Mauro Barni

According to our database1, Mauro Barni authored at least 249 papers between 1994 and 2018.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to signal and image processing for multimedia security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Adversarial Source Identification Game With Corrupted Training.
IEEE Trans. Information Theory, 2018

An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack.
IEEE Signal Process. Lett., 2018

A message passing approach for decision fusion in adversarial multi-sensor networks.
Information Fusion, 2018

Anonymous subject identification and privacy information management in video surveillance.
Int. J. Inf. Sec., 2018

CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing.
CoRR, 2018

An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack.
CoRR, 2018

SEMBA: SEcure multi-biometric authentication.
CoRR, 2018

CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.
CoRR, 2018

Detection Games Under Fully Active Adversaries.
CoRR, 2018

Secure Detection of Image Manipulation by means of Random Feature Selection.
CoRR, 2018

Detection of adaptive histogram equalization robust against JPEG compression.
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018

Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

2017
Smart Detection of Line-Search Oracle Attacks.
IEEE Trans. Information Forensics and Security, 2017

Farewell Message.
IEEE Trans. Information Forensics and Security, 2017

Aligned and non-aligned double JPEG detection using convolutional neural networks.
J. Visual Communication and Image Representation, 2017

Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks.
CoRR, 2017

Adversarial Source Identification Game with Corrupted Training.
CoRR, 2017

A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor Networks.
CoRR, 2017

A gradient-based pixel-domain attack against SVM detection of global image manipulations.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Threat Models and Games for Adversarial Multimedia Forensics.
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017

2016
Multiple Parenting Phylogeny Relationships in Digital Images.
IEEE Trans. Information Forensics and Security, 2016

Piecewise Function Approximation With Private Data.
IEEE Trans. Information Forensics and Security, 2016

Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.
IEEE Trans. Information Forensics and Security, 2016

A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
IEEE Trans. Information Forensics and Security, 2016

Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Detection of double AVC/HEVC encoding.
Proceedings of the 24th European Signal Processing Conference, 2016

2015
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing.
IEEE Signal Process. Mag., 2015

Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics.
IEEE Signal Process. Lett., 2015

Piecewise Function Approximation with Private Data.
CoRR, 2015

A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
CoRR, 2015

Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks.
CoRR, 2015

Detection games with a fully active attacker.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

From Single Object to Contextual Authentication - A New Challenge in Multimedia Forensics and Beyond.
Proceedings of the VISAPP 2015, 2015

Unsupervised fusion for forgery localization exploiting background information.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

Optimum decision fusion in cognitive wireless sensor networks with unknown users location.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Binary Hypothesis Testing Game With Training Data.
IEEE Trans. Information Theory, 2014

Forensic Analysis of SIFT Keypoint Removal and Injection.
IEEE Trans. Information Forensics and Security, 2014

A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding.
IEEE Trans. Information Forensics and Security, 2014

Compressive Hyperspectral Imaging Using Progressive Total Variation.
CoRR, 2014

Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective.
CoRR, 2014

Source distinguishability under corrupted training.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Image counter-forensics based on feature injection.
Proceedings of the Media Watermarking, 2014

Countering anti-forensics by means of data fusion.
Proceedings of the Media Watermarking, 2014

Are you threatening me?: Towards smart detectors in watermarking.
Proceedings of the Media Watermarking, 2014

Universal Counterforensics of Multiple Compressed JPEG Images.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

An information-theoretic analysis of dirty paper coding for informed audio watermarking.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014

Multiple parenting identification in image phylogeny.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Compressive hyperspectral imaging using progressive total variation.
Proceedings of the IEEE International Conference on Acoustics, 2014

A video forensic technique for detecting frame deletion and insertion.
Proceedings of the IEEE International Conference on Acoustics, 2014

Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence.
IEEE Trans. Information Forensics and Security, 2013

The Source Identification Game: An Information-Theoretic Perspective.
IEEE Trans. Information Forensics and Security, 2013

Private Computing with Garbled Circuits [Applications Corner].
IEEE Signal Process. Mag., 2013

Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation.
IEEE Signal Process. Mag., 2013

Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors].
IEEE Signal Process. Mag., 2013

