Alessandro Piva

According to our database1, Alessandro Piva
  • authored at least 122 papers between 1997 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Reliability assessment of principal point estimates for forensic applications.
J. Visual Communication and Image Representation, 2017

Wide-angle and long-range real time pose estimation: A comparison between monocular and stereo vision systems.
J. Visual Communication and Image Representation, 2017

Physical layer security based on spread-spectrum watermarking and jamming receiver.
Trans. Emerging Telecommunications Technologies, 2017

VISION: a video and image dataset for source identification.
EURASIP J. Information Security, 2017

A Hybrid Approach to Video Source Identification.
CoRR, 2017

Image forgery detection confronts image composition.
Computers & Graphics, 2017

A Dataset for Forensic Analysis of Videos in the Wild.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

2016
Multiple Parenting Phylogeny Relationships in Digital Images.
IEEE Trans. Information Forensics and Security, 2016

Digital Image Forensics vs. Image Composition: An Indirect Arms Race.
CoRR, 2016

Watermark-based secure communications in safety-related scenarios.
Proceedings of the 10th International Symposium on Medical Information and Communication Technology, 2016

2015
Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics.
IEEE Signal Process. Lett., 2015

Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding.
EURASIP J. Information Security, 2015

Identification of pictorial materials by means of optimized multispectral reflectance image processing.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Image splicing detection based on general perspective constraints.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

The maven project: Management and Authenticity Verification of multimedia contents.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

Unsupervised fusion for forgery localization exploiting background information.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

2014
TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding.
IEEE Trans. Information Forensics and Security, 2014

Detection and localization of double compression in MP3 audio tracks.
EURASIP J. Information Security, 2014

Image counter-forensics based on feature injection.
Proceedings of the Media Watermarking, 2014

Countering anti-forensics by means of data fusion.
Proceedings of the Media Watermarking, 2014

Comparison of super-resolution methods for quality enhancement of digital biomedical images.
Proceedings of the 8th International Symposium on Medical Information and Communication Technology, 2014

Multiple parenting identification in image phylogeny.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Investigating multimedia contents.
Proceedings of the International Carnahan Conference on Security Technology, 2014

A video forensic technique for detecting frame deletion and insertion.
Proceedings of the IEEE International Conference on Acoustics, 2014

TTP-free asymmetric fingerprinting protocol based on client side embedding.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence.
IEEE Trans. Information Forensics and Security, 2013

Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues.
IEEE Signal Process. Mag., 2013

A Forensic Tool for Investigating Image Forgeries.
IJDCF, 2013

Near optimal detection of quantized signals and application to JPEG forensics.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Localization of forgeries in MPEG-2 video through GOP size and DQ analysis.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Reverse engineering of double compressed images in the presence of contrast enhancement.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Detection and classification of double compressed MP3 audio tracks.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts.
IEEE Trans. Information Forensics and Security, 2012

Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts.
IEEE Trans. Information Forensics and Security, 2012

Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps.
IEEE Trans. Information Forensics and Security, 2012

Detection of video double encoding with GOP size estimation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Reverse engineering of double JPEG compression in the presence of image resizing.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

An overview on video forensics.
Proceedings of the 20th European Signal Processing Conference, 2012

2011
A Dempster-Shafer framework for decision fusion in image forensics.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Analysis of non-aligned double JPEG artifacts for the localization of image forgeries.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Detection of non-aligned double JPEG compression with estimation of primary compression parameters.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Improved DCT coefficient analysis for forgery localization in JPEG images.
Proceedings of the IEEE International Conference on Acoustics, 2011

Analysis of the security of linear blinding techniques from an information theoretical point of view.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol.
IEEE Trans. Information Forensics and Security, 2010

Secure client-side ST-DM watermark embedding.
IEEE Trans. Information Forensics and Security, 2010

Composite signal representation for fast and storage-efficient processing of encrypted signals.
IEEE Trans. Information Forensics and Security, 2010

Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification.
IJDCF, 2010

Reversible watermarking for image integrity verification in hierarchical PACS.
Proceedings of the Multimedia and Security Workshop, 2010

Privacy-preserving fingercode authentication.
Proceedings of the Multimedia and Security Workshop, 2010

Exploring image dependencies: a new challenge in image forensics.
Proceedings of the Media Forensics and Security II, 2010

Detection of resampled images: Performance analysis and practical challenges.
Proceedings of the 18th European Signal Processing Conference, 2010

A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
On the implementation of the discrete Fourier transform in the encrypted domain.
IEEE Trans. Information Forensics and Security, 2009

Encrypted Domain DCT Based on Homomorphic Cryptosystems.
EURASIP J. Information Security, 2009

Processing in the encrypted domain using a composite signal representation: Pros and cons.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Image Diversity Analysis: Context, Opinion and Bias.
Proceedings of First International Workshop on Living Web, 2009

An efficient buyer-seller watermarking protocol based on composite signal representation.
Proceedings of the Multimedia and Security Workshop, 2009

Client side embedding for ST-DM watermarks.
Proceedings of the International Conference on Image Processing, 2009

2008
How Intranet Has Been Evolving in Banking: A Longitudinal Research.
Proceedings of the Open Knowlege Society. A Computer Science and Information Systems Manifesto, 2008

Enhancing Privacy in Remote Data Classification.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Efficient pointwise and blockwise encrypted operations.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Discrete cosine transform of encrypted images.
Proceedings of the International Conference on Image Processing, 2008

