Exportar 15 resultados:
Autor Título Tipo [ Año
Filtros: Autor es Mauro Barni [Elimina todos los filtros]
«Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint», IEEE Transactions on Information Forensics and Security, vol. 15, n.º 1, pp. 1815-1830, 2020.
TIFS19_GVPF.pdf (1.01 MB)
, 
«Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
«Coping with the enemy: Advances in adversary-aware signal processing», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
, «Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis», in IEEE International Workshop on Multimedia Signal Processing (MMSP), Pula (Sardinia), Italy, 2013, pp. 494-499.
mmsp13_dlabartino_tbianchi_aderosa_mfontani_dvazquez_apiva_mbarni.pdf (901.49 KB)
, 
«Detection of video double encoding with GOP size estimation», in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.
wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, 
«Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime», IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.
tit-2010.pdf (240.81 KB)
, 
«Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.
spie08one-bit-wm.pdf (277.85 KB)
, 
«Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.
icassp07reproducible.pdf (67.03 KB)
, 
«Improving the performance of RDM watermarking by means of trellis coded quantisation», IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, «Ensuring Gain Invariance in High-Rate Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.
ih05_fundamentals.pdf (222.99 KB)
, 
«Information-theoretic analysis of security in side-informed data hiding», in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145.
ih05_sideinformed.pdf (218.44 KB)
, 
«Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.
iwdw05.pdf (190.47 KB)
, 
«Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
,