A Forensic Tool for Investigating Image Forgeries.
IJDCF, 2013

A Universal Attack Against Histogram-Based Image Forensics.
IJDCF, 2013

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification.
EURASIP J. Image and Video Processing, 2013

Removal and injection of keypoints for SIFT-based copy-move counter-forensics.
EURASIP J. Information Security, 2013

Binary Hypothesis Testing Game with Training Data
CoRR, 2013

Progressive Compressed Sensing and Reconstruction of Multidimensional Signals Using Hybrid Transform/Prediction Sparsity Model.
CoRR, 2013

Attacking image classification based on bag-of-visual-words.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Secure Evaluation of Private Functions through Piecewise Linear Approximation.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

The watchful forensic analyst: Multi-clue information fusion with background knowledge.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Multiple-observation hypothesis testing under adversarial conditions.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Localization of forgeries in MPEG-2 video through GOP size and DQ analysis.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Audio informed watermarking by means of dirty trellis codes.
Proceedings of the 2013 Information Theory and Applications Workshop, 2013

SIFT keypoint removal and injection for countering matching-based image forensics.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Coping with the enemy: Advances in adversary-aware signal processing.
Proceedings of the IEEE International Conference on Acoustics, 2013

The Security Margin: A measure of source distinguishability under adversarial conditions.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
A fuzzy approach to deal with uncertainty in image forensics.
Sig. Proc.: Image Comm., 2012

Progressive Compressed Sensing and Reconstruction of Multidimensional Signals Using Hybrid Transform/Prediction Sparsity Model.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2012

Detection of video double encoding with GOP size estimation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

General function evaluation in a STPC setting via piecewise linear approximation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Optimum forensic and counter-forensic strategies for source identification with training data.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Privacy preserving ECG quality evaluation.
Proceedings of the Multimedia and Security Workshop, 2012

A universal technique to hide traces of histogram-based image manipulations.
Proceedings of the Multimedia and Security Workshop, 2012

On the effectiveness of local warping against SIFT-based copy-move detection.
Proceedings of the 5th International Symposium on Communications, 2012

Emerging cryptographic challenges in image and video processing.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

An efficient protocol for private iris-code matching by means of garbled circuits.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Dealing with uncertainty in image forensics: A fuzzy approach.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

A game theoretic approach to source identification with known statistics.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Hiding traces of median filtering in digital images.
Proceedings of the 20th European Signal Processing Conference, 2012

An overview on video forensics.
Proceedings of the 20th European Signal Processing Conference, 2012

2011
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
IEEE Trans. Information Forensics and Security, 2011

Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010) [Book Reviews].
IEEE Signal Process. Mag., 2011

Division between encrypted integers by means of Garbled Circuits.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

A Dempster-Shafer framework for decision fusion in image forensics.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Analysis of the security of linear blinding techniques from an information theoretical point of view.
Proceedings of the IEEE International Conference on Acoustics, 2011

Low-complexity predictive lossy compression of hyperspectral and ultraspectral images.
Proceedings of the IEEE International Conference on Acoustics, 2011

A compressive sampling scheme for iterative hyperspectral image reconstruction.
Proceedings of the 19th European Signal Processing Conference, 2011

2010
Watermark-Based Authentication.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Digital Watermarking.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Asymptotically optimum universal watermark embedding and detection in the high-SNR regime.
IEEE Trans. Information Theory, 2010

A Full-Reference Quality Metric for Geometrically Distorted Images.
IEEE Trans. Image Processing, 2010

Roughness-Adaptive 3-D Watermarking Based on Masking Effect of Surface Roughness.
IEEE Trans. Information Forensics and Security, 2010

Composite signal representation for fast and storage-efficient processing of encrypted signals.
IEEE Trans. Information Forensics and Security, 2010

Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding.
IEEE Trans. Geoscience and Remote Sensing, 2010

Privacy preserving evaluation of signal quality with application to ECG analysis.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics.
Proceedings of the Multimedia and Security Workshop, 2010

Privacy-preserving fingercode authentication.
Proceedings of the Multimedia and Security Workshop, 2010

