Mauro Barni
According to our database1,
Mauro Barni
authored at least 235 papers
between 1994 and 2019.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2012, "For contributions to signal and image processing for multimedia security".
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2019
Detection Games under Fully Active Adversaries.
Entropy, 2019
2018
Adversarial Source Identification Game With Corrupted Training.
IEEE Trans. Information Theory, 2018
An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack.
IEEE Signal Process. Lett., 2018
A message passing approach for decision fusion in adversarial multi-sensor networks.
Information Fusion, 2018
Anonymous subject identification and privacy information management in video surveillance.
Int. J. Inf. Sec., 2018
Countering the Pooled Triangle Test for PRNU-based camera identification.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Detection of adaptive histogram equalization robust against JPEG compression.
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018
Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Adversarial Multimedia Forensics: Overview and Challenges Ahead.
Proceedings of the 26th European Signal Processing Conference, 2018
2017
Smart Detection of Line-Search Oracle Attacks.
IEEE Trans. Information Forensics and Security, 2017
Farewell Message.
IEEE Trans. Information Forensics and Security, 2017
Aligned and non-aligned double JPEG detection using convolutional neural networks.
J. Visual Communication and Image Representation, 2017
A gradient-based pixel-domain attack against SVM detection of global image manipulations.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Threat Models and Games for Adversarial Multimedia Forensics.
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017
2016
Multiple Parenting Phylogeny Relationships in Digital Images.
IEEE Trans. Information Forensics and Security, 2016
Piecewise Function Approximation With Private Data.
IEEE Trans. Information Forensics and Security, 2016
Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.
IEEE Trans. Information Forensics and Security, 2016
A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
IEEE Trans. Information Forensics and Security, 2016
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Detection of double AVC/HEVC encoding.
Proceedings of the 24th European Signal Processing Conference, 2016
2015
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing.
IEEE Signal Process. Mag., 2015
Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics.
IEEE Signal Process. Lett., 2015
Detection games with a fully active attacker.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
From Single Object to Contextual Authentication - A New Challenge in Multimedia Forensics and Beyond.
Proceedings of the VISAPP 2015, 2015
Unsupervised fusion for forgery localization exploiting background information.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015
Optimum decision fusion in cognitive wireless sensor networks with unknown users location.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications.
Proceedings of the Medical Data Privacy Handbook, 2015
2014
Binary Hypothesis Testing Game With Training Data.
IEEE Trans. Information Theory, 2014
Forensic Analysis of SIFT Keypoint Removal and Injection.
IEEE Trans. Information Forensics and Security, 2014
A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding.
IEEE Trans. Information Forensics and Security, 2014
Source distinguishability under corrupted training.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Image counter-forensics based on feature injection.
Proceedings of the Media Watermarking, 2014
Countering anti-forensics by means of data fusion.
Proceedings of the Media Watermarking, 2014
Are you threatening me?: Towards smart detectors in watermarking.
Proceedings of the Media Watermarking, 2014
Universal Counterforensics of Multiple Compressed JPEG Images.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
An information-theoretic analysis of dirty paper coding for informed audio watermarking.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014
Multiple parenting identification in image phylogeny.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Compressive hyperspectral imaging using progressive total variation.
Proceedings of the IEEE International Conference on Acoustics, 2014
A video forensic technique for detecting frame deletion and insertion.
Proceedings of the IEEE International Conference on Acoustics, 2014
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
2013
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence.
IEEE Trans. Information Forensics and Security, 2013
The Source Identification Game: An Information-Theoretic Perspective.
IEEE Trans. Information Forensics and Security, 2013
Private Computing with Garbled Circuits [Applications Corner].
IEEE Signal Process. Mag., 2013
Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation.
IEEE Signal Process. Mag., 2013
Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors].
IEEE Signal Process. Mag., 2013
A Forensic Tool for Investigating Image Forgeries.
IJDCF, 2013
A Universal Attack Against Histogram-Based Image Forensics.
IJDCF, 2013
Counter-forensics of SIFT-based copy-move detection by means of keypoint classification.
EURASIP J. Image and Video Processing, 2013
Removal and injection of keypoints for SIFT-based copy-move counter-forensics.
