Alessandro Piva

Orcid: 0000-0002-3047-0519

According to our database1, Alessandro Piva authored at least 152 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-Clue Reconstruction of Sharing Chains for Social Media Images.
IEEE Trans. Multim., 2023

FloreView: An Image and Video Dataset for Forensic Analysis.
IEEE Access, 2023

Towards Continual Social Network Identification.
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023

2022
Social Network Identification of Laundered Videos Based on DCT Coefficient Analysis.
IEEE Signal Process. Lett., 2022

PRNU registration under scale and rotation transform based on convolutional neural networks.
Pattern Recognit., 2022

PRNU-Based Video Source Attribution: Which Frames Are You Using?
J. Imaging, 2022

2021
Experiencing with electronic image stabilization and PRNU through scene content image registration.
Pattern Recognit. Lett., 2021

Camera Obscura: Exploiting in-camera processing for image counter forensics.
Digit. Investig., 2021

A Leak in PRNU Based Source Identification - Questioning Fingerprint Uniqueness.
IEEE Access, 2021

Checking PRNU Usability on Modern Devices.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint.
IEEE Trans. Inf. Forensics Secur., 2020

A vision-based fully automated approach to robust image cropping detection.
Signal Process. Image Commun., 2020

Efficient Video Integrity Analysis Through Container Characterization.
IEEE J. Sel. Top. Signal Process., 2020

A Survey of Deep Learning-Based Source Image Forensics.
J. Imaging, 2020

Facing Image Source Attribution on iPhone X.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

A Modified Fourier-Mellin Approach For Source Device Identification On Stabilized Videos.
Proceedings of the IEEE International Conference on Image Processing, 2020

2019
A Video Forensic Framework for the Unsupervised Analysis of MP4-Like File Container.
IEEE Trans. Inf. Forensics Secur., 2019

Hybrid reference-based Video Source Identification.
Sensors, 2019

FISH: Face intensity-shape histogram representation for automatic face splicing detection.
J. Vis. Commun. Image Represent., 2019

Prnu Pattern Alignment for Images and Videos Based on Scene Content.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Towards Learned Color Representations for Image Splicing Detection.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
A New Dataset for Source Identification of High Dynamic Range Images.
Sensors, 2018

Data-driven multimedia forensics and security.
J. Vis. Commun. Image Represent., 2018

2017
Reliability assessment of principal point estimates for forensic applications.
J. Vis. Commun. Image Represent., 2017

Wide-angle and long-range real time pose estimation: A comparison between monocular and stereo vision systems.
J. Vis. Commun. Image Represent., 2017

Physical layer security based on spread-spectrum watermarking and jamming receiver.
Trans. Emerg. Telecommun. Technol., 2017

VISION: a video and image dataset for source identification.
EURASIP J. Inf. Secur., 2017

A Hybrid Approach to Video Source Identification.
CoRR, 2017

Image forgery detection confronts image composition.
Comput. Graph., 2017

A Dataset for Forensic Analysis of Videos in the Wild.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

2016
Multiple Parenting Phylogeny Relationships in Digital Images.
IEEE Trans. Inf. Forensics Secur., 2016

A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform.
J. Inf. Hiding Multim. Signal Process., 2016

Digital Image Forensics vs. Image Composition: An Indirect Arms Race.
CoRR, 2016

Watermark-based secure communications in safety-related scenarios.
Proceedings of the 10th International Symposium on Medical Information and Communication Technology, 2016

2015
Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics.
IEEE Signal Process. Lett., 2015

Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding.
EURASIP J. Inf. Secur., 2015

Identification of pictorial materials by means of optimized multispectral reflectance image processing.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Image splicing detection based on general perspective constraints.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

The maven project: Management and Authenticity Verification of multimedia contents.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

Unsupervised fusion for forgery localization exploiting background information.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

2014
TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding.
IEEE Trans. Inf. Forensics Secur., 2014

Detection and localization of double compression in MP3 audio tracks.
EURASIP J. Inf. Secur., 2014

Image counter-forensics based on feature injection.
Proceedings of the Media Watermarking, 2014

Countering anti-forensics by means of data fusion.
Proceedings of the Media Watermarking, 2014

Comparison of super-resolution methods for quality enhancement of digital biomedical images.
Proceedings of the 8th International Symposium on Medical Information and Communication Technology, 2014

Multiple parenting identification in image phylogeny.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Investigating multimedia contents.
Proceedings of the International Carnahan Conference on Security Technology, 2014

A video forensic technique for detecting frame deletion and insertion.
Proceedings of the IEEE International Conference on Acoustics, 2014