Exploring image dependencies: a new challenge in image forensics.
Proceedings of the Media Forensics and Security II, 2010

Identification of cut & paste tampering by means of double-JPEG detection and image segmentation.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Low-complexity lossy compression of hyperspectral images via informed quantization.
Proceedings of the International Conference on Image Processing, 2010

Forensics aided steganalysis of heterogeneous images.
Proceedings of the IEEE International Conference on Acoustics, 2010

Detection of resampled images: Performance analysis and practical challenges.
Proceedings of the 18th European Signal Processing Conference, 2010

A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
MPSteg-color: data hiding through redundant basis decomposition.
IEEE Trans. Information Forensics and Security, 2009

On the implementation of the discrete Fourier transform in the encrypted domain.
IEEE Trans. Information Forensics and Security, 2009

Secure Evaluation of Private Linear Branching Programs with Medical Applications.
IACR Cryptology ePrint Archive, 2009

Encrypted Domain DCT Based on Homomorphic Cryptosystems.
EURASIP J. Information Security, 2009

Processing in the encrypted domain using a composite signal representation: Pros and cons.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Efficient privacy-preserving classification of ECG signals.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Image Diversity Analysis: Context, Opinion and Bias.
Proceedings of First International Workshop on Living Web, 2009

Quality evaluation of motion estimation algorithms based on structural distortions.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009

Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Roughness-Adaptive 3D Watermarking of Polygonal Meshes.
Proceedings of the Information Hiding, 11th International Workshop, 2009

A compressive-sensing based watermarking scheme for sparse image tampering identification.
Proceedings of the International Conference on Image Processing, 2009

Secure Evaluation of Private Linear Branching Programs with Medical Applications.
Proceedings of the Computer Security, 2009

2008
Stochastic Image Warping for Improved Watermark Desynchronization.
EURASIP J. Information Security, 2008

Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks
CoRR, 2008

Anticollusion watermarking of 3D meshes by prewarping.
Proceedings of the Security, 2008

Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks.
Proceedings of the Security, 2008

Enhancing Privacy in Remote Data Classification.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A structural method for quality evaluation of desynchronization attacks in image watermarking.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

A comparative study of +/- steganalyzers.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Efficient pointwise and blockwise encrypted operations.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema.
Proceedings of the International Conference on Image Processing, 2008

Discrete cosine transform of encrypted images.
Proceedings of the International Conference on Image Processing, 2008

Implementing the discrete Fourier transform in the encrypted domain.
Proceedings of the IEEE International Conference on Acoustics, 2008

A psychovisual experiment on the use of Gibbs potential for the quality assessment of geometrically distorted images.
Proceedings of the Human Vision and Electronic Imaging XIII, 2008

Lossless compression of encrypted grey-level and color images.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

Comparison of different FFT implementations in the encrypted domain.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
Watermarked 3-D Mesh Quality Assessment.
IEEE Trans. Multimedia, 2007

Perceptual Issues in Haptic Digital Watermarking.
IEEE MultiMedia, 2007

Design and Analysis of the First BOWS Contest.
EURASIP J. Information Security, 2007

Oblivious Neural Network Computing via Homomorphic Encryption.
EURASIP J. Information Security, 2007

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Information Security, 2007

Distributed Source Coding Techniques for Lossless Compression of Hyperspectral Images.
EURASIP J. Adv. Sig. Proc., 2007

The first BOWS contest: Break Our Watermarking System.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Detection of malevolent changes in digital video for forensic applications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Expanding the class of watermark de-synchronization attacks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

MPSteg-color: A New Steganographic Technique for Color Images.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007

Perceptual quality evaluation of geometric distortions in images.
Proceedings of the Human Vision and Electronic Imaging XII, San Jose, CA, USA, January 29, 2007

2006
Joint near-lossless compression and watermarking of still images for authentication and tamper localization.
Sig. Proc.: Image Comm., 2006

Zero-knowledge ST-DM watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

MPsteg: hiding a message in the Matching Pursuit domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A privacy-preserving protocol for neural-network-based computation.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Processing encrypted signals: a new frontier for multimedia security.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Image Watermarking Robust Against Non-Linear Value-Metric Scaling Based on Higher Order Statistics.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Is haptic watermarking worth it?
Proceedings of the Human Vision and Electronic Imaging XI, 2006