Implementing the discrete Fourier transform in the encrypted domain.
Proceedings of the IEEE International Conference on Acoustics, 2008

Comparison of different FFT implementations in the encrypted domain.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
Signal Processing in the Encrypted Domain.
EURASIP J. Information Security, 2007

Design and Analysis of the First BOWS Contest.
EURASIP J. Information Security, 2007

Oblivious Neural Network Computing via Homomorphic Encryption.
EURASIP J. Information Security, 2007

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Information Security, 2007

The first BOWS contest: Break Our Watermarking System.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Detection of malevolent changes in digital video for forensic applications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

2006
Zero-knowledge ST-DM watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A privacy-preserving protocol for neural-network-based computation.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Multispectral UV fluorescence analysis of painted surfaces.
Proceedings of the 14th European Signal Processing Conference, 2006

Opportunities and issues of image processing for cultural heritage applications.
Proceedings of the 14th European Signal Processing Conference, 2006

2005
Self Recovery Authentication Of Images In The Dwt Domain.
Int. J. Image Graphics, 2005

Effectiveness of ST-DM Watermarking Against Intra-video Collusion.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

An automatic registration algorithm for cultural heritage images.
Proceedings of the 2005 International Conference on Image Processing, 2005

Labelling and Authentication for Medical Imaging Through Data Hiding.
Proceedings of the From Data and Information Analysis to Knowledge Engineering, 2005

2004
Performance analysis of ST-DM watermarking in presence of nonadditive attacks.
IEEE Trans. Signal Processing, 2004

Evaluating the performance of ST-DM watermarking in nonadditive channels.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Data hiding for error concealment in H.264/AVC.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Protection of Cultural Heritage Contents on the Web.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

2003
Optimum decoding and detection of multiplicative watermarks.
IEEE Trans. Signal Processing, 2003

ArtShop: an art-oriented image-processing tool for cultural heritage applications.
Journal of Visualization and Computer Animation, 2003

A New Self-Recovery Technique for Image Authentication.
Proceedings of the Visual Content Processing and Representation, 2003

Analysis of data hiding technologies for medical images.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

2002
Multichannel watermarking of color images.
IEEE Trans. Circuits Syst. Video Techn., 2002

Color image watermarking in the Karhunen-Loeve transform domain.
J. Electronic Imaging, 2002

Managing Copyright in Open Networks.
IEEE Internet Computing, 2002

Robust Watermarking of Cartographic Images.
EURASIP J. Adv. Sig. Proc., 2002

IEEE Internet Computing: Issue Addendum - Managing Copyright: Watermark and Cryptography Algorithms.
IEEE Distributed Systems Online, 2002

Optimum decoding and detection of a multiplicative amplitude-encoded watermark.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

2001
A new decoder for the optimum recovery of nonadditive watermarks.
IEEE Trans. Image Processing, 2001

Improved wavelet-based watermarking through pixel-wise masking.
IEEE Trans. Image Processing, 2001

Watermarking-Based Copyright Protection of Internet-Delivered Multimedia.
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001

Watermark capacity measure incorporating a model of the human visual system.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

Cartographic image watermarking using text-based normalization.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

MPEG-4 Video Data Protection for Internet Distribution.
Proceedings of the Evolutionary Trends of the Internet, 2001

Text based geometric normalization for robust watermarking of digital maps.
Proceedings of the 2001 International Conference on Image Processing, 2001

Robust Frame-Based Watermarking For Digital Video.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
Capacity of full frame DCT image watermarks.
IEEE Trans. Image Processing, 2000

Improving the robustness of nonadditive watermarks through optimum detection theory.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Watermarking Through Color Image Bands Decorrelation.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

A DWT-Based Object Watermarking System for MPEG-4 Video Streams.
Proceedings of the 2000 International Conference on Image Processing, 2000

Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain.
Proceedings of the 2000 International Conference on Image Processing, 2000

A robust frame-based technique for video watermarking.
Proceedings of the 10th European Signal Processing Conference, 2000

Digital watermarking of visual data: State of the art and new trends.
Proceedings of the 10th European Signal Processing Conference, 2000

Digital watermarking for the authentication of AVS data.
Proceedings of the 10th European Signal Processing Conference, 2000

1999
Capacity of the watermark channel: how many bits can be hidden within a digital image?
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

DWT-based technique for spatio-frequency masking of digital signatures.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Optimum Decoding of Non-additive Full Frame DFT Watermarks.
Proceedings of the Information Hiding, Third International Workshop, 1999

Enforcement of Copyright Laws for Multimedia through Blind, Detectable, Reversible Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images.
Proceedings of the 1999 International Conference on Image Processing, 1999

Electronic Copyright Management Systems: Requirements, Players and Technologies.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
A DCT-domain system for robust image watermarking.
Signal Processing, 1998

Copyright protection of digital images by embedded unperceivable marks.
Image Vision Comput., 1998

Mask Building for Perceptually Hiding Frequency Embedded Watermarks.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Statistical modelling of full frame DCT coefficients.
Proceedings of the 9th European Signal Processing Conference, 1998

A M.A.P. identification criterion for DCT-based watermarking.
Proceedings of the 9th European Signal Processing Conference, 1998

1997
Median based relaxation of smoothness constraints in optic flow computation.
Pattern Recognition Letters, 1997

DCT-Based Watermark Recovering Without Resorting to the Uncorrupted Original Image.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997


  Loading...