html templates

Visual Information Processing and Protection Group

Conferences

2020

W. Li, B. Tondi, R.Ni, M. Barni
Increased-confidence adversarial examples for improved transferability of counter-forensic attacks, submitted to IEEE International Conference on Image Processing (ICIP 2020).
M. Barni, E. Nowroozi, B. Tondi, B Zhang
Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples, IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP, May 5-9, 2020, Barcelona, Spain. 

2019

M. Barni, E.Nowroozi, K. Kallas, B. Tondi
On the transferability of adversarial examples against CNN-based image forensicsInternational Conference on Acoustics,Speech, and Signal Processing ICASSP, May 11-17, 2019, Brighton, UK
Z. Chen, B. Tondi, X. Li, R. Ni, Y. Zhao, M. Barni
Secure Detection of Image Manipulation by means of Random Feature Selection, IEEE Transactions on Information Forensics and Security, Vol. 14, No. 9, pp 2454--2469, 2019.
M. Barni, K. Kallas, B. Tondi
A new Backdoor Attack in CNNs by training set corruption without label poisoning, IEEE International Conference on Image Processing (ICIP 2019), Taipei, Taiwan, September 22-25, 2019
A Bhalerao, K Kallas, B. Tondi, M. Barni
Luminance-based video backdoor attack against anti-spoofing rebroadcast detection, IEEE 21st International Workshop on Multimedia Signal Processing (MMSP 2019), Kuala Lumpur, Malaysia, September 27-29, 2019. 
M. Barni, D Huang, B.Li, B. Tondi
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach, IEEE International Workshop on Information Forensics and Security (WIFS), December 9-12, 2019, Delft, Netherland

2018

M. Barni, M. Nakano-Miyatake, H. Santoyo Garcia, B. Tondi
Countering the Pooled Triangle Test for PRNU-based camera identificationIEEE International Workshop on Information Forensics and Security (WIFS), 11 - 13 December 2018, Hong Kong
M. Barni, M. C. Stamm, B. Tondi
Adversarial Multimedia Forensics: Overview and Challenges AheadEuropean Signal Processing Conference (EUSIPCO), Rome, Italy, September 2018
M. Barni, A. Costanzo, E. Nowroozi, B. Tondi
CNN-based detection of generic contrast adjustment with JPEG post-processingIEEE International Conference on Image Processing October 7-10, 2018, Athens, Greece. Source code released here.
M. Barni, E. Nowroozi, B. Tondi
Detection of adaptive histogram equalization robust against JPEG compressionIWBF 2018, 6th IAPR/IEEE International Workshop on Biometrics and Forensics June 7, 8 2018, Sassari, Italy
A. Abrardo, M. Barni, K. Kallas,  B. Tondi
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Honolulu, Hawaii, November 2018
M. Barni, G. Droandi, R. Lazzeretti
SEMBA: SEcure Multi-Biometric AuthenticationIEEE CNS Conference 2018

2017

Z. Chen, B. Tondi, X. Li, R. Ni, Y. Zhao, M. Barni
A gradient-based pixel-domain attack against SVM detection of global image manipulations, IEEE International Workshop on Information Forensics and Security (WIFS) 2017, 4-7 December, 2017, Rennes, France
M. Barni, B. Tondi
Threat Models and Games for Adversarial Multimedia Forensics, Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 6-10 June, 2017, Bucharest, Romania
A. Abrardo, M. Barni, K. Kallas, B. Tondi
A Message Passing Approach for Decision Fusion of Hidden-Markov observations in the presence of Synchronized Attacks in Sensor Networks, MMEDIA 2017: The Ninth International Conference on Advances in Multimedia , 23-27 April, 2017, Venezia, Italy
M. Barni, E. Nowroozi, B. Tondi
Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samplesEUSIPCO17, European Signal Processing Conference, 28 August- 2 September, 2017, Kos Island, Greece