TTP-free asymmetric fingerprinting protocol based on client side embedding.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence.
IEEE Trans. Inf. Forensics Secur., 2013

Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues.
IEEE Signal Process. Mag., 2013

A Forensic Tool for Investigating Image Forgeries.
Int. J. Digit. Crime Forensics, 2013

Near optimal detection of quantized signals and application to JPEG forensics.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Localization of forgeries in MPEG-2 video through GOP size and DQ analysis.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Reverse engineering of double compressed images in the presence of contrast enhancement.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Detection and classification of double compressed MP3 audio tracks.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts.
IEEE Trans. Inf. Forensics Secur., 2012

Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts.
IEEE Trans. Inf. Forensics Secur., 2012

Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps.
IEEE Trans. Inf. Forensics Secur., 2012

Detection of video double encoding with GOP size estimation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Reverse engineering of double JPEG compression in the presence of image resizing.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

An overview on video forensics.
Proceedings of the 20th European Signal Processing Conference, 2012

2011
A Dempster-Shafer framework for decision fusion in image forensics.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Analysis of non-aligned double JPEG artifacts for the localization of image forgeries.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Detection of non-aligned double JPEG compression with estimation of primary compression parameters.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Improved DCT coefficient analysis for forgery localization in JPEG images.
Proceedings of the IEEE International Conference on Acoustics, 2011

Analysis of the security of linear blinding techniques from an information theoretical point of view.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol.
IEEE Trans. Inf. Forensics Secur., 2010

Secure client-side ST-DM watermark embedding.
IEEE Trans. Inf. Forensics Secur., 2010

Composite signal representation for fast and storage-efficient processing of encrypted signals.
IEEE Trans. Inf. Forensics Secur., 2010

Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification.
Int. J. Digit. Crime Forensics, 2010

Reversible watermarking for image integrity verification in hierarchical PACS.
Proceedings of the Multimedia and Security Workshop, 2010

Privacy-preserving fingercode authentication.
Proceedings of the Multimedia and Security Workshop, 2010

Exploring image dependencies: a new challenge in image forensics.
Proceedings of the Media Forensics and Security II, 2010

Detection of resampled images: Performance analysis and practical challenges.
Proceedings of the 18th European Signal Processing Conference, 2010

A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
On the implementation of the discrete Fourier transform in the encrypted domain.
IEEE Trans. Inf. Forensics Secur., 2009

Encrypted Domain DCT Based on Homomorphic Cryptosystems.
EURASIP J. Inf. Secur., 2009

Processing in the encrypted domain using a composite signal representation: Pros and cons.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Image Diversity Analysis: Context, Opinion and Bias.
Proceedings of First International Workshop on Living Web, 2009

An efficient buyer-seller watermarking protocol based on composite signal representation.
Proceedings of the Multimedia and Security Workshop, 2009

Client side embedding for ST-DM watermarks.
Proceedings of the International Conference on Image Processing, 2009

Efficient linear filtering of encrypted signals via composite representation.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

2008
Multispectral imaging of paintings.
IEEE Signal Process. Mag., 2008

Signal Processing in Visual Cultural Heritage [From the Guest Editors].
IEEE Signal Process. Mag., 2008

How Intranet Has Been Evolving in Banking: A Longitudinal Research.
Proceedings of the Open Knowlege Society. A Computer Science and Information Systems Manifesto, 2008

Enhancing Privacy in Remote Data Classification.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Efficient pointwise and blockwise encrypted operations.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Discrete cosine transform of encrypted images.
Proceedings of the International Conference on Image Processing, 2008

Implementing the discrete Fourier transform in the encrypted domain.
Proceedings of the IEEE International Conference on Acoustics, 2008

Comparison of different FFT implementations in the encrypted domain.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
Signal Processing in the Encrypted Domain.
EURASIP J. Inf. Secur., 2007

Design and Analysis of the First BOWS Contest.
EURASIP J. Inf. Secur., 2007

Oblivious Neural Network Computing via Homomorphic Encryption.
EURASIP J. Inf. Secur., 2007

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Inf. Secur., 2007

The first BOWS contest: Break Our Watermarking System.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Detection of malevolent changes in digital video for forensic applications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Virtual Restoration and Protection of Cultural Heritage Images.
Proceedings of the 15th International Conference on Digital Signal Processing, 2007

2006
Zero-knowledge ST-DM watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A privacy-preserving protocol for neural-network-based computation.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Multispectral UV fluorescence analysis of painted surfaces.
Proceedings of the 14th European Signal Processing Conference, 2006

Opportunities and issues of image processing for cultural heritage applications.
Proceedings of the 14th European Signal Processing Conference, 2006

