Skip to main content

Showing 1–16 of 16 results for author: Stamm, M C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.03615  [pdf, other

    cs.CV cs.AI

    Autonomous and Self-Adapting System for Synthetic Media Detection and Attribution

    Authors: Aref Azizpour, Tai D. Nguyen, Matthew C. Stamm

    Abstract: Rapid advances in generative AI have enabled the creation of highly realistic synthetic images, which, while beneficial in many domains, also pose serious risks in terms of disinformation, fraud, and other malicious applications. Current synthetic image identification systems are typically static, relying on feature representations learned from known generators; as new generative models emerge, th… ▽ More

    Submitted 4 April, 2025; originally announced April 2025.

  2. arXiv:2503.21003  [pdf, other

    cs.CV

    Forensic Self-Descriptions Are All You Need for Zero-Shot Detection, Open-Set Source Attribution, and Clustering of AI-generated Images

    Authors: Tai D. Nguyen, Aref Azizpour, Matthew C. Stamm

    Abstract: The emergence of advanced AI-based tools to generate realistic images poses significant challenges for forensic detection and source attribution, especially as new generative techniques appear rapidly. Traditional methods often fail to generalize to unseen generators due to reliance on features specific to known sources during training. To address this problem, we propose a novel approach that exp… ▽ More

    Submitted 26 March, 2025; originally announced March 2025.

    Comments: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2025

  3. arXiv:2503.20991  [pdf, other

    cs.CV

    MVFNet: Multipurpose Video Forensics Network using Multiple Forms of Forensic Evidence

    Authors: Tai D. Nguyen, Matthew C. Stamm

    Abstract: While videos can be falsified in many different ways, most existing forensic networks are specialized to detect only a single manipulation type (e.g. deepfake, inpainting). This poses a significant issue as the manipulation used to falsify a video is not known a priori. To address this problem, we propose MVFNet - a multipurpose video forensics network capable of detecting multiple types of manipu… ▽ More

    Submitted 26 March, 2025; originally announced March 2025.

    Comments: Proceedings of the Winter Conference on Applications of Computer Vision (WACV) 2025

  4. arXiv:2404.15955  [pdf, other

    cs.CV

    Beyond Deepfake Images: Detecting AI-Generated Videos

    Authors: Danial Samadi Vahdati, Tai D. Nguyen, Aref Azizpour, Matthew C. Stamm

    Abstract: Recent advances in generative AI have led to the development of techniques to generate visually realistic synthetic video. While a number of techniques have been developed to detect AI-generated synthetic images, in this paper we show that synthetic image detectors are unable to detect synthetic videos. We demonstrate that this is because synthetic video generators introduce substantially differen… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: To be published in CVPRW24

  5. arXiv:2404.08814  [pdf, other

    cs.CV cs.AI cs.LG

    E3: Ensemble of Expert Embedders for Adapting Synthetic Image Detectors to New Generators Using Limited Data

    Authors: Aref Azizpour, Tai D. Nguyen, Manil Shrestha, Kaidi Xu, Edward Kim, Matthew C. Stamm

    Abstract: As generative AI progresses rapidly, new synthetic image generators continue to emerge at a swift pace. Traditional detection methods face two main challenges in adapting to these generators: the forensic traces of synthetic images from new techniques can vastly differ from those learned during training, and access to data for these new generators is often limited. To address these issues, we intr… ▽ More

    Submitted 16 April, 2024; v1 submitted 12 April, 2024; originally announced April 2024.

    Comments: 11 pages, 4 figures, To be published in CVPRWMF24

  6. arXiv:2308.11557  [pdf, other

    eess.IV cs.CV

    Open Set Synthetic Image Source Attribution

    Authors: Shengbang Fang, Tai D. Nguyen, Matthew C. Stamm

    Abstract: AI-generated images have become increasingly realistic and have garnered significant public attention. While synthetic images are intriguing due to their realism, they also pose an important misinformation threat. To address this new threat, researchers have developed multiple algorithms to detect synthetic images and identify their source generators. However, most existing source attribution tech… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

  7. arXiv:2305.05784  [pdf, other

    cs.CV cs.CR

    Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery for Development and Evaluation of Forensic Tools

    Authors: Brandon B. May, Kirill Trapeznikov, Shengbang Fang, Matthew C. Stamm

    Abstract: We present a first of its kind dataset of overhead imagery for development and evaluation of forensic tools. Our dataset consists of real, fully synthetic and partially manipulated overhead imagery generated from a custom diffusion model trained on two sets of different zoom levels and on two sources of pristine data. We developed our model to support controllable generation of multiple manipulati… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  8. arXiv:2211.15775  [pdf, other

    cs.CV cs.AI

    VideoFACT: Detecting Video Forgeries Using Attention, Scene Context, and Forensic Traces

    Authors: Tai D. Nguyen, Shengbang Fang, Matthew C. Stamm

    Abstract: Fake videos represent an important misinformation threat. While existing forensic networks have demonstrated strong performance on image forgeries, recent results reported on the Adobe VideoSham dataset show that these networks fail to identify fake content in videos. In this paper, we show that this is due to video coding, which introduces local variation into forensic traces. In response, we pro… ▽ More