2016

A. Costanzo, M. Barni
Detection of double AVC/HEVC encoding, Proceedings of the IEEE 24th European Signal Processing Conference (EUSIPCO), pp. 2245 - 2249, 2016
M. Barni, Z. Chen, B. Tondi
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harderWIFS'16, IEEE International Workshop on Information Forensics and Security (WIFS), 4-7 December, 2016, Abu Dhabi, UAE
K. Kallas, B. Tondi, R.Lazzeretti, M. Barni
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach, 2016 Conference on Decision and Game Theory for Security (GameSec), 2-4 November, 2016, New York, USA

2015

B. Tondi, M. Barni, N. Merhav
Detection Games with a Fully Active AttackerWIFS'15, IEEE International Workshop on Information Forensics and Security (WIFS), 16-19 Nov. 2015, Rome, Italy
B. Tondi, P. Comesana Alfaro, F. Perez-Gonzalez, M. Barni
The Effectiveness of the Meta-Detection for Countering Oracle Attacks in WatermarkingWIFS'15, IEEE International Workshop on Information Forensics and Security (WIFS), 16-19 Nov. 2015, Rome, Italy
R. Caldelli, I. Amerini, A. Costanzo
SIFT match removal and keypoint preservation through dominant orientation shift, IEEE 23rd European Signal Processing Conference (EUSIPCO), PP. 2062 - 2066, 2015
G. Droandi
Non-interactive privacy preserving protocol for biometric recognition based on somewhat homomorphic encryptionProc. of the 14th European Conference on Cyber Warfare and Security (ECCWS 2015), Academic Conferences Limited, p. 355, 2015
G. Droandi, R. Lazzeretti
SHE based non interactive privacy preserving biometric authentication protocolsIEEE 9th International Symposium on Intelligent Signal Processing (WISP), Siena, Italy, May 2015.

2014

A. Abrardo, M. Barni, K. Kallas, B. Tondi
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approachProc.of CDC 2014, IEEE 53rd Annual Conference on Decision and Control (CDC), 15-17 Dec. 2014, Los Angeles, CA
M. Barni, B.Tondi
Source Distinguishability under corrupted trainingProc. of WIFS'14, IEEE International Workshop on Information Forensics and Security, 3-5
December 2014, Atlanta, Georgia (USA).
M. Barni, M.Fontani, B. Tondi
Universal Counterforensics of Multiple Compressed JPEG ImagesIWDW 2014, The 13th International Workshop on Digital-forensics and Watermarking, October 01-04, 2014, Taipei, Taiwan. 
I. Amerini, F. Battisti, R. Caldelli, M. Carli, A. Costanzo
Exploiting perceptual quality issues in countering SIFT-based forensic methods2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2664 - 2668
S. Kamdem Kuiteing, M. Barni
Iterative Compressive Sampling for Hyperspectral Images via Source SeparationIS&T/SPIE Electronic Imaging, 2-6 February 2014, S. Francisco (USA).
M. Fontani, A. Bonchi, A. Piva, M. Barni
Countering anti-forensics by means of data fusionProceedings of SPIE Electronic Imaging conference, 2-6 February 2014, S. Francisco (USA). Conference slideshow.
F. Perez-Gonzalez, P. Comesana Alfaro, M. Barni, B. Tondi
Are you threatening me?: towards smart detectors in watermarkingIS&T/SPIE Electronic Imaging 2014, 2-6 February 2014, San Francisco, California, United States
A. Gironi, M. Fontani, T. Bianchi, A. Piva, M. Barni
A video forensic technique for detecting frame deletion and insertion, Proceedings of ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing, May 2014