EURASIP J. Information Security, 2013
Attacking image classification based on bag-of-visual-words.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Secure Evaluation of Private Functions through Piecewise Linear Approximation.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
The watchful forensic analyst: Multi-clue information fusion with background knowledge.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Multiple-observation hypothesis testing under adversarial conditions.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Localization of forgeries in MPEG-2 video through GOP size and DQ analysis.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013
Audio informed watermarking by means of dirty trellis codes.
Proceedings of the 2013 Information Theory and Applications Workshop, 2013
SIFT keypoint removal and injection for countering matching-based image forensics.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Coping with the enemy: Advances in adversary-aware signal processing.
Proceedings of the IEEE International Conference on Acoustics, 2013
The Security Margin: A measure of source distinguishability under adversarial conditions.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation.
Proceedings of the Security and Privacy in Biometrics, 2013
2012
A fuzzy approach to deal with uncertainty in image forensics.
Sig. Proc.: Image Comm., 2012
Progressive Compressed Sensing and Reconstruction of Multidimensional Signals Using Hybrid Transform/Prediction Sparsity Model.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2012
Detection of video double encoding with GOP size estimation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
General function evaluation in a STPC setting via piecewise linear approximation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Optimum forensic and counter-forensic strategies for source identification with training data.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Privacy preserving ECG quality evaluation.
Proceedings of the Multimedia and Security Workshop, 2012
A universal technique to hide traces of histogram-based image manipulations.
Proceedings of the Multimedia and Security Workshop, 2012
On the effectiveness of local warping against SIFT-based copy-move detection.
Proceedings of the 5th International Symposium on Communications, 2012
Emerging cryptographic challenges in image and video processing.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
An efficient protocol for private iris-code matching by means of garbled circuits.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
Dealing with uncertainty in image forensics: A fuzzy approach.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
A game theoretic approach to source identification with known statistics.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Hiding traces of median filtering in digital images.
Proceedings of the 20th European Signal Processing Conference, 2012
An overview on video forensics.
Proceedings of the 20th European Signal Processing Conference, 2012
2011
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
IEEE Trans. Information Forensics and Security, 2011
Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010) [Book Reviews].
IEEE Signal Process. Mag., 2011
Division between encrypted integers by means of Garbled Circuits.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
A Dempster-Shafer framework for decision fusion in image forensics.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Analysis of the security of linear blinding techniques from an information theoretical point of view.
Proceedings of the IEEE International Conference on Acoustics, 2011
Low-complexity predictive lossy compression of hyperspectral and ultraspectral images.
Proceedings of the IEEE International Conference on Acoustics, 2011
A compressive sampling scheme for iterative hyperspectral image reconstruction.
Proceedings of the 19th European Signal Processing Conference, 2011
2010
Watermark-Based Authentication.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010
Digital Watermarking.
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Asymptotically optimum universal watermark embedding and detection in the high-SNR regime.
IEEE Trans. Information Theory, 2010
A Full-Reference Quality Metric for Geometrically Distorted Images.
IEEE Trans. Image Processing, 2010
Roughness-Adaptive 3-D Watermarking Based on Masking Effect of Surface Roughness.
IEEE Trans. Information Forensics and Security, 2010
Composite signal representation for fast and storage-efficient processing of encrypted signals.
IEEE Trans. Information Forensics and Security, 2010
Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding.
IEEE Trans. Geoscience and Remote Sensing, 2010
Privacy preserving evaluation of signal quality with application to ECG analysis.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics.
Proceedings of the Multimedia and Security Workshop, 2010
Privacy-preserving fingercode authentication.
Proceedings of the Multimedia and Security Workshop, 2010
Exploring image dependencies: a new challenge in image forensics.
Proceedings of the Media Forensics and Security II, 2010
Identification of cut & paste tampering by means of double-JPEG detection and image segmentation.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Low-complexity lossy compression of hyperspectral images via informed quantization.
Proceedings of the International Conference on Image Processing, 2010
Forensics aided steganalysis of heterogeneous images.
Proceedings of the IEEE International Conference on Acoustics, 2010
Detection of resampled images: Performance analysis and practical challenges.
