Mauro Barni
Orcid: 0000-0002-7368-0866
According to our database1,
Mauro Barni
authored at least 327 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2012, "For contributions to signal and image processing for multimedia security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
EURASIP J. Image Video Process., December, 2024
Covert Task Embedding: Turning a DNN Into an Insider Agent Leaking Out Private Information.
IEEE Trans. Neural Networks Learn. Syst., July, 2024
A One-Class Classifier for the Detection of GAN Manipulated Multi-Spectral Satellite Images.
Remote. Sens., March, 2024
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment.
IEEE Trans. Inf. Forensics Secur., 2024
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
A siamese-based verification system for open-set architecture attribution of synthetic images.
Pattern Recognit. Lett., 2024
An Efficient Watermarking Method for Latent Diffusion Models via Low-Rank Adaptation.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
2023
IEEE Signal Process. Mag., July, 2023
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection.
IEEE Trans. Dependable Secur. Comput., 2023
Universal BlackMarks: Key-Image-Free Blackbox Multi-Bit Watermarking of Deep Neural Networks.
IEEE Signal Process. Lett., 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Classification of Synthetic Facial Attributes by Means of Hybrid Classification/Localization Patch-Based Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023
Which Country is This Picture From? New Data and Methods For Dnn-Based Country Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
IEEE Trans. Circuits Syst. Video Technol., 2022
An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images.
CoRR, 2022
CoRR, 2022
Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection.
CoRR, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities.
Proceedings of the 14th IEEE Image, Video, and Multidimensional Signal Processing Workshop, 2022
Attacking and Defending Printer Source Attribution Classifiers in the Physical Domain.
Proceedings of the Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, 2022
Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022
Proceedings of the 30th European Symposium on Artificial Neural Networks, 2022
2021
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
A Master Key backdoor for universal impersonation attack against DNN-based face verification.
Pattern Recognit. Lett., 2021
VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents.
J. Imaging, 2021
J. Inf. Secur. Appl., 2021
CoRR, 2021
VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking.
CoRR, 2021
Ensembling Shallow Siamese Neural Network Architectures for Printed Documents Verification in Data-Scarcity Scenarios.
IEEE Access, 2021
Iris Deidentification With High Visual Realism for Privacy Protection on Websites and Social Networks.
IEEE Access, 2021
Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the 29th European Signal Processing Conference, 2021
Springer, ISBN: 978-981-32-9000-6, 2021
2020
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Signal Process. Lett., 2020
CNN-based steganalysis and parametric adversarial embedding: A game-theoretic framework.
Signal Process. Image Commun., 2020
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes.
Secur. Commun. Networks, 2020
Improving the security of image manipulation detection through one-and-a-half-class multiple classification.
Multim. Tools Appl., 2020
Found. Trends Commun. Inf. Theory, 2020
Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability.
Comput. Vis. Image Underst., 2020
Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks.
CoRR, 2020
CoRR, 2020
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020
Backdooring Deep Learning Architectures: Threats and (some) Opportunities.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
CoRR, 2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Proceedings of the 21st IEEE International Workshop on Multimedia Signal Processing, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
2018
IEEE Trans. Inf. Theory, 2018
IEEE Signal Process. Lett., 2018
Inf. Fusion, 2018
Anonymous subject identification and privacy information management in video surveillance.
Int. J. Inf. Sec., 2018
CoRR, 2018
CoRR, 2018
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
J. Vis. Commun. Image Represent., 2017
A gradient-based pixel-domain attack against SVM detection of global image manipulations.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.
IEEE Trans. Inf. Forensics Secur., 2016
A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
IEEE Trans. Inf. Forensics Secur., 2016
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the 24th European Signal Processing Conference, 2016
2015
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing.
IEEE Signal Process. Mag., 2015
Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics.
IEEE Signal Process. Lett., 2015
Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks.
CoRR, 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
From Single Object to Contextual Authentication - A New Challenge in Multimedia Forensics and Beyond.
Proceedings of the VISAPP 2015, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015
Optimum decision fusion in cognitive wireless sensor networks with unknown users location.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
An information-theoretic analysis of dirty paper coding for informed audio watermarking.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the Image Sensors and Imaging Systems 2014, 2014
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
2013
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Signal Process. Mag., 2013
Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation.