2005
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding.
IEEE Trans. Signal Processing, 2005

Watermarking of MPEG-4 video objects.
IEEE Trans. Multimedia, 2005

Effectiveness of exhaustive search and template matching against watermark desynchronization.
IEEE Signal Process. Lett., 2005

Ensuring gain-invariance in high-rate data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Shedding light on some possible remedies against watermark desynchronization: a case study.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Effectiveness of ST-DM Watermarking Against Intra-video Collusion.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Trellis-Coded Rational Dither Modulation for Digital Watermarking.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Distributed source coding of hyperspectral images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Improved low-complexity intraband lossless compression of hyperspectral images by means of Slepian-Wolf coding.
Proceedings of the 2005 International Conference on Image Processing, 2005

Objective evaluation of the perceptual quality of 3D watermarking.
Proceedings of the 2005 International Conference on Image Processing, 2005

Perceptibility of Haptic Digital Watermarking of Virtual Textures.
Proceedings of the First Joint Eurohaptics Conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2005

2004
Performance analysis of ST-DM watermarking in presence of nonadditive attacks.
IEEE Trans. Signal Processing, 2004

Near-lossless image authentication transparent to near-lossless coding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Evaluating the performance of ST-DM watermarking in nonadditive channels.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Orthogonal dirty paper coding for informed data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Wavelet-based blind watermarking of 3D models.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Joint near-lossless watermarking and compression for the authentication of remote sensing images.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

Minimum-Impact-on-Classifier (MIC) watermarking for protection of remote sensing imagery.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

2003
Optimum decoding and detection of multiplicative watermarks.
IEEE Trans. Signal Processing, 2003

A general framework for robust watermarking security.
Signal Processing, 2003

ArtShop: an art-oriented image-processing tool for cultural heritage applications.
Journal of Visualization and Computer Animation, 2003

A New Self-Recovery Technique for Image Authentication.
Proceedings of the Visual Content Processing and Representation, 2003

Advantages and drawbacks of multiplicative spread spectrum watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

2002
Multichannel watermarking of color images.
IEEE Trans. Circuits Syst. Video Techn., 2002

Color image watermarking in the Karhunen-Loeve transform domain.
J. Electronic Imaging, 2002

Managing Copyright in Open Networks.
IEEE Internet Computing, 2002

Robust Watermarking of Cartographic Images.
EURASIP J. Adv. Sig. Proc., 2002

Editorial.
EURASIP J. Adv. Sig. Proc., 2002

IEEE Internet Computing: Issue Addendum - Managing Copyright: Watermark and Cryptography Algorithms.
IEEE Distributed Systems Online, 2002

Optimum decoding and detection of a multiplicative amplitude-encoded watermark.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

On the performance of multiplicative spread spectrum watermarking.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

2001
A new decoder for the optimum recovery of nonadditive watermarks.
IEEE Trans. Image Processing, 2001

Improved wavelet-based watermarking through pixel-wise masking.
IEEE Trans. Image Processing, 2001

An improved H.263 video coder relying on weighted median filtering of motion vectors.
IEEE Trans. Circuits Syst. Video Techn., 2001

Information theoretic aspects in digital watermarking.
Signal Processing, 2001

From watermark detection to watermark decoding: a PPM approach.
Signal Processing, 2001

Improved group-of-block synchronization for robust transmission of H.263 video over slow-fading channels.
J. Electronic Imaging, 2001

Error resilient transmission of H.263 video for mobile communications.
European Transactions on Telecommunications, 2001

Watermarking-Based Copyright Protection of Internet-Delivered Multimedia.
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001

Watermark capacity measure incorporating a model of the human visual system.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Fast optimum decoding for nonadditive readable watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

Cartographic image watermarking using text-based normalization.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

MPEG-4 Video Data Protection for Internet Distribution.
Proceedings of the Evolutionary Trends of the Internet, 2001

Image segmentation and region filling for virtual restoration of artworks.
Proceedings of the 2001 International Conference on Image Processing, 2001

