Roberto Caldelli

According to our database1, Roberto Caldelli
  • authored at least 59 papers between 1999 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Image Origin Classification Based on Social Network Provenance.
IEEE Trans. Information Forensics and Security, 2017

Smartphone Fingerprinting Combining Features of On-Board Sensors.
IEEE Trans. Information Forensics and Security, 2017

Dealing with video source identification in social networks.
Sig. Proc.: Image Comm., 2017

Media trustworthiness verification and event assessment through an integrated framework: a case-study.
Multimedia Tools Appl., 2017

Localization of JPEG double compression through multi-domain convolutional neural networks.
CoRR, 2017

Tracing images back to their social network of origin: A CNN-based approach.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Detecting adversarial example attacks to deep neural networks.
Proceedings of the 15th International Workshop on Content-Based Multimedia Indexing, 2017

2016
Robust smartphone fingerprint by mixing device sensors features for mobile strong authentication.
Proceedings of the Media Watermarking, 2016

2015
Acquisition source identification through a blind image classification.
IET Image Processing, 2015

SIFT match removal and keypoint preservation through dominant orientation shift.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Forensic Analysis of SIFT Keypoint Removal and Injection.
IEEE Trans. Information Forensics and Security, 2014

Blind image clustering based on the Normalized Cuts criterion for camera identification.
Sig. Proc.: Image Comm., 2014

Splicing forgeries localization through the use of first digit features.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Copy-move forgery detection from printed images.
Proceedings of the Media Watermarking, 2014

Exploiting perceptual quality issues in countering SIFT-based Forensic methods.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Copy-move forgery detection and localization by means of robust clustering with J-Linkage.
Sig. Proc.: Image Comm., 2013

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification.
EURASIP J. Image and Video Processing, 2013

Removal and injection of keypoints for SIFT-based copy-move counter-forensics.
EURASIP J. Information Security, 2013

SIFT keypoint removal and injection for countering matching-based image forensics.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
On the effectiveness of local warping against SIFT-based copy-move detection.
Proceedings of the 5th International Symposium on Communications, 2012

2011
A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery.
IEEE Trans. Information Forensics and Security, 2011

An analysis on attacker actions in fingerprint-copy attack in source camera identification.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

2010
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication.
Proceedings of the Handbook of Research on Computational Forensics, 2010

A DVB-MHP web browser to pursue convergence between Digital Terrestrial Television and Internet.
Multimedia Tools Appl., 2010

Electronic Voting by Means of Digital Terrestrial Television The Infrastructure, Security Issues and a Real Test-bed.
IJEA, 2010

A DFT-Based Analysis to Discern Between Camera and Scanned Images.
IJDCF, 2010

Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification.
IJDCF, 2010

Reversible Watermarking Techniques: An Overview and a Classification.
EURASIP J. Information Security, 2010

Fast image clustering of unknown source images.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Reversible watermarking for image integrity verification in hierarchical PACS.
Proceedings of the Multimedia and Security Workshop, 2010

Geometric tampering estimation by means of a SIFT-based forensic analysis.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Integration between Digital Terrestrial Television and Internet by Means of a DVB-MHP Web Browser.
Proceedings of the WEBIST 2009, 2009

Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed.
Proceedings of the Software Services for e-Business and e-Society, 2009

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis.
Proceedings of the Forensics in Telecommunications, 2009

2007
Detection of malevolent changes in digital video for forensic applications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

2006
Joint near-lossless compression and watermarking of still images for authentication and tamper localization.
Sig. Proc.: Image Comm., 2006

2005
Self Recovery Authentication Of Images In The Dwt Domain.
Int. J. Image Graphics, 2005

Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Effectiveness of ST-DM Watermarking Against Intra-video Collusion.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Labelling and Authentication for Medical Imaging Through Data Hiding.
Proceedings of the From Data and Information Analysis to Knowledge Engineering, 2005

2004
An Algorithm for Motion Parameter Direct Estimate.
EURASIP J. Adv. Sig. Proc., 2004

Near-lossless image authentication transparent to near-lossless coding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Data hiding for error concealment in H.264/AVC.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Joint near-lossless watermarking and compression for the authentication of remote sensing images.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

2003
A New Self-Recovery Technique for Image Authentication.
Proceedings of the Visual Content Processing and Representation, 2003

Standard Metadata Embedding in a Digital Image.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Metadata hiding tightly binding information to content.
Proceedings of the 2002 International Conference on Dublin Core and Metadata Applications, 2002

2001
Fast optimum decoding for nonadditive readable watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

MPEG-4 Video Data Protection for Internet Distribution.
Proceedings of the Evolutionary Trends of the Internet, 2001

Direct estimate of motion parameters by means of Markov random fields.
Proceedings of the 2001 International Conference on Image Processing, 2001

Electronic IPR (eIPR) Management Technologies.
ICHIM (2), 2001

Robust Frame-Based Watermarking For Digital Video.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
A DWT-Based Object Watermarking System for MPEG-4 Video Streams.
Proceedings of the 2000 International Conference on Image Processing, 2000

Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain.
Proceedings of the 2000 International Conference on Image Processing, 2000

A robust frame-based technique for video watermarking.
Proceedings of the 10th European Signal Processing Conference, 2000

Performance comparison of adaptively weighted scalar and vector median filtering for postprocessing of optical flow fields.
Proceedings of the Nonlinear Image Processing XI, 2000

1999
Regularization of optic flow estimates by means of weighted vector median filtering.
IEEE Trans. Image Processing, 1999


  Loading...