2013

I. Amerini, M. Barni, R. Caldelli, A. Costanzo
SIFT keypoint removal and injection for countering matching-based image forensicsProceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC), ACM, 2013.
A. Melloni, P. Bestagini, A. Costanzo, M. Barni, M. Tagliasacchi, S. Tubaro
Attacking image classification based on Bag-of-Visual WordsProceedings of the International Workshop on Information Forensics and Security (WIFS), 2013.
M. Fontani, E. Argones Rua, C. Troncoso, M. Barni
The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background KnowledgeProc. of WIFS'13, IEEE International Workshop on Information Forensics and Security, 18-21 November 2013, Guangzhou, China. Conference Slideshow.
T. Bianchi, A. De Rosa, M. Fontani, G. Rocciolo, A. Piva
Detection and Classification of Double Compressed MP3 Audio TracksProceedings of the First ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA, 2013, IH& MM- Sec’13, pp. 159-164, ACM. Conference slideshow.
G. Labartino, T. Bianchi, A. De Rosa, D. Vazquez-Padin, A. Piva, M. Barni
Localization of forgeries in MPEG-2 video through GOP size and DQ analysisProceedings of Multimedia Signal Processing (MMSP), 2013 IEEE 15th International Workshop on, 2013, pp. 494-499. Conference Slideshow.
M. Barni, B. Tondi
Multiple-Observation Hypothesis Testing under Adversarial ConditionsProc. of WIFS'13, IEEE International Workshop on Information Forensics and Security, 18-21 November 2013, Guangzhou, China.
M. Barni, B. Tondi
The Security Margin: a Measure of Source Distinguishability under Adversarial ConditionsProc. of GlobalSip'13, IEEE Global Conference on Signal and Information Processing, 3-5 December 2013, Austin, Texas. Conference poster.
M. Barni, F. Perez Gonzalez
Coping with the enemy: advances in adversary-aware signal processing, Proc. of ICASSP 2013, IEEE International Conference on Acoustic Speech and Signal Processing, 26-31 May 2013, Vancouver, Canada.

2012

M. Barni, B. Tondi
Optimum forensic and counter-forensic strategies for source identification with training dataProc. of WIFS 2012. IEEE Int. Workshop on Information Forensics and Security, Tenerife (ES), Dec. 2012
D. Vázquez-Padín, M. Fontani, T. Bianchi, P. Comesaña, A. Piva, M. Barni
Detection of video double encoding with GOP size estimationProc. of WIFS 2012. IEEE Int. Workshop on Information Forensics and Security, Tenerife (ES), Dec. 2012
T. Pignata, R. Lazzeretti, M. Barni
General Function Evaluation in a STPC Setting via Piecewise Linear ApproximationProc. of WIFS 2012. IEEE Int. Workshop on Information Forensics and Security, Tenerife (ES), Dec. 2012
Y. Luo, T. Pignata, R. Lazzeretti, S-C. Cheung, M. Barni
An Efficient Protocol for Private Iris-Code Matching by Means of Garbled CircuitsProc. of ICIP 2012, Int. Conference on Image Processing, Orlando (USA), September 2012
W. Puech, Z. Erkin, M. Barni, S. Rane, R. L. Lagendijk
Emerging Cryptographic Challenges in Image and Video ProcessingProc. of ICIP 2012, Int. Conference on Image Processing, Orlando (USA), September 2012
R. Caldelli, I. Amerini, L. Ballan, G. Serra, M. Barni, A. Costanzo
On the effectiveness of local warping against SIFT-based copy-move detection, Proc. of International Symposium on Communications, Control and Signal Processing (ISCCSP12), Rome (ITALY), 2012
M. Barni, M. Fontani, B. Tondi
A Universal Technique to Hide Traces of Histogram-Based Image ManipulationsProc. of MMSEC 2012, ACM International Workshop on Multimedia Forensics & Security, Coventry (UK), Sept. 2012
R. Lazzeretti, J. Guajardo, and M. Barni 
Privacy Preserving ECG Quality EvaluationProc. of MMSEC 2012, ACM International Workshop on Multimedia Forensics & Security, Coventry (UK), Sept. 2012
P. Bestagini, M. Fontani, S. Milani, M. Barni, A. Piva, M. Tagliasacchi, S. Tubaro
An Overview on Video ForensicsProc. of EUSIPCO 2012, EURASIP European Signal Processing Conference, Bucharest (RO), Aug. 2012
M. Fontani, M. Barni 
Hiding Traces of Median Filtering in Digital ImagesProc. of EUSIPCO 2012, EURASIP European Signal Processing Conference, Bucharest (RO), Aug. 2012
M. Barni 
A Game Theoretic Approach to Source Identification with Known StatisticsProc. of ICASSP 2012, IEEE International Conference on Acoustic Speech and Signal Processing, Kyoto (JP), 25-30 March 2012
M. Barni, A. Costanzo 
Dealing with Uncertainty in Image Forensics: a Fuzzy Approach, Proc. of ICASSP 2012, IEEE International Conference on Acoustic Speech and Signal Processing, Kyoto (JAPAN), 25-30 March 2012

