Mauro Barni

Orcid: 0000-0002-7368-0866

According to our database1, Mauro Barni authored at least 327 papers between 1994 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to signal and image processing for multimedia security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Just Dance: detection of human body reenactment fake videos.
EURASIP J. Image Video Process., December, 2024

Covert Task Embedding: Turning a DNN Into an Insider Agent Leaking Out Private Information.
IEEE Trans. Neural Networks Learn. Syst., July, 2024

A One-Class Classifier for the Detection of GAN Manipulated Multi-Spectral Satellite Images.
Remote. Sens., March, 2024

Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment.
IEEE Trans. Inf. Forensics Secur., 2024

Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs.
IEEE Trans. Inf. Forensics Secur., 2024

A siamese-based verification system for open-set architecture attribution of synthetic images.
Pattern Recognit. Lett., 2024

An Efficient Watermarking Method for Latent Diffusion Models via Low-Rank Adaptation.
CoRR, 2024

Deepfake Media Forensics: State of the Art and Challenges Ahead.
CoRR, 2024

BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution.
CoRR, 2024

JMA: a General Algorithm to Craft Nearly Optimal Targeted Adversarial Example.
CoRR, 2024

Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

2023
Information Forensics and Security: A quarter-century-long journey.
IEEE Signal Process. Mag., July, 2023

A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Universal BlackMarks: Key-Image-Free Blackbox Multi-Bit Watermarking of Deep Neural Networks.
IEEE Signal Process. Lett., 2023

Physical Realization of a Hyper Unclonable Function.
CoRR, 2023

Robust Retraining-free GAN Fingerprinting via Personalized Normalization.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Classification of Synthetic Facial Attributes by Means of Hybrid Classification/Localization Patch-Based Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023

Which Country is This Picture From? New Data and Methods For Dnn-Based Country Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Siamese Based System for City Verification.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
IEEE Trans. Circuits Syst. Video Technol., 2022

Integrity of Multimedia and Multimodal Data: From Capture to Use.
IEEE Multim., 2022

An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images.
CoRR, 2022

Robust DNN Watermarking via Fixed Embedding Weights with Optimized Distribution.
CoRR, 2022

Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection.
CoRR, 2022

Supervised GAN Watermarking for Intellectual Property Protection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities.
Proceedings of the 14th IEEE Image, Video, and Multidimensional Signal Processing Workshop, 2022

Attacking and Defending Printer Source Attribution Classifiers in the Physical Domain.
Proceedings of the Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, 2022

Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

Detection and Localization of GAN Manipulated Multi-spectral Satellite Images.
Proceedings of the 30th European Symposium on Artificial Neural Networks, 2022

2021
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering.
IEEE Trans. Inf. Forensics Secur., 2021

Copy Move Source-Target Disambiguation Through Multi-Branch CNNs.
IEEE Trans. Inf. Forensics Secur., 2021

Adversarial Kendall's Model Towards Containment of Distributed Cyber-Threats.
IEEE Trans. Inf. Forensics Secur., 2021

A Master Key backdoor for universal impersonation attack against DNN-based face verification.
Pattern Recognit. Lett., 2021

VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents.
J. Imaging, 2021

Spread-Transform Dither Modulation Watermarking of Deep Neural Network.
J. Inf. Secur. Appl., 2021

A survey of Deep Neural Network watermarking techniques.
Neurocomputing, 2021

An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences.
CoRR, 2021

VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking.
CoRR, 2021

Ensembling Shallow Siamese Neural Network Architectures for Printed Documents Verification in Data-Scarcity Scenarios.
IEEE Access, 2021

Iris Deidentification With High Visual Realism for Privacy Protection on Websites and Social Networks.
IEEE Access, 2021

Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

A Feature-Map-Based Large-Payload DNN Watermarking Algorithm.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

DNN Watermarking: Four Challenges and a Funeral.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Detection of GAN-Synthesized street videos.
Proceedings of the 29th European Signal Processing Conference, 2021

Information Fusion in Distributed Sensor Networks with Byzantines
Springer, ISBN: 978-981-32-9000-6, 2021

2020
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint.
IEEE Trans. Inf. Forensics Secur., 2020

Identification of VoIP Speech With Multiple Domain Deep Features.
IEEE Trans. Inf. Forensics Secur., 2020

Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN.
IEEE Signal Process. Lett., 2020

CNN-based steganalysis and parametric adversarial embedding: A game-theoretic framework.
Signal Process. Image Commun., 2020

Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes.
Secur. Commun. Networks, 2020

