%0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2020 %T Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint %A David Vázquez-Padín %A Marco Fontani %A Dasara Shullani %A Fernando Pérez-González %A Alessandro Piva %A Mauro Barni %K B-frames %K double compression detection %K GOP size estimation %K rate distortion optimization %K video forensics %X

The Variation of Prediction Footprint (VPF), formerly used in video forensics for double compression detection and GOP size estimation, is comprehensively investigated to improve its acquisition capabilities and extend its use to video sequences that contain bi-directional frames (B-frames). By relying on a universal rate-distortion analysis applied to a generic double compression scheme, we first explain the rationale behind the presence of the VPF in double compressed videos and then justify the need of exploiting a new source of information such as the motion vectors, to enhance the VPF acquisition process. Finally, we describe the shifted VPF induced by the presence of B-frames and detail how to compensate the shift to avoid misguided GOP size estimations. The experimental results show that the proposed Generalized VPF (G-VPF) technique outperforms the state of the art, not only in terms of double compression detection and GOP size estimation, but also in reducing computational time.

%B IEEE Transactions on Information Forensics and Security %V 15 %P 1815-1830 %8 12/2019 %G eng %N 1 %& 1815 %0 Conference Paper %B Media Watermarking, Security, and Forensics %D 2014 %T Are you threatening me? Towards smart detectors in watermarking %A Mauro Barni %A Pedro Comesaña %A Fernando Pérez-González %A Benedetta Tondi %K adversarial signal processing %K watermarking %B Media Watermarking, Security, and Forensics %I SPIE %C San Francisco, CA, USA %8 02/2014 %G eng %R 10.1117/12.2036415 %0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %D 2013 %T Coping with the enemy: Advances in adversary-aware signal processing %A Mauro Barni %A Fernando Pérez-González %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %C Vancouver, Canada %P 8682–8686 %8 05/2013 %G eng %U http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6639361 %0 Conference Paper %B IEEE International Workshop on Multimedia Signal Processing (MMSP) %D 2013 %T Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis %A Daniele Labartino %A Tiziano Bianchi %A Alessia De Rosa %A Marco Fontani %A David Vázquez-Padín %A Alessandro Piva %A Mauro Barni %X

This work addresses forgery localization in MPEG-2 compressed videos. The proposed method is based on the analysis of Double Quantization (DQ) traces in frames that were encoded twice as intra (i.e., I-frames).  Employing a state-of-the-art method, such frames are located in the video under analysis by estimating the size of the Group Of Pictures (GOP) that was used in the first compression; then, the DQ analysis is devised for the MPEG-2 encoding scheme and applied to frames that were intra-coded in both the first and second compression. In such a way, regions that were manipulated between the two encodings are detected. Compared to existing methods based on double quantization analysis, the proposed scheme makes forgery localization possible on a wider range of settings.

 
%B IEEE International Workshop on Multimedia Signal Processing (MMSP) %C Pula (Sardinia), Italy %P 494-499 %G eng %1

Top 10% Award

%0 Conference Paper %B IEEE International Workshop on Information Forensics and Security (WIFS) %D 2012 %T Detection of video double encoding with GOP size estimation %A David Vázquez-Padín %A Marco Fontani %A Tiziano Bianchi %A Pedro Comesaña %A Alessandro Piva %A Mauro Barni %X

Video forensics is an emerging discipline, that aims at inferring information about the processing history undergone by a digital video in a blind fashion. In this work we introduce a new forensic footprint and, based on it, propose a method for detecting whether a video has been encoded twice; if this is the case, we also estimate the size of the Group Of Pictures (GOP) employed during the first encoding. As shown in the experiments, the footprint proves to be very robust even in realistic settings (i.e., when encoding is carried out using typical compression rates), that are rarely addressed by existing techniques.

%B IEEE International Workshop on Information Forensics and Security (WIFS) %I IEEE %C Tenerife, Spain %P 151-156 %8 12/2012 %G eng %0 Journal Article %J IEEE Transactions on Information Theory %D 2010 %T Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime %A Pedro Comesaña %A Neri Merhav %A Mauro Barni %K hypothesis testing %K Neyman-Pearson %K watermark detection %K watermark embedding %K watermarking %B IEEE Transactions on Information Theory %V 56 %P 2804-2815 %8 June %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2008 %T Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks %A Pedro Comesaña %A Neri Merhav %A Mauro Barni %E Edward J. Delp %E Ping W. Wong %E Jana Dittmann %E Nasir D. Memon %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, CA, USA %V 6819 %8 January %G eng %0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %D 2007 %T Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking %A Mauro Barni %A Fernando Pérez-González %A Pedro Comesaña %A Guido Bartoli %K data-hiding %K watermarking %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %C Honolulu, HW, USA %V 4 %P 1261-1264 %8 April %G eng %0 Journal Article %J IEE Proceedings on Information Security %D 2006 %T Improving the performance of RDM watermarking by means of trellis coded quantisation %A Andrea Abrardo %A Mauro Barni %A Fernando Pérez-González %A C. Mosquera %K data-hiding %K watermarking %B IEE Proceedings on Information Security %V 153 %P 107-114 %8 September %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2005 %T Ensuring Gain Invariance in High-Rate Data-Hiding %A Fernando Pérez-González %A C. Mosquera %A Mauro Barni %A Andrea Abrardo %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2005 %T Fundamentals of data hiding security and their application to spread-spectrum analysis %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %E Mauro Barni %E Jordi Herrera-Joancomartí %E Stefan Katzenbeisser %E Fernando Pérez-González %K data-hiding %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %C Barcelona, Spain %V 3727 %P 131-145 %8 June %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2005 %T Information-theoretic analysis of security in side-informed data hiding %A Luis Pérez-Freire %A Pedro Comesaña %A Fernando Pérez-González %E Mauro Barni %E Jordi Herrera-Joancomartí %E Stefan Katzenbeisser %E Fernando Pérez-González %K data-hiding %K security %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %V 3727 %P 131-145 %G eng %0 Journal Article %J IEEE Transactions on Signal Processing %D 2005 %T Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks %A Fernando Pérez-González %A C. Mosquera %A Mauro Barni %A Andrea Abrardo %K data-hiding %K watermarking %B IEEE Transactions on Signal Processing %V 53 %P 3960-3975 %8 October %G eng %0 Conference Paper %B International Workshop on Digital Watermarking (IWDW) %D 2005 %T The return of the sensitivity attack %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %E Mauro Barni %E Ingemar J. Cox %E Ton Kalker %E H. J. Kim %K data-hiding %K watermarking %B International Workshop on Digital Watermarking (IWDW) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %C Siena, Italy %V 3710 %P 260-274 %8 September %G eng %0 Conference Paper %B IEEE International Workshop on Multimedia Signal Processing %D 2004 %T Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks %A Fernando Pérez-González %A Mauro Barni %A Andrea Abrardo %A C. Mosquera %K data-hiding %K watermarking %B IEEE International Workshop on Multimedia Signal Processing %C Siena, Italy %P 139-142 %8 29 Sept - 1 Oct %G eng