Irene Amerini

According to our database1, Irene Amerini authored at least 31 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
PRNU-based Image Classification of Origin Social Network with CNN.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Image Origin Classification Based on Social Network Provenance.
IEEE Trans. Information Forensics and Security, 2017

Smartphone Fingerprinting Combining Features of On-Board Sensors.
IEEE Trans. Information Forensics and Security, 2017

Dealing with video source identification in social networks.
Sig. Proc.: Image Comm., 2017

Media trustworthiness verification and event assessment through an integrated framework: a case-study.
Multimedia Tools Appl., 2017

Tracing images back to their social network of origin: A CNN-based approach.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Robust smartphone fingerprint by mixing device sensors features for mobile strong authentication.
Proceedings of the Media Watermarking, 2016

2015
Acquisition source identification through a blind image classification.
IET Image Processing, 2015

SIFT match removal and keypoint preservation through dominant orientation shift.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Forensic Analysis of SIFT Keypoint Removal and Injection.
IEEE Trans. Information Forensics and Security, 2014

Blind image clustering based on the Normalized Cuts criterion for camera identification.
Sig. Proc.: Image Comm., 2014

Splicing forgeries localization through the use of first digit features.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Copy-move forgery detection from printed images.
Proceedings of the Media Watermarking, 2014

Exploiting perceptual quality issues in countering SIFT-based Forensic methods.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Copy-move forgery detection and localization by means of robust clustering with J-Linkage.
Sig. Proc.: Image Comm., 2013

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification.
EURASIP J. Image and Video Processing, 2013

Removal and injection of keypoints for SIFT-based copy-move counter-forensics.
EURASIP J. Information Security, 2013

SIFT keypoint removal and injection for countering matching-based image forensics.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
On the effectiveness of local warping against SIFT-based copy-move detection.
Proceedings of the 5th International Symposium on Communications, 2012

2011
A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery.
IEEE Trans. Information Forensics and Security, 2011

An analysis on attacker actions in fingerprint-copy attack in source camera identification.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

2010
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication.
Proceedings of the Handbook of Research on Computational Forensics, 2010

A DVB-MHP web browser to pursue convergence between Digital Terrestrial Television and Internet.
Multimedia Tools Appl., 2010

A DFT-Based Analysis to Discern Between Camera and Scanned Images.
IJDCF, 2010

Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification.
IJDCF, 2010

Fast image clustering of unknown source images.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Geometric tampering estimation by means of a SIFT-based forensic analysis.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Integration between Digital Terrestrial Television and Internet by Means of a DVB-MHP Web Browser.
Proceedings of the WEBIST 2009, 2009

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis.
Proceedings of the Forensics in Telecommunications, 2009


  Loading...