Roberto Caldelli

Orcid: 0000-0003-3471-1196

Affiliations:
  • Universitas Mercatorum, Rome, Italy


According to our database1, Roberto Caldelli authored at least 88 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deepfake Detection without Deepfakes: Generalization via Synthetic Frequency Patterns Injection.
CoRR, 2024

2023
Optical Systems Identification through Rayleigh Backscattering.
Sensors, 2023

On the Generalization of Deep Learning Models in Video Deepfake Detection.
J. Imaging, 2023

Deepfake detection by exploiting surface anomalies: the SurFake approach.
CoRR, 2023

On helping users in writing network slice intents through NLP and User Profiling.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Multimedia Forensics versus disinformation in images and videos: lesson learnt and new challenges.
Proceedings of the 2nd ACM International Workshop on Multimedia AI against Disinformation, 2023

AIMH Lab Approaches for Deepfake Detection.
Proceedings of the Italia Intelligenza Artificiale, 2023

2022
Optical identification using physical unclonable functions.
JOCN, 2022

The Face Deepfake Detection Challenge.
J. Imaging, 2022

Improving the Adversarial Robustness of Neural ODE Image Classifiers by Tuning the Tolerance Parameter.
Inf., 2022

MINTIME: Multi-Identity Size-Invariant Video Deepfake Detection.
CoRR, 2022

Cross-Forgery Analysis of Vision Transformers and CNNs for Deepfake Image Detection.
Proceedings of the MAD@ICMR 2022: Proceedings of the 1st International Workshop on Multimedia AI against Disinformation, Newark, NJ, USA, June 27, 2022

Image Watermarking Backdoor Attacks in CNN-Based Classification Tasks.
Proceedings of the Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, 2022

Tuning Neural ODE Networks to Increase Adversarial Robustness in Image Forensics.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Optical Network Authentication through Rayleigh Backscattering Fingerprints of the Composing Fibers.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Local Moment Driven PVO Based Reversible Data Hiding.
IEEE Signal Process. Lett., 2021

Optical Flow based CNN for detection of unlearnt deepfake manipulations.
Pattern Recognit. Lett., 2021

2020
Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Defending Neural ODE Image Classifiers from Adversarial Attacks with Tolerance Randomization.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

2019
Special issue on Deep Learning in Image and Video Forensics.
Signal Process. Image Commun., 2019

Adversarial image detection in deep neural networks.
Multim. Tools Appl., 2019

Detecting Adversarial Inputs by Looking in the Black Box.
ERCIM News, 2019

Social Network Identification Through Image Classification With CNN.
IEEE Access, 2019

On the Robustness to Adversarial Examples of Neural ODE Image Classifiers.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Exploiting CNN Layer Activations to Improve Adversarial Image Classification.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Deepfake Video Detection through Optical Flow Based CNN.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

Tracking Multiple Image Sharing on Social Networks.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
PRNU-based Image Classification of Origin Social Network with CNN.
Proceedings of the 26th European Signal Processing Conference, 2018

Adversarial Examples Detection in Features Distance Spaces.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

2017
Image Origin Classification Based on Social Network Provenance.
IEEE Trans. Inf. Forensics Secur., 2017

Smartphone Fingerprinting Combining Features of On-Board Sensors.
IEEE Trans. Inf. Forensics Secur., 2017

Dealing with video source identification in social networks.
Signal Process. Image Commun., 2017

Media trustworthiness verification and event assessment through an integrated framework: a case-study.
Multim. Tools Appl., 2017

Tracing images back to their social network of origin: A CNN-based approach.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Detecting adversarial example attacks to deep neural networks.
Proceedings of the 15th International Workshop on Content-Based Multimedia Indexing, 2017

2016
Robust smartphone fingerprint by mixing device sensors features for mobile strong authentication.
Proceedings of the Media Watermarking, 2016

2015
Acquisition source identification through a blind image classification.
IET Image Process., 2015

SIFT match removal and keypoint preservation through dominant orientation shift.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Forensic Analysis of SIFT Keypoint Removal and Injection.
IEEE Trans. Inf. Forensics Secur., 2014

Blind image clustering based on the Normalized Cuts criterion for camera identification.
Signal Process. Image Commun., 2014

Splicing forgeries localization through the use of first digit features.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Copy-move forgery detection from printed images.
Proceedings of the Media Watermarking, 2014