2011

M. Fontani, T. Bianchi, A. De Rosa, A. Piva M. Barni 
A Dempster-Shafer Framework for Decision Fusion in Image ForensicsProc. of WIFS 2011, IEEE International Workshop on Information Forensics and Security, Foz do Iguaçu (BR), Nov. 29 - Dec. 2, 2011.
M. Fontani, A. Costanzo, M. Barni, T. Bianchi, A. De Rose, A. Piva
Two decision fusion frameworks for image forensicsAnnual GTTI Meeting, 2011
R. Lazzeretti, M. Barni
Division Between Encrypted Integers by Means of Garbled CircuitsProc. of WIFS 2011, IEEE International Workshop on Information Forensics and Security, Foz do Iguaçu (BR), Nov. 29 - Dec. 2, 2011.
S. Kamdem Kuiteng, M. Barni, A. Abrardo, C.M. Carretti, E. Magli, R. Vitulli
A Compressing Sampling Scheme for Iterative Hyperspectral Image ReconstructionProc. of EUSIPCO 2011, EURASIP European Signal Processing Conference, Barcelona (ES), Aug. 2011

2010

M. Barni, J. Guajardo, R. Lazzeretti
Privacy Preserving Evaluation of Signal Quality With Application to ECG AnalysisWIFS 2010 Int. Workshop on Information Forensics and Security, Seattle, USA, December 2010
S. Kamdem Kuiteng, M. Barni, A. Abrardo, C.M. Carretti, E. Magli, R. Vitulli
Compressed Sensing Techniques for Hyperspectral Image Recovery2nd Int. Workshop on On-Board Payload Data Compression - OBPDC, October 2010, CNES, (FR)
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, F. Scotti
A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode TemplatesProceedings of BTAS 2010, IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems, Washington DC, USA, September 27-29, 2010.
P. Failla, M. Barni
Gram–Schmidt Orthogonalization on Encrypted VectorsProceedings of XXI International Tyrrhenian Workshop on Digital Communications – Trustworthy Internet, Ponza (ITALY) 6-8 September 2010.
P. Failla. Y. Sutcu, M. Barni
eSketch: a Privacy-Preserving Fuzzy Commitment Scheme for Authentication using Encrypted BiometricsProceedings of MMSEC 2010, September 2010.
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, F. Scotti
Privacy-Preserving Fingercode AuthenticationProceedings of MMSEC 2010, September 2010.
A. Abrardo, M. Barni, E. Magli
Low-complexity lossy compression of hyperspectral images via informed quantization, Proceedings of ICIP 2010, 17-th IEEE International Conference on Image Processing, 27-29 September 2010, Hong-Kong.
F. Uccheddu, A. De Rosa, A. Piva, M. Barni
Detection of resampled images: performance analysis and practical challengesProceedings of EUSIPCO 2010, XVIII European Signal Processing Conference, 24-27 August, 2010, Aalborg, Denmark.
M. Barni, A. Costanzo, L. Sabatini
Identification of cut & paste tampering by means of double-JPEG detection and image segmentationProceedings of ISCAS 2010, IEEE International Symposium on Circuits and Systems, 30 May – 2 June, 2010, Paris.
A. De Rosa, F. Uccheddu, A. Costanzo, A. Piva, M. Barni
Exploring image dependencies: a new challenge in image forensics, Proceedings Vol 7541, Media Forensics and Security II; 75410X (2010) IS&T/SPIE Electronic Imaging, 2010, San Jose, California, United States
M. Barni, G. Cancelli, A. Esposito
Forensics aided steganalysis of heterogeneous images, Proc. of ICASSP 2010, Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE, DOI: 10.1109/ICASSP.2010.5495494

© Copyright 2020 VIPP Group - All Rights Reserved