2020
DOI: 10.48550/arxiv.2007.14132
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Toward Reliable Models for Authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks

Abstract: In multimedia forensics, learning-based methods provide state-ofthe-art performance in determining origin and authenticity of images and videos. However, most existing methods are challenged by outof-distribution data, i.e., with characteristics that are not covered in the training set. This makes it difficult to know when to trust a model, particularly for practitioners with limited technical background.In this work, we make a first step toward redesigning forensic algorithms with a strong focus on reliabilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
0
0
Order By: Relevance
“…The purpose of this experiment is to establish a likely situation of multiple anomaly/attack which depicts real-time scenarios. The proposed approach demonstrates a reasonable detection performance as a result of the Bayesian prior probability to establish synergies/fusion between heterogeneous information and classification of out-of-distribution instances as unknown, for impressive detection of unknown attacks/anomalies in a system [40,41].…”
Section: Discussion Of the Mechanisms Under Multiple Anomalymentioning
confidence: 99%
“…The purpose of this experiment is to establish a likely situation of multiple anomaly/attack which depicts real-time scenarios. The proposed approach demonstrates a reasonable detection performance as a result of the Bayesian prior probability to establish synergies/fusion between heterogeneous information and classification of out-of-distribution instances as unknown, for impressive detection of unknown attacks/anomalies in a system [40,41].…”
Section: Discussion Of the Mechanisms Under Multiple Anomalymentioning
confidence: 99%