Skip to main content Skip to navigation





Keynote Speakers

Paper Submission

Sunday, August 21st, 2022

All times are local times in Montreal, Quebec, Canada (UTC-4)

8:50 - 9:00


9:00 - 10:00

Keynote Speaker I

Chair: Victor Sanchez, University of Warwick

AI-enabled Digital Forensics

Professor Anderson Rocha, University of Campinas, Brazil

10:00 - 10:20 Break
10:20 - 11:40
Session 1

Chair: Yu Guan, University of Warwick

1. Making Generated Images Hard To Spot: A Transferable Attack On Synthetic Image Detectors
X. Zhao and M. Stamm

Dept. of Electrical and Computer Engineering, Drexel Univerisity Philadelphia, USA

2. Improving Detection of Unprecedented Anti-forensics Attacks on Sensor Pattern Noises Through Generative Adversarial Networks
Y. Quan1 and C.-T. Li2 

1 Warwick Manufacturing Group, University of Warwick, UK
2 School of Info. Technology, Deakin University, Australia

3. Image Watermarking Backdoor Attacks in CNN-based classification tasks
G. Abbate1, I. Amerini1, and R. Caldelli2,3

1 Sapienza University of Rome, Rome, Italy
2 CNIT, Florence, Italy
3 Universitas Mercatorum, Rome, Italy

4. Device (In)Dependence of Deep Learning-based Image Age Approximation

R. Joechl and A. Uhl

Dept .of Artificial Intelligence and Human Interfaces, University of Salzburg, Austria

11:40 - 13:00


13:00 - 14:00

Keynote Speaker II

Chair: Irene Armerini, Sapienza University of Rome

Deepfake detection: humans vs. machines

Dr. Pavel Korshunov, IDIAP Research Institute, Switzerland

14:00 - 14:20


14:20 - 15:40

Session 2

Chair: Roberto Leyva, University of Warwick

1. DepthFake: a depth-based strategy for detecting Deepfake videos
L. Maiano, L. Papa, K. Vocaj, and I. Amerini

Sapienza University of Rome, Rome, Italy

2. AEXANet: An End-to-End Deep Learning based Voice Anti-spoofing System
Z. Anwar1, A. Javed1, and K. Malik2 

1 Software Engineering Department, University of Engineering and Technology, Taxila, Pakistan
2 Dept. of Computer Science & Eng., Oakland University, Rochester, USA

3. Document forgery detection using double JPEG compression
T. Taburet1, K. Rouis1, M. Coustaty1, P. Gomez-Krämer1, N. Sidere1, S. Kébairi2, and V. Poulain D'Andecy2 

1 L3i Laboratoire
2 La Rochelle Universite, La Rochelle, France

4. An Effective Training Strategy for Enhanced Source Camera Device Identification
Manisha1, C.-T. Li2, and K. A. Kotegar1

1 Dept. of Data Science and Computer Applications, Manipal Institute of Technology, Manipal Academy of Higher Education Manipal, India
2 School of Info. Technology, Deakin University, Australia

15:40- 15:50