Text based geometric normalization for robust watermarking of digital maps.
Proceedings of the 2001 International Conference on Image Processing, 2001

Robust Frame-Based Watermarking For Digital Video.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
Capacity of full frame DCT image watermarks.
IEEE Trans. Image Processing, 2000

A quasi-Euclidean norm to speed up vector median filtering.
IEEE Trans. Image Processing, 2000

Image Processing for Virtual Restoration of Artworks.
IEEE MultiMedia, 2000

Robust video watermarking for wireless multimedia communications.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Improving the robustness of nonadditive watermarks through optimum detection theory.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Object watermarking for for MPEG-4 video streams copyright protection.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Watermarking Through Color Image Bands Decorrelation.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain.
Proceedings of the 2000 International Conference on Image Processing, 2000

Craters Detection via Possibilistic Shell Clustering.
Proceedings of the 2000 International Conference on Image Processing, 2000

Multichannel M-Filtering for Color Image Restoration.
Proceedings of the 2000 International Conference on Image Processing, 2000

A robust frame-based technique for video watermarking.
Proceedings of the 10th European Signal Processing Conference, 2000

Digital watermarking of visual data: State of the art and new trends.
Proceedings of the 10th European Signal Processing Conference, 2000

Digital watermarking for the authentication of AVS data.
Proceedings of the 10th European Signal Processing Conference, 2000

Copyright Protection of Cultural Heritage Multimedia Data through Digital Watermarking Techniques.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

1999
Regularization of optic flow estimates by means of weighted vector median filtering.
IEEE Trans. Image Processing, 1999

A new possibilistic clustering algorithm for line detection in real world imagery.
Pattern Recognition, 1999

Capacity of the watermark channel: how many bits can be hidden within a digital image?
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

DWT-based technique for spatio-frequency masking of digital signatures.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

A Java-based system for remote correction of CRT color distortion.
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999

Optimum Decoding of Non-additive Full Frame DFT Watermarks.
Proceedings of the Information Hiding, Third International Workshop, 1999

Enforcement of Copyright Laws for Multimedia through Blind, Detectable, Reversible Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Exploiting the Cross-Correlation of RGB-Channels for Robust Watermarking of Color Images.
Proceedings of the 1999 International Conference on Image Processing, 1999

Electronic Copyright Management Systems: Requirements, Players and Technologies.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
On the computational complexity of multivariate median filters.
Signal Processing, 1998

A DCT-domain system for robust image watermarking.
Signal Processing, 1998

Copyright protection of digital images by embedded unperceivable marks.
Image Vision Comput., 1998

Mask Building for Perceptually Hiding Frequency Embedded Watermarks.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Statistical modelling of full frame DCT coefficients.
Proceedings of the 9th European Signal Processing Conference, 1998

A M.A.P. identification criterion for DCT-based watermarking.
Proceedings of the 9th European Signal Processing Conference, 1998

1997
A fast algorithm for 1-norm vector median filtering.
IEEE Trans. Image Processing, 1997

Colour-based detection of defects on chicken meat.
Image Vision Comput., 1997

DCT-Based Watermark Recovering Without Resorting to the Uncorrupted Original Image.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Using A Wavelet-Based Fractal Feature to Improve Texture Discrimination on SAR Images.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Integration of Spatio-Temporal Information for Motion Detection by Means of Fuzzy Reasoning.
Proceedings of the Image Analysis and Processing, 9th International Conference, 1997

1996
Comments on "A possibilistic approach to clustering".
IEEE Trans. Fuzzy Systems, 1996

Unsupervised detection of straight lines through possibilistic clustering.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Adaptively weighted vector-median filters for motion-fields smoothing.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

A fuzzy expert system for low level image segmentation.
Proceedings of the 8th European Signal Processing Conference, 1996

1995
An intelligent perception system for food quality inspection using color analysis.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

Optimum linear approximation of the Euclidean norm to speed up vector median filtering.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

A Vision System for Automatic Inspection of Meat Quality.
Proceedings of the Image Analysis and Processing, 8th International Conference, 1995

1994
Dual-channel iterative even-median filter.
Pattern Recognition Letters, 1994


  Loading...