Proceedings of the 18th European Signal Processing Conference, 2010
A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010
2009
MPSteg-color: data hiding through redundant basis decomposition.
IEEE Trans. Information Forensics and Security, 2009
On the implementation of the discrete Fourier transform in the encrypted domain.
IEEE Trans. Information Forensics and Security, 2009
Encrypted Domain DCT Based on Homomorphic Cryptosystems.
EURASIP J. Information Security, 2009
Processing in the encrypted domain using a composite signal representation: Pros and cons.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Efficient privacy-preserving classification of ECG signals.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Image Diversity Analysis: Context, Opinion and Bias.
Proceedings of First International Workshop on Living Web, 2009
Quality evaluation of motion estimation algorithms based on structural distortions.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009
Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Roughness-Adaptive 3D Watermarking of Polygonal Meshes.
Proceedings of the Information Hiding, 11th International Workshop, 2009
A compressive-sensing based watermarking scheme for sparse image tampering identification.
Proceedings of the International Conference on Image Processing, 2009
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
Proceedings of the Computer Security, 2009
2008
Stochastic Image Warping for Improved Watermark Desynchronization.
EURASIP J. Information Security, 2008
Anticollusion watermarking of 3D meshes by prewarping.
Proceedings of the Security, 2008
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks.
Proceedings of the Security, 2008
Enhancing Privacy in Remote Data Classification.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
A structural method for quality evaluation of desynchronization attacks in image watermarking.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
A comparative study of +/- steganalyzers.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
Efficient pointwise and blockwise encrypted operations.
Proceedings of the 10th workshop on Multimedia & Security, 2008
Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema.
Proceedings of the International Conference on Image Processing, 2008
Discrete cosine transform of encrypted images.
Proceedings of the International Conference on Image Processing, 2008
Implementing the discrete Fourier transform in the encrypted domain.
Proceedings of the IEEE International Conference on Acoustics, 2008
A psychovisual experiment on the use of Gibbs potential for the quality assessment of geometrically distorted images.
Proceedings of the Human Vision and Electronic Imaging XIII, 2008
Lossless compression of encrypted grey-level and color images.
Proceedings of the 2008 16th European Signal Processing Conference, 2008
Comparison of different FFT implementations in the encrypted domain.
Proceedings of the 2008 16th European Signal Processing Conference, 2008
2007
Watermarked 3-D Mesh Quality Assessment.
IEEE Trans. Multimedia, 2007
Perceptual Issues in Haptic Digital Watermarking.
IEEE MultiMedia, 2007
Design and Analysis of the First BOWS Contest.
EURASIP J. Information Security, 2007
Oblivious Neural Network Computing via Homomorphic Encryption.
EURASIP J. Information Security, 2007
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Information Security, 2007
Distributed Source Coding Techniques for Lossless Compression of Hyperspectral Images.
EURASIP J. Adv. Sig. Proc., 2007
The first BOWS contest: Break Our Watermarking System.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Detection of malevolent changes in digital video for forensic applications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Expanding the class of watermark de-synchronization attacks.
Proceedings of the 9th workshop on Multimedia & Security, 2007
MPSteg-color: A New Steganographic Technique for Color Images.
Proceedings of the Information Hiding, 9th International Workshop, 2007
Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007
Perceptual quality evaluation of geometric distortions in images.
Proceedings of the Human Vision and Electronic Imaging XII, San Jose, CA, USA, January 29, 2007
2006
Joint near-lossless compression and watermarking of still images for authentication and tamper localization.
Sig. Proc.: Image Comm., 2006
Zero-knowledge ST-DM watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
MPsteg: hiding a message in the Matching Pursuit domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
A privacy-preserving protocol for neural-network-based computation.
Proceedings of the 8th workshop on Multimedia & Security, 2006
Processing encrypted signals: a new frontier for multimedia security.
Proceedings of the 8th workshop on Multimedia & Security, 2006
Image Watermarking Robust Against Non-Linear Value-Metric Scaling Based on Higher Order Statistics.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
Is haptic watermarking worth it?
