@article {975, title = {Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {15}, year = {2020}, month = {12/2019}, pages = {1815-1830}, chapter = {1815}, abstract = {

The Variation of Prediction Footprint (VPF), formerly used in video forensics for double compression detection and GOP size estimation, is comprehensively investigated to improve its acquisition capabilities and extend its use to video sequences that contain bi-directional frames (B-frames). By relying on a universal rate-distortion analysis applied to a generic double compression scheme, we first explain the rationale behind the presence of the VPF in double compressed videos and then justify the need of exploiting a new source of information such as the motion vectors, to enhance the VPF acquisition process. Finally, we describe the shifted VPF induced by the presence of B-frames and detail how to compensate the shift to avoid misguided GOP size estimations. The experimental results show that the proposed Generalized VPF (G-VPF) technique outperforms the state of the art, not only in terms of double compression detection and GOP size estimation, but also in reducing computational time.

}, keywords = {B-frames, double compression detection, GOP size estimation, rate distortion optimization, video forensics}, author = {David V{\'a}zquez-Pad{\'\i}n and Marco Fontani and Dasara Shullani and Fernando P{\'e}rez-Gonz{\'a}lez and Alessandro Piva and Mauro Barni} } @conference {730, title = {Are you threatening me? Towards smart detectors in watermarking}, booktitle = {Media Watermarking, Security, and Forensics}, year = {2014}, month = {02/2014}, publisher = {SPIE}, organization = {SPIE}, address = {San Francisco, CA, USA}, keywords = {adversarial signal processing, watermarking}, doi = {10.1117/12.2036415}, author = {Mauro Barni and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and Benedetta Tondi} } @conference {720, title = {Coping with the enemy: Advances in adversary-aware signal processing}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {2013}, month = {05/2013}, pages = {8682{\textendash}8686}, address = {Vancouver, Canada}, url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6639361}, author = {Mauro Barni and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {688, title = {Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis}, booktitle = {IEEE International Workshop on Multimedia Signal Processing (MMSP)}, year = {2013}, pages = {494-499}, address = {Pula (Sardinia), Italy}, abstract = {

This work addresses forgery localization in MPEG-2 compressed videos. The proposed method is based on the analysis of Double Quantization (DQ) traces in frames that were encoded twice as intra (i.e., I-frames). \ Employing a state-of-the-art method, such frames are located in the video under analysis by estimating the size of the Group Of Pictures (GOP) that was used in the first compression; then, the DQ analysis is devised for the MPEG-2 encoding scheme and applied to frames that were intra-coded in both the first and second compression. In such a way, regions that were manipulated between the two encodings are detected. Compared to existing methods based on double quantization analysis, the proposed scheme makes forgery localization possible on a wider range of settings.

}, author = {Daniele Labartino and Tiziano Bianchi and Alessia De Rosa and Marco Fontani and David V{\'a}zquez-Pad{\'\i}n and Alessandro Piva and Mauro Barni} } @conference {662, title = {Detection of video double encoding with GOP size estimation}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2012}, month = {12/2012}, pages = {151-156}, publisher = {IEEE}, organization = {IEEE}, address = {Tenerife, Spain}, abstract = {

Video forensics is an emerging discipline, that aims at inferring information about the processing history undergone by a digital video in a blind fashion. In this work we introduce a new forensic footprint and, based on it, propose a method for detecting whether a video has been encoded twice; if this is the case, we also estimate the size of the Group Of Pictures (GOP) employed during the first encoding. As shown in the experiments, the footprint proves to be very robust even in realistic settings (i.e., when encoding is carried out using typical compression rates), that are rarely addressed by existing techniques.

}, author = {David V{\'a}zquez-Pad{\'\i}n and Marco Fontani and Tiziano Bianchi and Pedro Comesa{\~n}a and Alessandro Piva and Mauro Barni} } @article {Comesana-TIT2010, title = {Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime}, journal = {IEEE Transactions on Information Theory}, volume = {56}, number = {6}, year = {2010}, month = {June}, pages = {2804-2815}, keywords = {hypothesis testing, Neyman-Pearson, watermark detection, watermark embedding, watermarking}, author = {Pedro Comesa{\~n}a and Neri Merhav and Mauro Barni} } @conference {spie08, title = {Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {6819}, year = {2008}, month = {January}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, CA, USA}, author = {Pedro Comesa{\~n}a and Neri Merhav and Mauro Barni}, editor = {Edward J. Delp and Ping W. Wong and Jana Dittmann and Nasir D. Memon} } @conference {Reproducible07, title = {Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {4}, year = {2007}, month = {April}, pages = {1261-1264}, address = {Honolulu, HW, USA}, keywords = {data-hiding, watermarking}, author = {Mauro Barni and Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a and Guido Bartoli} } @article {abrardo06, title = {Improving the performance of RDM watermarking by means of trellis coded quantisation}, journal = {IEE Proceedings on Information Security}, volume = {153}, number = {3}, year = {2006}, month = {September}, pages = {107-114}, keywords = {data-hiding, watermarking}, author = {Andrea Abrardo and Mauro Barni and Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera} } @conference {spie05:rdm, title = {Ensuring Gain Invariance in High-Rate Data-Hiding}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2005}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera and Mauro Barni and Andrea Abrardo}, editor = {Edward J. Delp and Ping W. Wong} } @conference {ih05_fundamentals, title = {Fundamentals of data hiding security and their application to spread-spectrum analysis}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, volume = {3727}, year = {2005}, month = {June}, pages = {131-145}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, address = {Barcelona, Spain}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Mauro Barni and Jordi Herrera-Joancomart{\'\i} and Stefan Katzenbeisser and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {ih05_sideinformed, title = {Information-theoretic analysis of security in side-informed data hiding}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, volume = {3727}, year = {2005}, note = {6-8 June}, pages = {131-145}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Mauro Barni and Jordi Herrera-Joancomart{\'\i} and Stefan Katzenbeisser and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:tsp-rdm, title = {Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks}, journal = {IEEE Transactions on Signal Processing}, volume = {53}, number = {10}, year = {2005}, note = {Third supplement on secure media}, month = {October}, pages = {3960-3975}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera and Mauro Barni and Andrea Abrardo} } @conference {iwdw05, title = {The return of the sensitivity attack}, booktitle = {International Workshop on Digital Watermarking (IWDW)}, series = {Lecture Notes in Computer Science}, volume = {3710}, year = {2005}, month = {September}, pages = {260-274}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, address = {Siena, Italy}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and H. J. Kim} } @conference {mmsp04:rdm, title = {Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks}, booktitle = {IEEE International Workshop on Multimedia Signal Processing}, year = {2004}, month = {29 Sept - 1 Oct}, pages = {139-142}, address = {Siena, Italy}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Mauro Barni and Andrea Abrardo and C. Mosquera} }