Improving the security of image manipulation detection through one-and-a-half-class multiple classification.
Multim. Tools Appl., 2020

Theoretical Foundations of Adversarial Binary Detection.
Found. Trends Commun. Inf. Theory, 2020

Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability.
Comput. Vis. Image Underst., 2020

Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks.
CoRR, 2020

On the adversarial robustness of DNNs based on error correcting output codes.
CoRR, 2020

CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Increased-Confidence Adversarial Examples for Deep Learning Counter-Forensics.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Backdooring Deep Learning Architectures: Threats and (some) Opportunities.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
CNN-Based Adversarial Embedding for Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2019

Secure Detection of Image Manipulation by Means of Random Feature Selection.
IEEE Trans. Inf. Forensics Secur., 2019

SEMBA: secure multi-biometric authentication.
IET Biom., 2019

Detection Games under Fully Active Adversaries.
Entropy, 2019

Attacking CNN-based anti-spoofing face authentication in the physical domain.
CoRR, 2019

Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Luminance-based video backdoor attack against anti-spoofing rebroadcast detection.
Proceedings of the 21st IEEE International Workshop on Multimedia Signal Processing, 2019

A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

On the Transferability of Adversarial Examples against CNN-based Image Forensics.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Adversarial Source Identification Game With Corrupted Training.
IEEE Trans. Inf. Theory, 2018

An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack.
IEEE Signal Process. Lett., 2018

A message passing approach for decision fusion in adversarial multi-sensor networks.
Inf. Fusion, 2018

Anonymous subject identification and privacy information management in video surveillance.
Int. J. Inf. Sec., 2018

CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing.
CoRR, 2018

CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.
CoRR, 2018

Countering the Pooled Triangle Test for PRNU-based camera identification.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Detection of adaptive histogram equalization robust against JPEG compression.
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018

Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Adversarial Multimedia Forensics: Overview and Challenges Ahead.
Proceedings of the 26th European Signal Processing Conference, 2018

Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Smart Detection of Line-Search Oracle Attacks.
IEEE Trans. Inf. Forensics Secur., 2017

Farewell Message.
IEEE Trans. Inf. Forensics Secur., 2017

Aligned and non-aligned double JPEG detection using convolutional neural networks.
J. Vis. Commun. Image Represent., 2017

A gradient-based pixel-domain attack against SVM detection of global image manipulations.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Threat Models and Games for Adversarial Multimedia Forensics.
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017

2016
Multiple Parenting Phylogeny Relationships in Digital Images.
IEEE Trans. Inf. Forensics Secur., 2016

Piecewise Function Approximation With Private Data.
IEEE Trans. Inf. Forensics Secur., 2016

Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.
IEEE Trans. Inf. Forensics Secur., 2016

A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
IEEE Trans. Inf. Forensics Secur., 2016

Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Detection of double AVC/HEVC encoding.
Proceedings of the 24th European Signal Processing Conference, 2016

2015
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing.
IEEE Signal Process. Mag., 2015

Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics.
IEEE Signal Process. Lett., 2015

Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks.
CoRR, 2015

Detection games with a fully active attacker.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

From Single Object to Contextual Authentication - A New Challenge in Multimedia Forensics and Beyond.
Proceedings of the VISAPP 2015, 2015

Unsupervised fusion for forgery localization exploiting background information.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

Optimum decision fusion in cognitive wireless sensor networks with unknown users location.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Binary Hypothesis Testing Game With Training Data.
IEEE Trans. Inf. Theory, 2014

Forensic Analysis of SIFT Keypoint Removal and Injection.
IEEE Trans. Inf. Forensics Secur., 2014

A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding.
IEEE Trans. Inf. Forensics Secur., 2014

Source distinguishability under corrupted training.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Image counter-forensics based on feature injection.
Proceedings of the Media Watermarking, 2014

Countering anti-forensics by means of data fusion.
Proceedings of the Media Watermarking, 2014

Are you threatening me?: Towards smart detectors in watermarking.
Proceedings of the Media Watermarking, 2014

Universal Counterforensics of Multiple Compressed JPEG Images.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

An information-theoretic analysis of dirty paper coding for informed audio watermarking.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014

Multiple parenting identification in image phylogeny.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Compressive hyperspectral imaging using progressive total variation.
Proceedings of the IEEE International Conference on Acoustics, 2014

A video forensic technique for detecting frame deletion and insertion.
Proceedings of the IEEE International Conference on Acoustics, 2014