Proceedings of the Human Vision and Electronic Imaging XI, 2006
2005
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding.
IEEE Trans. Signal Processing, 2005
Watermarking of MPEG-4 video objects.
IEEE Trans. Multimedia, 2005
Effectiveness of exhaustive search and template matching against watermark desynchronization.
IEEE Signal Process. Lett., 2005
Ensuring gain-invariance in high-rate data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Shedding light on some possible remedies against watermark desynchronization: a case study.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Effectiveness of ST-DM Watermarking Against Intra-video Collusion.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Trellis-Coded Rational Dither Modulation for Digital Watermarking.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Distributed source coding of hyperspectral images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Improved low-complexity intraband lossless compression of hyperspectral images by means of Slepian-Wolf coding.
Proceedings of the 2005 International Conference on Image Processing, 2005
Objective evaluation of the perceptual quality of 3D watermarking.
Proceedings of the 2005 International Conference on Image Processing, 2005
Perceptibility of Haptic Digital Watermarking of Virtual Textures.
Proceedings of the First Joint Eurohaptics Conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2005
2004
Performance analysis of ST-DM watermarking in presence of nonadditive attacks.
IEEE Trans. Signal Processing, 2004
Near-lossless image authentication transparent to near-lossless coding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Evaluating the performance of ST-DM watermarking in nonadditive channels.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Orthogonal dirty paper coding for informed data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Wavelet-based blind watermarking of 3D models.
Proceedings of the 6th workshop on Multimedia & Security, 2004
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking.
Proceedings of the Information Hiding, 6th International Workshop, 2004
Joint near-lossless watermarking and compression for the authentication of remote sensing images.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004
Minimum-Impact-on-Classifier (MIC) watermarking for protection of remote sensing imagery.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004
2003
Optimum decoding and detection of multiplicative watermarks.
IEEE Trans. Signal Processing, 2003
A general framework for robust watermarking security.
Signal Processing, 2003
ArtShop: an art-oriented image-processing tool for cultural heritage applications.
Journal of Visualization and Computer Animation, 2003
A New Self-Recovery Technique for Image Authentication.
Proceedings of the Visual Content Processing and Representation, 2003
Advantages and drawbacks of multiplicative spread spectrum watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
2002
Multichannel watermarking of color images.
IEEE Trans. Circuits Syst. Video Techn., 2002
Color image watermarking in the Karhunen-Loeve transform domain.
J. Electronic Imaging, 2002
Managing Copyright in Open Networks.
IEEE Internet Computing, 2002
Robust Watermarking of Cartographic Images.
EURASIP J. Adv. Sig. Proc., 2002
Editorial.
EURASIP J. Adv. Sig. Proc., 2002
IEEE Internet Computing: Issue Addendum - Managing Copyright: Watermark and Cryptography Algorithms.
IEEE Distributed Systems Online, 2002
Optimum decoding and detection of a multiplicative amplitude-encoded watermark.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Near-lossless digital watermarking for copyright protection of remote sensing images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002
On the performance of multiplicative spread spectrum watermarking.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002
2001
A new decoder for the optimum recovery of nonadditive watermarks.
IEEE Trans. Image Processing, 2001
Improved wavelet-based watermarking through pixel-wise masking.
IEEE Trans. Image Processing, 2001
An improved H.263 video coder relying on weighted median filtering of motion vectors.
IEEE Trans. Circuits Syst. Video Techn., 2001
Information theoretic aspects in digital watermarking.
Signal Processing, 2001
From watermark detection to watermark decoding: a PPM approach.
Signal Processing, 2001
Improved group-of-block synchronization for robust transmission of H.263 video over slow-fading channels.
J. Electronic Imaging, 2001
Error resilient transmission of H.263 video for mobile communications.
European Transactions on Telecommunications, 2001
Watermarking-Based Copyright Protection of Internet-Delivered Multimedia.
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001
Watermark capacity measure incorporating a model of the human visual system.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Fast optimum decoding for nonadditive readable watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001
Cartographic image watermarking using text-based normalization.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001
MPEG-4 Video Data Protection for Internet Distribution.
Proceedings of the Evolutionary Trends of the Internet, 2001
Image segmentation and region filling for virtual restoration of artworks.