IEEE Signal Process. Mag., 2013
Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors].
IEEE Signal Process. Mag., 2013
Int. J. Digit. Crime Forensics, 2013
Int. J. Digit. Crime Forensics, 2013
Counter-forensics of SIFT-based copy-move detection by means of keypoint classification.
EURASIP J. Image Video Process., 2013
EURASIP J. Inf. Secur., 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
The watchful forensic analyst: Multi-clue information fusion with background knowledge.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013
Proceedings of the 2013 Information Theory and Applications Workshop, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
The Security Margin: A measure of source distinguishability under adversarial conditions.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation.
Proceedings of the Security and Privacy in Biometrics, 2013
2012
Signal Process. Image Commun., 2012
Progressive Compressed Sensing and Reconstruction of Multidimensional Signals Using Hybrid Transform/Prediction Sparsity Model.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Optimum forensic and counter-forensic strategies for source identification with training data.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Multimedia and Security Workshop, 2012
Proceedings of the Multimedia and Security Workshop, 2012
Proceedings of the 5th International Symposium on Communications, 2012
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Proceedings of the 20th European Signal Processing Conference, 2012
Proceedings of the 20th European Signal Processing Conference, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010) [Book Reviews].
IEEE Signal Process. Mag., 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Analysis of the security of linear blinding techniques from an information theoretical point of view.
Proceedings of the IEEE International Conference on Acoustics, 2011
Low-complexity predictive lossy compression of hyperspectral and ultraspectral images.
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the 19th European Signal Processing Conference, 2011
2010
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Asymptotically optimum universal watermark embedding and detection in the high-SNR regime.
IEEE Trans. Inf. Theory, 2010
IEEE Trans. Image Process., 2010
IEEE Trans. Inf. Forensics Secur., 2010
Composite signal representation for fast and storage-efficient processing of encrypted signals.
IEEE Trans. Inf. Forensics Secur., 2010
Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding.
IEEE Trans. Geosci. Remote. Sens., 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics.
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Media Forensics and Security II, 2010
Identification of cut & paste tampering by means of double-JPEG detection and image segmentation.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the IEEE International Conference on Acoustics, 2010
Proceedings of the 18th European Signal Processing Conference, 2010
A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
IEEE Trans. Inf. Forensics Secur., 2009
IACR Cryptol. ePrint Arch., 2009
EURASIP J. Inf. Secur., 2009
Processing in the encrypted domain using a composite signal representation: Pros and cons.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of First International Workshop on Living Web, 2009
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009
Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the Information Hiding, 11th International Workshop, 2009
A compressive-sensing based watermarking scheme for sparse image tampering identification.
Proceedings of the International Conference on Image Processing, 2009
Proceedings of the 16th International Conference on Digital Signal Processing, 2009
2008
IEEE Signal Process. Mag., 2008
EURASIP J. Inf. Secur., 2008
Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks
CoRR, 2008
Proceedings of the Security, 2008
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks.
Proceedings of the Security, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
A structural method for quality evaluation of desynchronization attacks in image watermarking.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema.
Proceedings of the International Conference on Image Processing, 2008
Proceedings of the International Conference on Image Processing, 2008
Proceedings of the IEEE International Conference on Acoustics, 2008
A psychovisual experiment on the use of Gibbs potential for the quality assessment of geometrically distorted images.
Proceedings of the Human Vision and Electronic Imaging XIII, 2008
Proceedings of the 2008 16th European Signal Processing Conference, 2008
Proceedings of the 2008 16th European Signal Processing Conference, 2008
2007
EURASIP J. Inf. Secur., 2007
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Inf. Secur., 2007
Distributed Source Coding Techniques for Lossless Compression of Hyperspectral Images.
EURASIP J. Adv. Signal Process., 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007
Proceedings of the Human Vision and Electronic Imaging XII, San Jose, CA, USA, January 29, 2007
2006
Joint near-lossless compression and watermarking of still images for authentication and tamper localization.
