References
[1] Farid, H. (2009). Digital image forensics. IEEE Signal Processing Magazine, 26(2), 26-37.
[2] Afchar, D., Nozick, V., Yamagishi, J., & Echizen, I. (2018). Mesonet: a compact facial video forgery detection network. IEEE Transactions on Information Forensics and Security, 13(5), 1211-1226.
[3] Bayram, S., Sencar, H. T., & Memon, N. (2010). An efficient and robust method for detecting copy-move forgery. In 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, 1053-1056. IEEE.
[4] Zhang, J., Han, B., Lin, Z., & Yang, M. (2018). Image manipulation detection using semi-supervised learning. In Proceedings of the European Conference on Computer Vision (ECCV), 802-816.
[5] Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nießner, M. (2019). Faceforensics++: Learning to detect manipulated facial images. In Proceedings of the IEEE/CVF International Conference on Computer Vision, 1-11.
[6] LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444.
[7] Li, Y., Chang, M. C., & Lyu, S. (2020). In ictu oculi: Exposing AI-generated fake face videos by detecting eye blinking. IEEE Transactions on Information Forensics and Security, 15, 2316-2325.
[8] Nguyen, H. H., Yamagishi, J., & Echizen, I. (2019). Capsule-forensics: Using capsule networks to detect forged images and videos. In 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2307-2311. IEEE.
[9] Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint ar-Xiv:1412.6572.
[10] Agarwal, S., Farid, H., Gu, Y., & He, M. (2021). Protecting world leaders against deep fakes. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2052-2061.
[11] Zhou, P., Han, X., Morariu, V. I., & Davis, L. S. (2021). Learning rich features for image manipulation detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 1054-1063.