Camera-Based CNN Features", IEEE Conference on Computer Vision and Pattern Recognition Workshop (CVPRW), pp. 1855-1864, Honolulu, Hawaii, July 2017. DOI: 10.1109/CVPRW.2017.232

8) S. Milani, P. Bestagini, S. Tubaro, "Video Phylogeny Tree Reconstruction Using Aging Measures", European Signal Processing Conference (EUSIPCO), pp. 2181-2185, Kos, Greece, August 2017. DOI: 10.23919/EUSIPCO.2017.8081596

9) M. Barni, E. Nowroozi, B. Tondi, "Higher-Order, Adversary-Aware, Double JPEG-Detection via Selected Training on Attacked Samples", European Signal Processing Conference (EUSIPCO), pp. 281-285, Kos, Greece, August 2017. DOI: 10.23919/EUSIPCO.2017.8081213

10) A. Bharati, D. Moreira, A. Pinto, J. Brogan, K. Bowyer, P. Flynn, W. J. Scheirer, A. Rocha, "U-Phylogeny: Undirected Provenance Graph Construction in the Wild", IEEE International Conference on Image Processing (ICIP), pp. 1517-1521, Beijing, China, September 2017. DOI: 10.1109/ICIP.2017.8296535

11) S. Taspinar, H.T. Sencar, S. Bayram, N. Memon, "Fast Camera Fingerprint Matching in Very Large Databases", IEEE International Conference on Image Processing (ICIP), pp. 4088-4092, Beijing, China, September 2017. DOI: 10.1109/ICIP.2017.8297051

12) A. Pinto, D. Moreira, A. Bharati, J. Brogan, K. Bowyer, P. Flynn, W. J. Scheirer, A. Rocha, "Provenance Filtering for Multimedia Phylogeny", IEEE International Conference on Image Processing (ICIP), pp. 1502-1506, Beijing, China, September 2017. DOI: 10.1109/ICIP.2017.8296532

13) J. Brogan, P. Bestagini, A. Bharati, A. Pinto, D. Moreira, K. Bowyer, P. Flynn, A. Rocha, W. Scheirer, "Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization", IEEE International Conference on Image Processing (ICIP), pp. 4078-4082, Beijing, China, September 2017. DOI: 10.1109/ICIP.2017.8297049

14) S. Lameri, L. Bondi, P. Bestagini, S. Tubaro, "Near-Duplicate Video Detection Exploiting Noise Residual Traces", IEEE International Conference on Image Processing (ICIP), pp. 1497-1501, Beijing, China, September 2017. DOI: 10.1109/ICIP.2017.8296531

15) S. Mandelli, L. Bondi, S. Lameri, V. Lipari, P. Bestagini, S. Tubaro, "Inpainting-Based Camera Anonymization", IEEE International Conference on Image Processing (ICIP), pp. 1522-1526, Beijing, China, September 2017. DOI: 10.1109/ICIP.2017.8296536

16) Z. Chen, B. Tondi, X. Li, R. Ni, Y. Zhao, M. Barni, "A Gradient-Based Pixel-Domain Attack Against SVM Detection of Global Image Manipulation", IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, December 2017. DOI: 10.1109/WIFS.2017.8267668

17) L. Bondi, F. Pérez-González, P. Bestagini, S. Tubaro, "Design of Projection Matrices for PRNU Compression", IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, December 2017. DOI: 10.1109/WIFS.2017.8267652

18) S. Verde, S. Milani, P. Bestagini, S. Tubaro, "Audio Phylogenetic Analysis using Geometric Transforms", IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, December 2017. DOI: 10.1109/WIFS.2017.8267650

19) S. K. Yarlagadda, D. Güera, P. Bestagini, F. Zhu, S. Tubaro, E. J. Delp, "Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier", IS&T Electronic Imaging (EI), vol. 2018, no. 7, pp. 214-1-214-9, Burlingame, California, January 2018. DOI: 10.2352/ISSN.2470-1173.2018.07.MWSF-214

20) D. Güera, S. K. Yarlagadda, P. Bestagini, F. Zhu, S. Tubaro, E. J. Delp, "Reliability Map Estimation For CNN-Based Camera Model Attribution", IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 964-973, Lake Tahoe, Nevada, February 2018. DOI: 10.1109/WACV.2018.00111

