Export 78 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is B [Clear All Filters]
“Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint”, IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 1815-1830, 2020. TIFS19_GVPF.pdf (1.01 MB)
, “A Two-Stage Codebook Building Method Using Fast WAN”, in International Conference on Image Analysis and Processing (ICIAP), Venice, Italy, 1999, pp. 1047–1050.
, “Turbo Coding for Sample-Level Watermarking in the DCT Domain”, in IEEE International Conference on Image Processing (ICIP), Thessaloniki, Greece, 2001, pp. 1003–1006.
, “Study on the Application of NOMA Techniques for Heterogeneous Satellite Terminals”, in 10th Advanced Satellite Multimedia Systems Conference (ASMS) and 16th Signal Processing for Space Communications Workshop (SPSC), 2020. Study_on_the_Application_of_NOMA_Techniques_for_Heterogeneous_Satellite_Terminals.pdf (2.21 MB)
, “Study on the Application of NOMA Techniques for Heterogeneous Satellite Terminals”, in 10th Advanced Satellite Multimedia Systems Conference (ASMS) and 16th Signal Processing for Space Communications Workshop (SPSC), 2020. Study_on_the_Application_of_NOMA_Techniques_for_Heterogeneous_Satellite_Terminals.pdf (2.21 MB)
, “Statistical detection of JPEG traces in digital images in uncompressed formats”, IEEE Transactions on Information Forensics and Security, vol. 12, no. Pending, 2017. TIFSbenford.pdf (5.94 MB)
, “Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, “Smart Detection of Line-Search Oracle Attacks”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 588-603, 2017. TIFS_smartOracle.pdf (3.73 MB)
, “Security in automotive radar and vehicular networks”, Microwave Journal, 2016.
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, “Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “Quantized Projection Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Rochester (NY), USA, 2002.
, “Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264. icassp07reproducible.pdf (67.03 KB)
, “Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264. icassp07reproducible.pdf (67.03 KB)
, “Provably or Probably Robust Data Hiding?”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation”, in IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 612-617.
, “Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels”, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, “Overview of Use Cases in Single Channel Full Duplex Techniques for Satellite Communication”, in 40th International Communications Satellite Systems Conference (ICSSC), 2023.
, “Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03b.pdf (142.96 KB)
, “Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116. iwdw03.ps (499.03 KB)
, “A Novel Interpretation of Content Authentication”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07authentication.pdf (179.34 KB)
, “Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation”, in International Workshop on Information Hiding (IH), Noorwijkerhout, The Netherlands, 2002.
, “Near optimal detection of quantized signals and application to JPEG forensics”, 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013. wifs13_bianchi.pdf (293.74 KB)
, “Multiple JPEG compression detection by means of Benford-Fourier coefficients”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
,