2005
Image processing for the analysis and conservation of paintings: opportunities and challenges.
IEEE Signal Process. Mag., 2005

Self Recovery Authentication Of Images In The Dwt Domain.
Int. J. Image Graph., 2005

Effectiveness of ST-DM Watermarking Against Intra-video Collusion.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

An automatic registration algorithm for cultural heritage images.
Proceedings of the 2005 International Conference on Image Processing, 2005

Labelling and Authentication for Medical Imaging Through Data Hiding.
Proceedings of the From Data and Information Analysis to Knowledge Engineering, 2005

2004
Performance analysis of ST-DM watermarking in presence of nonadditive attacks.
IEEE Trans. Signal Process., 2004

Evaluating the performance of ST-DM watermarking in nonadditive channels.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Data hiding for error concealment in H.264/AVC.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Protection of Cultural Heritage Contents on the Web.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

2003
Optimum decoding and detection of multiplicative watermarks.
IEEE Trans. Signal Process., 2003

ArtShop: an art-oriented image-processing tool for cultural heritage applications.
Comput. Animat. Virtual Worlds, 2003

A New Self-Recovery Technique for Image Authentication.
Proceedings of the Visual Content Processing and Representation, 2003

Analysis of data hiding technologies for medical images.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

2002
Multichannel watermarking of color images.
IEEE Trans. Circuits Syst. Video Technol., 2002

Color image watermarking in the Karhunen-Loeve transform domain.
J. Electronic Imaging, 2002

Managing Copyright in Open Networks.
IEEE Internet Comput., 2002

Robust Watermarking of Cartographic Images.
EURASIP J. Adv. Signal Process., 2002

IEEE Internet Computing: Issue Addendum - Managing Copyright: Watermark and Cryptography Algorithms.
IEEE Distributed Syst. Online, 2002

Optimum decoding and detection of a multiplicative amplitude-encoded watermark.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

2001
A new decoder for the optimum recovery of nonadditive watermarks.
IEEE Trans. Image Process., 2001

Improved wavelet-based watermarking through pixel-wise masking.
IEEE Trans. Image Process., 2001

Watermarking-Based Copyright Protection of Internet-Delivered Multimedia.
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001

Watermark capacity measure incorporating a model of the human visual system.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

Cartographic image watermarking using text-based normalization.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

MPEG-4 Video Data Protection for Internet Distribution.
Proceedings of the Evolutionary Trends of the Internet, 2001

Text based geometric normalization for robust watermarking of digital maps.
Proceedings of the 2001 International Conference on Image Processing, 2001

Robust Frame-Based Watermarking For Digital Video.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
Capacity of full frame DCT image watermarks.
IEEE Trans. Image Process., 2000

Improving the robustness of nonadditive watermarks through optimum detection theory.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Watermarking Through Color Image Bands Decorrelation.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

A DWT-Based Object Watermarking System for MPEG-4 Video Streams.
Proceedings of the 2000 International Conference on Image Processing, 2000

Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain.
Proceedings of the 2000 International Conference on Image Processing, 2000

A robust frame-based technique for video watermarking.
Proceedings of the 10th European Signal Processing Conference, 2000

Digital watermarking of visual data: State of the art and new trends.
Proceedings of the 10th European Signal Processing Conference, 2000

Digital watermarking for the authentication of AVS data.
Proceedings of the 10th European Signal Processing Conference, 2000

1999
Capacity of the watermark channel: how many bits can be hidden within a digital image?
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

DWT-based technique for spatio-frequency masking of digital signatures.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Optimum Decoding of Non-additive Full Frame DFT Watermarks.
Proceedings of the Information Hiding, Third International Workshop, 1999

Enforcement of Copyright Laws for Multimedia through Blind, Detectable, Reversible Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images.
Proceedings of the 1999 International Conference on Image Processing, 1999

Electronic Copyright Management Systems: Requirements, Players and Technologies.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
A DCT-domain system for robust image watermarking.
Signal Process., 1998

Copyright protection of digital images by embedded unperceivable marks.
Image Vis. Comput., 1998

Mask Building for Perceptually Hiding Frequency Embedded Watermarks.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Statistical modelling of full frame DCT coefficients.
Proceedings of the 9th European Signal Processing Conference, 1998

A M.A.P. identification criterion for DCT-based watermarking.
Proceedings of the 9th European Signal Processing Conference, 1998

1997
Median based relaxation of smoothness constraints in optic flow computation.
Pattern Recognit. Lett., 1997

DCT-Based Watermark Recovering Without Resorting to the Uncorrupted Original Image.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997


  Loading...