Protecting image manipulation detectors against perfect knowledge attacks requires the adoption of detector architectures which are intrinsically difficult to attack. In this paper, we do so, by exploiting a recently proposed multiple-classifier architecture combining the improved security of 1-Class (1C) classification and the good performance ensured by conventional 2-Class (2C) classification in the absence of attacks. The architecture, also known as 1.5-Class (1.5C) classifier, consists of one 2C classifier and two 1C classifiers run in parallel followed by a final 1C classifier. In our system, the first three classifiers are implemented by means of Support Vector Machines (SVM) fed with SPAM features. The outputs of such classifiers ar...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
This work examines the problem of increasing the robustness of deep neural network-based image class...
Image classification is intrinsically a multiclass, nonlinear classification task. Support Vector Ma...
Protecting image manipulation detectors against perfect knowledge attacks requires the adoption of d...
Pattern classifiers have been widely used in adversarial settings like spam and malware detection, ...
In this paper we present an adversary-aware double JPEG detector which is capable of detecting the p...
In adversarial classification tasks like spam filtering, intrusion detection in computer networks an...
We perceive the digital watermark detection as classification problem in image processing. We classi...
© 2018 Association for Computing Machinery. Machine learning (ML) is commonly used in multiple disci...
The use of machine-learning for multimedia forensics is gaining more and more consensus, especially ...
Abstract. Pattern classification systems are currently used in security applications like intrusion ...
Experimental and theoretical evidences showed that multiple classifier systems (MCSs) can outperform...
In many security applications a pattern recognition system faces an adversarial classification probl...
We address the problem of data-driven image manipulation detection in the presence of an attacker wi...
Nowadays machine-learning algorithms are increasingly being applied in security-related applications...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
This work examines the problem of increasing the robustness of deep neural network-based image class...
Image classification is intrinsically a multiclass, nonlinear classification task. Support Vector Ma...
Protecting image manipulation detectors against perfect knowledge attacks requires the adoption of d...
Pattern classifiers have been widely used in adversarial settings like spam and malware detection, ...
In this paper we present an adversary-aware double JPEG detector which is capable of detecting the p...
In adversarial classification tasks like spam filtering, intrusion detection in computer networks an...
We perceive the digital watermark detection as classification problem in image processing. We classi...
© 2018 Association for Computing Machinery. Machine learning (ML) is commonly used in multiple disci...
The use of machine-learning for multimedia forensics is gaining more and more consensus, especially ...
Abstract. Pattern classification systems are currently used in security applications like intrusion ...
Experimental and theoretical evidences showed that multiple classifier systems (MCSs) can outperform...
In many security applications a pattern recognition system faces an adversarial classification probl...
We address the problem of data-driven image manipulation detection in the presence of an attacker wi...
Nowadays machine-learning algorithms are increasingly being applied in security-related applications...
We investigate if the random feature selection approach proposed in [1] to improve the robustness of...
This work examines the problem of increasing the robustness of deep neural network-based image class...
Image classification is intrinsically a multiclass, nonlinear classification task. Support Vector Ma...