Signal Process. Image Commun., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Image Watermarking Robust Against Non-Linear Value-Metric Scaling Based on Higher Order Statistics.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
Proceedings of the Human Vision and Electronic Imaging XI, 2006
2005
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks.
IEEE Trans. Signal Process., 2005
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding.
IEEE Trans. Signal Process., 2005
Effectiveness of exhaustive search and template matching against watermark desynchronization.
IEEE Signal Process. Lett., 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Shedding light on some possible remedies against watermark desynchronization: a case study.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Improved low-complexity intraband lossless compression of hyperspectral images by means of Slepian-Wolf coding.
Proceedings of the 2005 International Conference on Image Processing, 2005
Proceedings of the 2005 International Conference on Image Processing, 2005
Proceedings of the First Joint Eurohaptics Conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2005
2004
IEEE Trans. Signal Process., 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking.
Proceedings of the Information Hiding, 6th International Workshop, 2004
Joint near-lossless watermarking and compression for the authentication of remote sensing images.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004
Minimum-Impact-on-Classifier (MIC) watermarking for protection of remote sensing imagery.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004
2003
IEEE Trans. Signal Process., 2003
Comput. Animat. Virtual Worlds, 2003
Proceedings of the Visual Content Processing and Representation, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
2002
IEEE Trans. Circuits Syst. Video Technol., 2002
J. Electronic Imaging, 2002
IEEE Internet Computing: Issue Addendum - Managing Copyright: Watermark and Cryptography Algorithms.
IEEE Distributed Syst. Online, 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Near-lossless digital watermarking for copyright protection of remote sensing images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002
Proceedings of the 14th International Conference on Digital Signal Processing, 2002
Proceedings of the 14th International Conference on Digital Signal Processing, 2002
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002
2001
IEEE Trans. Image Process., 2001
IEEE Trans. Image Process., 2001
An improved H.263 video coder relying on weighted median filtering of motion vectors.
IEEE Trans. Circuits Syst. Video Technol., 2001
Signal Process., 2001
Improved group-of-block synchronization for robust transmission of H.263 video over slow-fading channels.
J. Electronic Imaging, 2001
Eur. Trans. Telecommun., 2001
IEEE Commun. Mag., 2001
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001
Proceedings of the Evolutionary Trends of the Internet, 2001
Proceedings of the 2001 International Conference on Image Processing, 2001
Proceedings of the 2001 International Conference on Image Processing, 2001
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
2000
IEEE Trans. Image Process., 2000
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain.
Proceedings of the 2000 International Conference on Image Processing, 2000
Proceedings of the 2000 International Conference on Image Processing, 2000
Proceedings of the 2000 International Conference on Image Processing, 2000
Proceedings of the 10th European Signal Processing Conference, 2000
Proceedings of the 10th European Signal Processing Conference, 2000
Proceedings of the 10th European Signal Processing Conference, 2000
Copyright Protection of Cultural Heritage Multimedia Data through Digital Watermarking Techniques.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000
1999
IEEE Trans. Image Process., 1999
Pattern Recognit., 1999
Capacity of the watermark channel: how many bits can be hidden within a digital image?
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Enforcement of Copyright Laws for Multimedia through Blind, Detectable, Reversible Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images.
Proceedings of the 1999 International Conference on Image Processing, 1999
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
1998
Signal Process., 1998
Image Vis. Comput., 1998
Adaptively Weighted Vector-Median Processing of Motion Fields in Block DCT and Object-Based Video Coding.
Proceedings of the Noblesse Workshop on Non-Linear Model Based Image Analysis, 1998
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
Proceedings of the 9th European Signal Processing Conference, 1998
Proceedings of the 9th European Signal Processing Conference, 1998
1997
IEEE Trans. Image Process., 1997
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
Using A Wavelet-Based Fractal Feature to Improve Texture Discrimination on SAR Images.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
Integration of Spatio-Temporal Information for Motion Detection by Means of Fuzzy Reasoning.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997
1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996
Proceedings of the 8th European Signal Processing Conference, 1996
1995
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995
Optimum linear approximation of the Euclidean norm to speed up vector median filtering.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995
Proceedings of the Image Analysis and Processing, 8th International Conference, 1995
1994
IEEE Signal Process. Lett., 1994