1 |
I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, and Y. Bengio, "Generative Adversarial Nets," Proceedings of the 27th International Conference on Neural Information Processing Systems, Vol. 2, pp. 2672-2680, 2014.
|
2 |
T. Karras, S. Laine, M. Aittala, J. Hellsten, J. Lehtinen, and T. Aila, "Analyzing and Improving the Image Quality of StyleGAN," Proceeding of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 8110-8119, 2020.
|
3 |
C. Ledig, L. Theis, F. Huszar, J. Caballero, A. Cunningham, A. Acosta, and W. Shi, "Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network," Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4681-4690, 2017.
|
4 |
J.Y. Zhu, T. Park, P. Isola, and A.A. Efros, "Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks," Proceeding of the IEEE International Conference on Computer Vision, pp. 2223-2232, 2017.
|
5 |
H. Mo, B. Chen, and W. Luo, "Fake Faces Identification via Convolutional Neural Network," Proceeding of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 43-47, 2018.
|
6 |
N.T. Do, I.S. Na, and S.H. Kim, "Forensics Face Detection from GANs Using Convolutional Neural Network," Proceeding of International Symposium on Information Technol-ogy Convergence, 2018.
|
7 |
D. Cozzolino, J. Thies, A. Rossler, C. Riess, M. Niessner, and L. Verdoliva, "Forensictransfer: Weakly-Supervised Domain Adaptation for Forgery Detection," arXiv preprint, arXiv: 1812.02510, 2018.
|
8 |
F. Yu, A. Seff, Y. Zhang, S. Song, T. Funkhouser, and J. Xiao, "LSUN: Construction of a Large-scale Image Dataset using Deep Learning with Humans in the Loop," arXiv preprint, arXiv:1506.03365, 2015.
|
9 |
S. Kang and H. Park, "Hierarchical CNNBased Senary Classification of Steganographic Algorithms," Journal of Korea Multimedia Society, Vol. 24, No. 4, pp. 550-557, 2021.
DOI
|
10 |
F. Chollet, "Xception: Deep Learning with Depthwise Separable Convolutions," Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1251-1258, 2017.
|
11 |
L. Verdoliva, "Media Forensics and Deepfakes: an Overview," IEEE Journal of Selected Topics in Signal Processing, Vol. 14, No. 5, 910-932, 2020.
DOI
|
12 |
T. Karras, T. Aila, S. Laine, and J. Lehtinen, "Progressive Growing of GANs for Improved Quality, Stability, and Variation," arXiv preprint, arXiv:1710.10196, 2017.
|
13 |
F. Marra, D. Gragnaniello, L. Verdoliva, and G. Poggi, "Do GANs Leave Artificial Fingerprints?," Proceeding of IEEE Conference on Multimedia Information Processing and Retrieval, pp. 506-511, 2019.
|
14 |
N. Yu, L.S. Davis, and M. Fritz, "Attributing Fake Images to GANs: Learning and Analyzing GAN fingerprints," Proceeding of the IEEE/CVF International Conference on Computer Vision, pp. 7556-7566, 2019.
|
15 |
M. Du, S. Pentyala, Y. Li, and X. Hu, "Towards Generalizable Forgery Detection with Locality -Aware Autoencoder," arXiv preprint, arXiv: 1909.05999, 2019.
|
16 |
H. Li, B. Li, S. Tan, and J. Huang, "Detection of Deep Network Generated Images Using Disparities in Color Components," arXiv preprint, arXiv:1808.07276, 2018.
|
17 |
R.J. Wang, X. Li, and C.X. Ling, "Pelee: A Real-Time Object Detection System on Mobile Devices," arXiv preprint, arXiv:1804. 06882, 2018.
|