Iterative compressive sampling for hyperspectral images via source separation.
Proceedings of the Image Sensors and Imaging Systems 2014, 2014

Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence.
IEEE Trans. Inf. Forensics Secur., 2013

The Source Identification Game: An Information-Theoretic Perspective.
IEEE Trans. Inf. Forensics Secur., 2013

Private Computing with Garbled Circuits [Applications Corner].
IEEE Signal Process. Mag., 2013

Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation.
IEEE Signal Process. Mag., 2013

Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors].
IEEE Signal Process. Mag., 2013

A Forensic Tool for Investigating Image Forgeries.
Int. J. Digit. Crime Forensics, 2013

A Universal Attack Against Histogram-Based Image Forensics.
Int. J. Digit. Crime Forensics, 2013

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification.
EURASIP J. Image Video Process., 2013

Removal and injection of keypoints for SIFT-based copy-move counter-forensics.
EURASIP J. Inf. Secur., 2013

Attacking image classification based on bag-of-visual-words.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Secure Evaluation of Private Functions through Piecewise Linear Approximation.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

The watchful forensic analyst: Multi-clue information fusion with background knowledge.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Multiple-observation hypothesis testing under adversarial conditions.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Localization of forgeries in MPEG-2 video through GOP size and DQ analysis.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Audio informed watermarking by means of dirty trellis codes.
Proceedings of the 2013 Information Theory and Applications Workshop, 2013

SIFT keypoint removal and injection for countering matching-based image forensics.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Coping with the enemy: Advances in adversary-aware signal processing.
Proceedings of the IEEE International Conference on Acoustics, 2013

The Security Margin: A measure of source distinguishability under adversarial conditions.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
A fuzzy approach to deal with uncertainty in image forensics.
Signal Process. Image Commun., 2012

Progressive Compressed Sensing and Reconstruction of Multidimensional Signals Using Hybrid Transform/Prediction Sparsity Model.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2012

Detection of video double encoding with GOP size estimation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

General function evaluation in a STPC setting via piecewise linear approximation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Optimum forensic and counter-forensic strategies for source identification with training data.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Privacy preserving ECG quality evaluation.
Proceedings of the Multimedia and Security Workshop, 2012

A universal technique to hide traces of histogram-based image manipulations.
Proceedings of the Multimedia and Security Workshop, 2012

On the effectiveness of local warping against SIFT-based copy-move detection.
Proceedings of the 5th International Symposium on Communications, 2012

Emerging cryptographic challenges in image and video processing.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

An efficient protocol for private iris-code matching by means of garbled circuits.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Dealing with uncertainty in image forensics: A fuzzy approach.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

A game theoretic approach to source identification with known statistics.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Hiding traces of median filtering in digital images.
Proceedings of the 20th European Signal Processing Conference, 2012

An overview on video forensics.
Proceedings of the 20th European Signal Processing Conference, 2012

2011
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010) [Book Reviews].
IEEE Signal Process. Mag., 2011

Division between encrypted integers by means of Garbled Circuits.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

A Dempster-Shafer framework for decision fusion in image forensics.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Analysis of the security of linear blinding techniques from an information theoretical point of view.
Proceedings of the IEEE International Conference on Acoustics, 2011

Low-complexity predictive lossy compression of hyperspectral and ultraspectral images.
Proceedings of the IEEE International Conference on Acoustics, 2011

A compressive sampling scheme for iterative hyperspectral image reconstruction.
Proceedings of the 19th European Signal Processing Conference, 2011

2010
Watermark-Based Authentication.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Digital Watermarking.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Asymptotically optimum universal watermark embedding and detection in the high-SNR regime.
IEEE Trans. Inf. Theory, 2010

A Full-Reference Quality Metric for Geometrically Distorted Images.
IEEE Trans. Image Process., 2010

Roughness-Adaptive 3-D Watermarking Based on Masking Effect of Surface Roughness.
IEEE Trans. Inf. Forensics Secur., 2010

Composite signal representation for fast and storage-efficient processing of encrypted signals.
IEEE Trans. Inf. Forensics Secur., 2010

Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding.
IEEE Trans. Geosci. Remote. Sens., 2010

Privacy preserving evaluation of signal quality with application to ECG analysis.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics.
Proceedings of the Multimedia and Security Workshop, 2010

Privacy-preserving fingercode authentication.
Proceedings of the Multimedia and Security Workshop, 2010

Exploring image dependencies: a new challenge in image forensics.
Proceedings of the Media Forensics and Security II, 2010

