Florent Retraint

Orcid: 0000-0001-9273-4260

According to our database1, Florent Retraint authored at least 73 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deepfake Detection Fighting Against Noisy Label Attack.
IEEE Trans. Multim., 2024

Scalable Universal Adversarial Watermark Defending Against Facial Forgery.
IEEE Trans. Inf. Forensics Secur., 2024

Fully Unsupervised Deepfake Video Detection Via Enhanced Contrastive Learning.
IEEE Trans. Pattern Anal. Mach. Intell., 2024

Segment Anything Model and Fully Convolutional Data Description for Plant Multi-Disease Detection on Field Images.
IEEE Access, 2024

2023
FieldPlant: A Dataset of Field Plant Images for Plant Disease Detection and Classification With Deep Learning.
IEEE Access, 2023

2022
Efficient Privacy-Preserving Forensic Method for Camera Model Identification.
IEEE Trans. Inf. Forensics Secur., 2022

Image splicing forgery detection using simplified generalized noise model.
Signal Process. Image Commun., 2022

Optical Aerial Images Change Detection Based on a Color Local Dissimilarity Map and k-Means Clustering.
IEEE Geosci. Remote. Sens. Lett., 2022

Statistical H.264 Double Compression Detection Method Based on DCT Coefficients.
IEEE Access, 2022

A Statistical Modeling Framework for DCT Coefficients of Tampered JPEG Images and Forgery Localization.
IEEE Access, 2022

A Comparative Study of Bayesian and Dempster-Shafer Fusion on Image Forgery Detection.
IEEE Access, 2022

Modeling a Local Dissimilarity Map With Weibull Distribution-Application to 2-Class and Multi-Class Image Classification.
IEEE Access, 2022

Satellite Image Change Detection Using Disjoint Information and Local Dissimilarity Map.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

2021
Image tampering detection based on a statistical model.
Multim. Tools Appl., 2021

CMID: A New Dataset for Copy-Move Forgeries on ID Documents.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Fast process for classifying structural image pairs using Weibull parameters extracted from undersampled Local Dissimilarity Maps.
Proceedings of the 29th European Signal Processing Conference, 2021

2020
Quality factor estimation of JPEG images using a statistical model.
Digit. Signal Process., 2020

Object-Removal Forgery Detection Through Reflectance Analysis.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2020

2019
A Watermarking Technique to Secure Printed Matrix Barcode - Application for Anti-Counterfeit Packaging.
IEEE Access, 2019

Face Presentation Attack Detection Based on a Statistical Model of Image Noise.
IEEE Access, 2019

An Improved Algorithm for Digital Image Authentication and Forgery Localization Using Demosaicing Artifacts.
IEEE Access, 2019

Effective images splicing detection based on decision fusion.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2019

An Image Forgery Detection Solution based on DCT Coefficient Analysis.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Copy and Move Forgery Detection Using SIFT and Local Color Dissimilarity Maps.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

DEFACTO: Image and Face Manipulation Dataset.
Proceedings of the 27th European Signal Processing Conference, 2019

2018
Statistical decision methods in the presence of linear nuisance parameters and despite imaging system heteroscedastic noise: Application to wheel surface inspection.
Signal Process., 2018

Exposing image resampling forgery by using linear parametric model.
Multim. Tools Appl., 2018

Non-Stationary Process Monitoring for Change-Point Detection With Known Accuracy: Application to Wheels Coating Inspection.
IEEE Access, 2018

Identifying Individual Camera Device From RAW Images.
IEEE Access, 2018

Statistical Detector of Resampled TIFF Images.
Proceedings of the 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2018

Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics.
IEEE Trans. Inf. Forensics Secur., 2017

Individual camera device identification from JPEG images.
Signal Process. Image Commun., 2017

Face recognition by thermal video using 3D information and vesselness features.
Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology, 2017

Blind forensics tool of falsification for RAW images.
Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology, 2017

A watermarking technique to secure printed QR codes using a statistical test.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Wheels coating process monitoring in the presence of nuisance parameters using sequential change-point detection method.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Camera model identification based on the generalized noise model in natural images.
Digit. Signal Process., 2016

Face spoofing attack detection based on the behavior of noises.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Quality factor estimation of JPEG compressed images.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Fully automatic detection of anomalies on wheels surface using an adaptive accurate model and hypothesis testing theory.
Proceedings of the 24th European Signal Processing Conference, 2016

2015
Generalized signal-dependent noise model and parameter estimation for natural images.
Signal Process., 2015

Steganalysis of JSteg algorithm using hypothesis testing theory.
EURASIP J. Inf. Secur., 2015

Camera model identification based on DCT coefficient statistics.
Digit. Signal Process., 2015

Detection of interest flooding attacks in Named Data Networking using hypothesis testing.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Source camera device identification based on raw images.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm.
IEEE Trans. Image Process., 2014

Camera Model Identification Based on the Heteroscedastic Noise Model.
IEEE Trans. Image Process., 2014

Statistical detection of data hidden in least significant bits of clipped images.
Signal Process., 2014

A local adaptive model of natural images for almost optimal detection of hidden data.
Signal Process., 2014

Statistical detection of defects in radiographic images using an adaptive parametric model.
Signal Process., 2014

Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results.
Digit. Signal Process., 2014

Optimal detector for camera model identification based on an accurate model of DCT coefficients.
Proceedings of the IEEE 16th International Workshop on Multimedia Signal Processing, 2014

Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Statistical detection of Jsteg steganography using hypothesis testing theory.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection.
IEEE Trans. Inf. Forensics Secur., 2013

Application of hypothesis testing theory for optimal detection of LSB matching data hiding.
Signal Process., 2013

Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients.
Proceedings of the IEEE International Conference on Image Processing, 2013

Asymptotically optimal detection of LSB matching data hiding.
Proceedings of the IEEE International Conference on Image Processing, 2013

A new tomography model for almost optimal detection of anomalies.
Proceedings of the IEEE International Conference on Image Processing, 2013

Image authentication by statistical analysis.
Proceedings of the 21st European Signal Processing Conference, 2013

2012
Statistical detection of LSB matching in the presence of nuisance parameters.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012

Statistical Detection of LSB Matching Using Hypothesis Testing Theory.
Proceedings of the Information Hiding - 14th International Conference, 2012

Hidden information detection based on quantized Laplacian distribution.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Camera model identification Based on hypothesis testing theory.
Proceedings of the 20th European Signal Processing Conference, 2012

Statistical detection of information hiding based on adjacent pixels difference.
Proceedings of the 20th European Signal Processing Conference, 2012

2011
Statistical decision by using quantized observations.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Statistical Decision Methods in Hidden Information Detection.
Proceedings of the Information Hiding - 13th International Conference, 2011

A Cover Image Model For Reliable Steganalysis.
Proceedings of the Information Hiding - 13th International Conference, 2011

2008
varepsilon -Optimal Non-Bayesian Anomaly Detection for Parametric Tomography.
IEEE Trans. Image Process., 2008

2007
A Simple Algorithm for Defect Detection From a Few Radiographies.
J. Comput., 2007

2006
ε-Optimal Anomaly Detection in Parametric Tomography.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

1998
Three-dimensional regularized binary image reconstruction from three two-dimensional projections using a randomized ICM algorithm.
Int. J. Imaging Syst. Technol., 1998


  Loading...