    Submitted 10 March, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

  9. arXiv:2211.12314  [pdf, other

    eess.IV cs.CV cs.LG eess.SP

    Attacking Image Splicing Detection and Localization Algorithms Using Synthetic Traces

    Authors: Shengbang Fang, Matthew C Stamm

    Abstract: Recent advances in deep learning have enabled forensics researchers to develop a new class of image splicing detection and localization algorithms. These algorithms identify spliced content by detecting localized inconsistencies in forensic traces using Siamese neural networks, either explicitly during analysis or implicitly during training. At the same time, deep learning has enabled new forms of… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  10. arXiv:2209.08000  [pdf, other

    cs.MM

    TIMIT-TTS: a Text-to-Speech Dataset for Multimodal Synthetic Media Detection

    Authors: Davide Salvi, Brian Hosler, Paolo Bestagini, Matthew C. Stamm, Stefano Tubaro

    Abstract: With the rapid development of deep learning techniques, the generation and counterfeiting of multimedia material are becoming increasingly straightforward to perform. At the same time, sharing fake content on the web has become so simple that malicious users can create unpleasant situations with minimal effort. Also, forged media are getting more and more complex, with manipulated videos that are… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

  11. arXiv:2104.12069  [pdf, other

    cs.CV eess.IV

    Making Generated Images Hard To Spot: A Transferable Attack On Synthetic Image Detectors

    Authors: Xinwei Zhao, Matthew C. Stamm

    Abstract: Visually realistic GAN-generated images have recently emerged as an important misinformation threat. Research has shown that these synthetic images contain forensic traces that are readily identifiable by forensic detectors. Unfortunately, these detectors are built upon neural networks, which are vulnerable to recently developed adversarial attacks. In this paper, we propose a new anti-forensic at… ▽ More

    Submitted 22 June, 2022; v1 submitted 25 April, 2021; originally announced April 2021.

    Journal ref: International Conference on Pattern Recognition, August 2022, Montréal Québec

  12. arXiv:2101.11081  [pdf, ps, other

    cs.CV cs.CR cs.LG

    The Effect of Class Definitions on the Transferability of Adversarial Attacks Against Forensic CNNs

    Authors: Xinwei Zhao, Matthew C. Stamm

    Abstract: In recent years, convolutional neural networks (CNNs) have been widely used by researchers to perform forensic tasks such as image tampering detection. At the same time, adversarial attacks have been developed that are capable of fooling CNN-based classifiers. Understanding the transferability of adversarial attacks, i.e. an attacks ability to attack a different CNN than the one it was trained aga… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Journal ref: Published at Electronic Imaging, Media Watermarking, Security, and Forensics 2020, pp. 119-1-119-7(7)

  13. arXiv:2101.11060  [pdf, other

    cs.CR cs.CV

    Defenses Against Multi-Sticker Physical Domain Attacks on Classifiers

    Authors: Xinwei Zhao, Matthew C. Stamm

    Abstract: Recently, physical domain adversarial attacks have drawn significant attention from the machine learning community. One important attack proposed by Eykholt et al. can fool a classifier by placing black and white stickers on an object such as a road sign. While this attack may pose a significant threat to visual classifiers, there are currently no defenses designed to protect against this attack.… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Journal ref: This paper is published on European Conference on Computer Vision 2020, page 202-219, Springer

  14. arXiv:2101.09568  [pdf, other

    cs.CV eess.IV

    A Transferable Anti-Forensic Attack on Forensic CNNs Using A Generative Adversarial Network

    Authors: Xinwei Zhao, Chen Chen, Matthew C. Stamm

    Abstract: With the development of deep learning, convolutional neural networks (CNNs) have become widely used in multimedia forensics for tasks such as detecting and identifying image forgeries. Meanwhile, anti-forensic attacks have been developed to fool these CNN-based forensic algorithms. Previous anti-forensic attacks often were designed to remove forgery traces left by a single manipulation operation a… ▽ More

    Submitted 23 January, 2021; originally announced January 2021.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security

  15. Exposing Fake Images with Forensic Similarity Graphs

    Authors: Owen Mayer, Matthew C. Stamm

    Abstract: We propose new image forgery detection and localization algorithms by recasting these problems as graph-based community detection problems. To do this, we introduce a novel abstract, graph-based representation of an image, which we call the Forensic Similarity Graph, that captures key forensic relationships among regions in the image. In this representation, small image patches are represented by… ▽ More

    Submitted 20 April, 2020; v1 submitted 5 December, 2019; originally announced December 2019.

    Comments: 16 pages, under review at IEEE Journal of Selected Topics in Signal Processing

  16. Forensic Similarity for Digital Images

    Authors: Owen Mayer, Matthew C. Stamm

    Abstract: In this paper we introduce a new digital image forensics approach called forensic similarity, which determines whether two image patches contain the same forensic trace or different forensic traces. One benefit of this approach is that prior knowledge, e.g. training samples, of a forensic trace are not required to make a forensic similarity decision on it in the future. To do this, we propose a tw… ▽ More

    Submitted 19 July, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

    Comments: 16 pages, Accepted for publication with IEEE T-IFS (IEEE Transactions on Information Forensics and Security, 2019)

    Journal ref: IEEE Transactions on Information Forensics and Security (2019) Volume: 15, Pages: 1331 - 1346