Identification of cut & paste tampering by means of double-JPEG detection and image segmentation.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Low-complexity lossy compression of hyperspectral images via informed quantization.
Proceedings of the International Conference on Image Processing, 2010

Forensics aided steganalysis of heterogeneous images.
Proceedings of the IEEE International Conference on Acoustics, 2010

Detection of resampled images: Performance analysis and practical challenges.
Proceedings of the 18th European Signal Processing Conference, 2010

A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
MPSteg-color: data hiding through redundant basis decomposition.
IEEE Trans. Inf. Forensics Secur., 2009

On the implementation of the discrete Fourier transform in the encrypted domain.
IEEE Trans. Inf. Forensics Secur., 2009

Secure Evaluation of Private Linear Branching Programs with Medical Applications.
IACR Cryptol. ePrint Arch., 2009

Encrypted Domain DCT Based on Homomorphic Cryptosystems.
EURASIP J. Inf. Secur., 2009

Processing in the encrypted domain using a composite signal representation: Pros and cons.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Efficient privacy-preserving classification of ECG signals.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Image Diversity Analysis: Context, Opinion and Bias.
Proceedings of First International Workshop on Living Web, 2009

Quality evaluation of motion estimation algorithms based on structural distortions.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009

Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Roughness-Adaptive 3D Watermarking of Polygonal Meshes.
Proceedings of the Information Hiding, 11th International Workshop, 2009

A compressive-sensing based watermarking scheme for sparse image tampering identification.
Proceedings of the International Conference on Image Processing, 2009

Efficient linear filtering of encrypted signals via composite representation.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

2008
Signal Processing in Visual Cultural Heritage [From the Guest Editors].
IEEE Signal Process. Mag., 2008

Stochastic Image Warping for Improved Watermark Desynchronization.
EURASIP J. Inf. Secur., 2008

Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks
CoRR, 2008

Anticollusion watermarking of 3D meshes by prewarping.
Proceedings of the Security, 2008

Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks.
Proceedings of the Security, 2008

Enhancing Privacy in Remote Data Classification.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A structural method for quality evaluation of desynchronization attacks in image watermarking.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

A comparative study of +/- steganalyzers.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Efficient pointwise and blockwise encrypted operations.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema.
Proceedings of the International Conference on Image Processing, 2008

Discrete cosine transform of encrypted images.
Proceedings of the International Conference on Image Processing, 2008

Implementing the discrete Fourier transform in the encrypted domain.
Proceedings of the IEEE International Conference on Acoustics, 2008

A psychovisual experiment on the use of Gibbs potential for the quality assessment of geometrically distorted images.
Proceedings of the Human Vision and Electronic Imaging XIII, 2008

Lossless compression of encrypted grey-level and color images.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

Comparison of different FFT implementations in the encrypted domain.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
Watermarked 3-D Mesh Quality Assessment.
IEEE Trans. Multim., 2007

Perceptual Issues in Haptic Digital Watermarking.
IEEE Multim., 2007

Design and Analysis of the First BOWS Contest.
EURASIP J. Inf. Secur., 2007

Oblivious Neural Network Computing via Homomorphic Encryption.
EURASIP J. Inf. Secur., 2007

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Inf. Secur., 2007

Distributed Source Coding Techniques for Lossless Compression of Hyperspectral Images.
EURASIP J. Adv. Signal Process., 2007

The first BOWS contest: Break Our Watermarking System.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Detection of malevolent changes in digital video for forensic applications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Expanding the class of watermark de-synchronization attacks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

MPSteg-color: A New Steganographic Technique for Color Images.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007

Perceptual quality evaluation of geometric distortions in images.
Proceedings of the Human Vision and Electronic Imaging XII, San Jose, CA, USA, January 29, 2007

2006
dsp Forum - Future of Video Coding and Transmission.
IEEE Signal Process. Mag., 2006

Joint near-lossless compression and watermarking of still images for authentication and tamper localization.
Signal Process. Image Commun., 2006

Zero-knowledge ST-DM watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

MPsteg: hiding a message in the Matching Pursuit domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A privacy-preserving protocol for neural-network-based computation.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Processing encrypted signals: a new frontier for multimedia security.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Image Watermarking Robust Against Non-Linear Value-Metric Scaling Based on Higher Order Statistics.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Is haptic watermarking worth it?
Proceedings of the Human Vision and Electronic Imaging XI, 2006

2005
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks.
IEEE Trans. Signal Process., 2005

Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding.
IEEE Trans. Signal Process., 2005