Exploiting perceptual quality issues in countering SIFT-based Forensic methods.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Copy-move forgery detection and localization by means of robust clustering with J-Linkage.
Signal Process. Image Commun., 2013

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification.
EURASIP J. Image Video Process., 2013

Removal and injection of keypoints for SIFT-based copy-move counter-forensics.
EURASIP J. Inf. Secur., 2013

SIFT keypoint removal and injection for countering matching-based image forensics.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
On the effectiveness of local warping against SIFT-based copy-move detection.
Proceedings of the 5th International Symposium on Communications, 2012

2011
A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery.
IEEE Trans. Inf. Forensics Secur., 2011

An analysis on attacker actions in fingerprint-copy attack in source camera identification.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

2010
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication.
Proceedings of the Handbook of Research on Computational Forensics, 2010

A DVB-MHP web browser to pursue convergence between Digital Terrestrial Television and Internet.
Multim. Tools Appl., 2010

Electronic Voting by Means of Digital Terrestrial Television The Infrastructure, Security Issues and a Real Test-bed.
Int. J. E Adopt., 2010

A DFT-Based Analysis to Discern Between Camera and Scanned Images.
Int. J. Digit. Crime Forensics, 2010

Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification.
Int. J. Digit. Crime Forensics, 2010

Reversible Watermarking Techniques: An Overview and a Classification.
EURASIP J. Inf. Secur., 2010

Fast image clustering of unknown source images.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Reversible watermarking for image integrity verification in hierarchical PACS.
Proceedings of the Multimedia and Security Workshop, 2010

Geometric tampering estimation by means of a SIFT-based forensic analysis.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Integration between Digital Terrestrial Television and Internet by Means of a DVB-MHP Web Browser.
Proceedings of the WEBIST 2009, 2009

Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis.
Proceedings of the Forensics in Telecommunications, 2009

2007
Detection of malevolent changes in digital video for forensic applications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Virtual Restoration and Protection of Cultural Heritage Images.
Proceedings of the 15th International Conference on Digital Signal Processing, 2007

2006
Joint near-lossless compression and watermarking of still images for authentication and tamper localization.
Signal Process. Image Commun., 2006

2005
Self Recovery Authentication Of Images In The Dwt Domain.
Int. J. Image Graph., 2005

Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Effectiveness of ST-DM Watermarking Against Intra-video Collusion.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Labelling and Authentication for Medical Imaging Through Data Hiding.
Proceedings of the From Data and Information Analysis to Knowledge Engineering, 2005

2004
An Algorithm for Motion Parameter Direct Estimate.
EURASIP J. Adv. Signal Process., 2004

Near-lossless image authentication transparent to near-lossless coding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Data hiding for error concealment in H.264/AVC.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Joint near-lossless watermarking and compression for the authentication of remote sensing images.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

2003
A New Self-Recovery Technique for Image Authentication.
Proceedings of the Visual Content Processing and Representation, 2003

Standard Metadata Embedding in a Digital Image.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Metadata hiding tightly binding information to content.
Proceedings of the 2002 International Conference on Dublin Core and Metadata Applications, 2002

2001
Fast optimum decoding for nonadditive readable watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

MPEG-4 Video Data Protection for Internet Distribution.
Proceedings of the Evolutionary Trends of the Internet, 2001

Direct estimate of motion parameters by means of Markov random fields.
Proceedings of the 2001 International Conference on Image Processing, 2001

Electronic IPR (eIPR) Management Technologies.
Proceedings of the International Cultural Heritage Informatics Meeting: Proceedings from ICHIM 2001. Politechnico di Milano, Milan, Italy, September 3-7, 2001, 2001

Robust Frame-Based Watermarking For Digital Video.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
A DWT-Based Object Watermarking System for MPEG-4 Video Streams.
Proceedings of the 2000 International Conference on Image Processing, 2000

Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain.
Proceedings of the 2000 International Conference on Image Processing, 2000

A robust frame-based technique for video watermarking.
Proceedings of the 10th European Signal Processing Conference, 2000

Performance comparison of adaptively weighted scalar and vector median filtering for postprocessing of optical flow fields.
Proceedings of the Nonlinear Image Processing XI, 2000

1999
Regularization of optic flow estimates by means of weighted vector median filtering.
IEEE Trans. Image Process., 1999


  Loading...