21) S. Mandelli, N. Bonettini, P. Bestagini, V. Lipari, S. Tubaro, "Multiple JPEG Compression Detection through Task-driven Non-negative Matrix Factorization", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2106-2110, Calgary, Canada, April 2018. DOI: 10.1109/ICASSP.2018.8461904

22) M. Barni, E. Nowroozi, B. Tondi, "Detection of Adaptive Histogram Equalization Robust Against JPEG Compression", IAPR/IEEE International Workshop on Biometrics and Forensics (IWBF), pp. 1-8, Sassari, Italy, June 2018. DOI: 10.1109/IWBF.2018.8401564

23) M. Barni, M. C. Stamm, B. Tondi, "Adversarial Multimedia Forensics: Overview and Challenges Ahead", European Signal Processing Conference (EUSIPCO),pp. 962-966, Rome, Italy, September 2018. DOI: 10.23919/EUSIPCO.2018.8553305

24) N. Bonettini, L. Bondi, D. Güera, S. Mandelli, P. Bestagini, S. Tubaro, E. J. Delp, "Fooling PRNU-Based Detectors Through Convolutional Neural Networks", European Signal Processing Conference (EUSIPCO), Rome, Italy, September 2018. DOI: 10.23919/EUSIPCO.2018.8553596

25) S. Mandelli, D. Cozzolino, P. Bestagini, L. Verdoliva, S. Tubaro, "Blind Detection and Localization of Video Temporal Splicing Exploiting Sensor-Based Footprints", European Signal Processing Conference (EUSIPCO), Rome, Italy, September 2018. DOI: 10.23919/EUSIPCO.2018.8553511

26) M. Barni, A. Costanzo, E. Nowroozi, B. Tondi, "CNN-based Detection of Generic Contrast Adjustment with JPEG Post-processing", IEEE International Conference on Image Processing (ICIP), pp. 3803-3807, Athens, Greece, October 2018. DOI: 10.1109/ICIP.2018.8451698

27) W. Yaqub, M. Mohanty, N. Memon, "Towards camera identification from cropped query images", IEEE International Conference on Image Processing (ICIP), pp. 3798-3802, Athens, Greece, October 2018. DOI: 10.1109/ICIP.2018.8451749

28) S. Verde, L. Bondi, P. Bestagini, S. Milani, G. Calvagno, S. Tubaro, "Video Codec Forensics Based on Convolutional Neural Networks", IEEE International Conference on Image Processing (ICIP), pp. 530-534, Athens, Greece, October 2018. DOI: 10.1109/ICIP.2018.8451143

29) D. Güera, E. J. Delp, "Deepfake Video Detection Using Recurrent Neural Networks", IEEE International Conference on Advanced Video and Signal-based Surveillance (AVSS), Auckland, New Zealand, November 2018. DOI: 10.1109/AVSS.2018.8639163

30) M. Barni, M. Nakano-Miyatake, H.S-Garcıa, B. Tondi, "Countering the Pooled Triangle Test for PRNU-based camera identification", IEEE Workshop on Information Forensics and Security (WIFS), Hong Kong, December 2018. DOI: 10.1109/WIFS.2018.8630778

31) E. R. Bartusiak, S. K. Yarlagadda, D. Güera, F. Zhu, P. Bestagini, S. Tubaro, E. J. Delp, "Splicing Detection And Localization In Satellite Imagery Using Conditional GANs", IEEE International Conference on Multimedia Information Processing and Retrieval (MIPR), San Jose, California, March 2019. DOI: 10.1109/MIPR.2019.00024

32) S. Vatansever, A. E. Dirik, N. Memon, "Factors Affecting ENF Based Time-of-recording Estimation for Video", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 2497-2501, Brighton, UK, May 2019. DOI: 10.1109/ICASSP.2019.8682419

33) M. Barni, E. Nowroozi, K. Kallas, B. Tondi, "On the Transferability of Adversarial Examples Against CNN-Based Image Forensics", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Brighton, UK, May 2019. DOI: 10.1109/ICASSP.2019.8683772