Watermarking of MPEG-4 video objects.
IEEE Trans. Multim., 2005

Pushing science into signal processing [my turn].
IEEE Signal Process. Mag., 2005

Effectiveness of exhaustive search and template matching against watermark desynchronization.
IEEE Signal Process. Lett., 2005

Ensuring gain-invariance in high-rate data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Shedding light on some possible remedies against watermark desynchronization: a case study.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Effectiveness of ST-DM Watermarking Against Intra-video Collusion.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Trellis-Coded Rational Dither Modulation for Digital Watermarking.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Distributed source coding of hyperspectral images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Improved low-complexity intraband lossless compression of hyperspectral images by means of Slepian-Wolf coding.
Proceedings of the 2005 International Conference on Image Processing, 2005

Objective evaluation of the perceptual quality of 3D watermarking.
Proceedings of the 2005 International Conference on Image Processing, 2005

Perceptibility of Haptic Digital Watermarking of Virtual Textures.
Proceedings of the First Joint Eurohaptics Conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2005

2004
Performance analysis of ST-DM watermarking in presence of nonadditive attacks.
IEEE Trans. Signal Process., 2004

Data hiding for fighting piracy.
IEEE Signal Process. Mag., 2004

Near-lossless image authentication transparent to near-lossless coding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Evaluating the performance of ST-DM watermarking in nonadditive channels.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Orthogonal dirty paper coding for informed data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Wavelet-based blind watermarking of 3D models.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Joint near-lossless watermarking and compression for the authentication of remote sensing images.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

Minimum-Impact-on-Classifier (MIC) watermarking for protection of remote sensing imagery.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

2003
Optimum decoding and detection of multiplicative watermarks.
IEEE Trans. Signal Process., 2003

What is the future for watermarking? (Part II).
IEEE Signal Process. Mag., 2003

What is the future for watermarking? (part I).
IEEE Signal Process. Mag., 2003

A general framework for robust watermarking security.
Signal Process., 2003

ArtShop: an art-oriented image-processing tool for cultural heritage applications.
Comput. Animat. Virtual Worlds, 2003

A New Self-Recovery Technique for Image Authentication.
Proceedings of the Visual Content Processing and Representation, 2003

Advantages and drawbacks of multiplicative spread spectrum watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

2002
Multichannel watermarking of color images.
IEEE Trans. Circuits Syst. Video Technol., 2002

Color image watermarking in the Karhunen-Loeve transform domain.
J. Electronic Imaging, 2002

Managing Copyright in Open Networks.
IEEE Internet Comput., 2002

Robust Watermarking of Cartographic Images.
EURASIP J. Adv. Signal Process., 2002

Editorial.
EURASIP J. Adv. Signal Process., 2002

IEEE Internet Computing: Issue Addendum - Managing Copyright: Watermark and Cryptography Algorithms.
IEEE Distributed Syst. Online, 2002

Optimum decoding and detection of a multiplicative amplitude-encoded watermark.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Near-lossless digital watermarking for copyright protection of remote sensing images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002

ArtShop: a tool for art image processing.
Proceedings of the 14th International Conference on Digital Signal Processing, 2002

HVS modelling for quality evaluation of art images.
Proceedings of the 14th International Conference on Digital Signal Processing, 2002

On the performance of multiplicative spread spectrum watermarking.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

2001
A new decoder for the optimum recovery of nonadditive watermarks.
IEEE Trans. Image Process., 2001

Improved wavelet-based watermarking through pixel-wise masking.
IEEE Trans. Image Process., 2001

An improved H.263 video coder relying on weighted median filtering of motion vectors.
IEEE Trans. Circuits Syst. Video Technol., 2001

Information theoretic aspects in digital watermarking.
Signal Process., 2001

From watermark detection to watermark decoding: a PPM approach.
Signal Process., 2001

Image authentication techniques for surveillance applications.
Proc. IEEE, 2001

Improved group-of-block synchronization for robust transmission of H.263 video over slow-fading channels.
J. Electronic Imaging, 2001

Error resilient transmission of H.263 video for mobile communications.
Eur. Trans. Telecommun., 2001

Watermark embedding: hiding a signal within a cover image.
IEEE Commun. Mag., 2001

Digital watermarking for copyright protection: a communications perspective.
IEEE Commun. Mag., 2001

Watermarking-Based Copyright Protection of Internet-Delivered Multimedia.
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001

Watermark capacity measure incorporating a model of the human visual system.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Fast optimum decoding for nonadditive readable watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

Cartographic image watermarking using text-based normalization.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