Proceedings of the 2001 International Conference on Image Processing, 2001
Text based geometric normalization for robust watermarking of digital maps.
Proceedings of the 2001 International Conference on Image Processing, 2001
Robust Frame-Based Watermarking For Digital Video.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
2000
Capacity of full frame DCT image watermarks.
IEEE Trans. Image Processing, 2000
A quasi-Euclidean norm to speed up vector median filtering.
IEEE Trans. Image Processing, 2000
Image Processing for Virtual Restoration of Artworks.
IEEE MultiMedia, 2000
Robust video watermarking for wireless multimedia communications.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
Improving the robustness of nonadditive watermarks through optimum detection theory.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Object watermarking for for MPEG-4 video streams copyright protection.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Watermarking Through Color Image Bands Decorrelation.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain.
Proceedings of the 2000 International Conference on Image Processing, 2000
Craters Detection via Possibilistic Shell Clustering.
Proceedings of the 2000 International Conference on Image Processing, 2000
Multichannel M-Filtering for Color Image Restoration.
Proceedings of the 2000 International Conference on Image Processing, 2000
A robust frame-based technique for video watermarking.
Proceedings of the 10th European Signal Processing Conference, 2000
Digital watermarking of visual data: State of the art and new trends.
Proceedings of the 10th European Signal Processing Conference, 2000
Digital watermarking for the authentication of AVS data.
Proceedings of the 10th European Signal Processing Conference, 2000
Copyright Protection of Cultural Heritage Multimedia Data through Digital Watermarking Techniques.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000
1999
Regularization of optic flow estimates by means of weighted vector median filtering.
IEEE Trans. Image Processing, 1999
A new possibilistic clustering algorithm for line detection in real world imagery.
Pattern Recognition, 1999
Capacity of the watermark channel: how many bits can be hidden within a digital image?
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
DWT-based technique for spatio-frequency masking of digital signatures.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
A Java-based system for remote correction of CRT color distortion.
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999
Optimum Decoding of Non-additive Full Frame DFT Watermarks.
Proceedings of the Information Hiding, Third International Workshop, 1999
Enforcement of Copyright Laws for Multimedia through Blind, Detectable, Reversible Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images.
Proceedings of the 1999 International Conference on Image Processing, 1999
Electronic Copyright Management Systems: Requirements, Players and Technologies.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
1998
On the computational complexity of multivariate median filters.
Signal Processing, 1998
A DCT-domain system for robust image watermarking.
Signal Processing, 1998
Copyright protection of digital images by embedded unperceivable marks.
Image Vision Comput., 1998
Mask Building for Perceptually Hiding Frequency Embedded Watermarks.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
Statistical modelling of full frame DCT coefficients.
Proceedings of the 9th European Signal Processing Conference, 1998
A M.A.P. identification criterion for DCT-based watermarking.
Proceedings of the 9th European Signal Processing Conference, 1998
1997
A fast algorithm for 1-norm vector median filtering.
IEEE Trans. Image Processing, 1997
Colour-based detection of defects on chicken meat.
Image Vision Comput., 1997
DCT-Based Watermark Recovering Without Resorting to the Uncorrupted Original Image.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
Using A Wavelet-Based Fractal Feature to Improve Texture Discrimination on SAR Images.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
Integration of Spatio-Temporal Information for Motion Detection by Means of Fuzzy Reasoning.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997
1996
Comments on "A possibilistic approach to clustering".
IEEE Trans. Fuzzy Systems, 1996
Unsupervised detection of straight lines through possibilistic clustering.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
Adaptively weighted vector-median filters for motion-fields smoothing.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996
A fuzzy expert system for low level image segmentation.
Proceedings of the 8th European Signal Processing Conference, 1996
1995
An intelligent perception system for food quality inspection using color analysis.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995
Optimum linear approximation of the Euclidean norm to speed up vector median filtering.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995
A Vision System for Automatic Inspection of Meat Quality.
Proceedings of the Image Analysis and Processing, 8th International Conference, 1995
1994
Dual-channel iterative even-median filter.
Pattern Recognition Letters, 1994