34) S. K. Yarlagadda, D. Güera, D. Mas Montserrat, F. Zhu, P. Bestagini, S. Tubaro, E. J. Delp, "Shadow Removal Detection And Localization For Forensics Analysis", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Brighton, UK, May 2019. DOI: 10.1109/ICASSP.2019.8683695

35) D. Güera, S. Baireddy, P. Bestagini, S. Tubaro, E. J. Delp, "We Need No Pixels: Video Manipulation Detection Using Stream Descriptors", International Conference on Machine Learning (ICML), Synthetic Realities: Deep Learning for Detecting AudioVisual Fakes Workshop, Long Beach, California, June 2019. URL: arXiv:1906.08743

36) J. Horváth, D. Güera, S. K. Yarlagadda, P. Bestagini, F. Zhu, S. Tubaro, E. J. Delp, "Anomaly-based Manipulation Detection in Satellite Images", IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Media Forensics (CVPRW), Long Beach, California, June 2019. URL: http://openaccess.thecvf.com/content_CVPRW_2019/html/Media_Forensics/Horvath_Anomaly-Based_Manipulation_Detection_in_Satellite_Images_CVPRW_2019_paper.html

37) N. Bonettini, D. Güera, L. Bondi, P. Bestagini, E. J. Delp, S. Tubaro, "Image Anonymization Detection With Deep Handcrafted Features", IEEE International Conference on Image Processing (ICIP), Taipei, Taiwan, September 2019. DOI: 10.1109/ICIP.2019.8804294

38) M. Barni, D. Huang, B. Li and B. Tondi, "Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach", IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1-6, Delft, Netherlands, December 2019. DOI: 10.1109/WIFS47025.2019.9035110

39) R. Shao, E. J. Delp, "Forensic Scanner Identification Using Machine Learning", IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI), Santa Fe, New Mexico, March 2020. https://arxiv.org/abs/2002.02079

40) M.Barni, E.Nowroozi, B.Tondi, B.Zhang, "Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2977-2981, Barcelona, Spain, May 2020. DOI: 10.1109/ICASSP40776.2020.9053318

41) A. G. Poyraz, A. E. Dirik, A. Karakucuk, N. Memon, "Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection". arXiv:2002.10123, May 2020

42) J. Horváth, D. Mas Montserrat, H. Hao, E. Delp, "Manipulation Detection in Satellite Images Using Deep Belief Networks", IEEE Computer Vision and Pattern Recognition Workshops (CVPRW), Seattle, Washington, June 2020. https://arxiv.org/abs/2004.12441

43) D. Mas Montserrat, H. Hao, S. K. Yarlagadda, S. Baireddy, R. Shao, J. Horváth, E. Bartusiak, J. Yang, D. Guera, F. Zhu, E. J. Delp, "Deepfakes Detection with Automatic Face Weighting", IEEE Computer Vision and Pattern Recognition Workshops (CVPRW), Seattle, Washington, June 2020. https://arxiv.org/abs/2004.12027

Theses

1) E. R. Bartusiak, "An Adversarial Approach to Sliced Forgery Detection and Localization in Satellite Imagery", Master's dissertation, Purdue University, West Lafayette, IN, May 2019. URL: https://engineering.purdue.edu/~ace/thesis/emily/emily-thesis-april-2019.pdf

2) D. Guera, "Media Forensics Using Machine Learning Approaches", PhD dissertation, Purdue University, West Lafayette, IN, December 2019. URL: https://engineering.purdue.edu/~ace/thesis/david-guera/david-thesis-final.pdf

3) D. Mas Montserrat, "Machine Learning-Based Multimedia Analytics", PhD dissertation, Purdue University, West Lafayette, IN, June 2020. URL: https://engineering.purdue.edu/~ace/thesis/danni/daniel-thesis-final.pdf

Press Releases

A Purdue University press release of our work on deepfake detection

A Purdue University press release of our project

A WLFI-TV report of our project

This material is based on research sponsored by DARPA and the Air Force Research Laboratory (AFRL) under agreement number FA8750-16-2-0173. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of DARPA and the Air Force Research Laboratory (AFRL) or the U.S. Government.