MPEG-4 Video Data Protection for Internet Distribution.
Proceedings of the Evolutionary Trends of the Internet, 2001

Image segmentation and region filling for virtual restoration of artworks.
Proceedings of the 2001 International Conference on Image Processing, 2001

Text based geometric normalization for robust watermarking of digital maps.
Proceedings of the 2001 International Conference on Image Processing, 2001

Robust Frame-Based Watermarking For Digital Video.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
Capacity of full frame DCT image watermarks.
IEEE Trans. Image Process., 2000

A quasi-Euclidean norm to speed up vector median filtering.
IEEE Trans. Image Process., 2000

Image Processing for Virtual Restoration of Artworks.
IEEE Multim., 2000

Robust video watermarking for wireless multimedia communications.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Improving the robustness of nonadditive watermarks through optimum detection theory.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Object watermarking for for MPEG-4 video streams copyright protection.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Watermarking Through Color Image Bands Decorrelation.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain.
Proceedings of the 2000 International Conference on Image Processing, 2000

Craters Detection via Possibilistic Shell Clustering.
Proceedings of the 2000 International Conference on Image Processing, 2000

Multichannel M-Filtering for Color Image Restoration.
Proceedings of the 2000 International Conference on Image Processing, 2000

A robust frame-based technique for video watermarking.
Proceedings of the 10th European Signal Processing Conference, 2000

Digital watermarking of visual data: State of the art and new trends.
Proceedings of the 10th European Signal Processing Conference, 2000

Digital watermarking for the authentication of AVS data.
Proceedings of the 10th European Signal Processing Conference, 2000

Copyright Protection of Cultural Heritage Multimedia Data through Digital Watermarking Techniques.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

1999
Regularization of optic flow estimates by means of weighted vector median filtering.
IEEE Trans. Image Process., 1999

A new possibilistic clustering algorithm for line detection in real world imagery.
Pattern Recognit., 1999

Capacity of the watermark channel: how many bits can be hidden within a digital image?
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

DWT-based technique for spatio-frequency masking of digital signatures.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

A Java-based system for remote correction of CRT color distortion.
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999

Optimum Decoding of Non-additive Full Frame DFT Watermarks.
Proceedings of the Information Hiding, Third International Workshop, 1999

Enforcement of Copyright Laws for Multimedia through Blind, Detectable, Reversible Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images.
Proceedings of the 1999 International Conference on Image Processing, 1999

Electronic Copyright Management Systems: Requirements, Players and Technologies.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
On the computational complexity of multivariate median filters.
Signal Process., 1998

A DCT-domain system for robust image watermarking.
Signal Process., 1998

Copyright protection of digital images by embedded unperceivable marks.
Image Vis. Comput., 1998

Adaptively Weighted Vector-Median Processing of Motion Fields in Block DCT and Object-Based Video Coding.
Proceedings of the Noblesse Workshop on Non-Linear Model Based Image Analysis, 1998

Mask Building for Perceptually Hiding Frequency Embedded Watermarks.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Statistical modelling of full frame DCT coefficients.
Proceedings of the 9th European Signal Processing Conference, 1998

A M.A.P. identification criterion for DCT-based watermarking.
Proceedings of the 9th European Signal Processing Conference, 1998

1997
A fast algorithm for 1-norm vector median filtering.
IEEE Trans. Image Process., 1997

Colour-based detection of defects on chicken meat.
Image Vis. Comput., 1997

DCT-Based Watermark Recovering Without Resorting to the Uncorrupted Original Image.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Using A Wavelet-Based Fractal Feature to Improve Texture Discrimination on SAR Images.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Integration of Spatio-Temporal Information for Motion Detection by Means of Fuzzy Reasoning.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997

1996
Comments on "A possibilistic approach to clustering".
IEEE Trans. Fuzzy Syst., 1996

Unsupervised detection of straight lines through possibilistic clustering.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Adaptively weighted vector-median filters for motion-fields smoothing.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

A fuzzy expert system for low level image segmentation.
Proceedings of the 8th European Signal Processing Conference, 1996

1995
An intelligent perception system for food quality inspection using color analysis.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

Optimum linear approximation of the Euclidean norm to speed up vector median filtering.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

A Vision System for Automatic Inspection of Meat Quality.
Proceedings of the Image Analysis and Processing, 8th International Conference, 1995

1994
Fast vector median filter based on Euclidean norm approximation.
IEEE Signal Process. Lett., 1994

Dual-channel iterative even-median filter.
Pattern Recognit. Lett., 1994


  Loading...