“Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint”, IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 1815-1830, 2020. TIFS19_GVPF.pdf (1.01 MB)
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, “Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264. icassp07reproducible.pdf (67.03 KB)
, “Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis”, in IEEE International Workshop on Multimedia Signal Processing (MMSP), Pula (Sardinia), Italy, 2013, pp. 494-499. mmsp13_dlabartino_tbianchi_aderosa_mfontani_dvazquez_apiva_mbarni.pdf (901.49 KB)
, “Information-theoretic analysis of security in side-informed data hiding”, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, “Improving the performance of RDM watermarking by means of trellis coded quantisation”, IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, “Fundamentals of data hiding security and their application to spread-spectrum analysis”, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, “Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Detection of video double encoding with GOP size estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156. wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, “Coping with the enemy: Advances in adversary-aware signal processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
, “Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime”, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010. tit-2010.pdf (240.81 KB)
, “Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, “Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
,