Visual Information Processing and Protection Group

Journal Publications

2022

L. Li, W. Zhang, M. Barni
Covert Task Embedding: Turning a DNN into an Insider Agent Leaking out Private Information, IEEE Transactions on Neural Networks and Learning Systems, 10.1109/TNNLS.2022.3216010, IEEE Early Access
W. Guo, B. Tondi, M. Barni
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences, IEEE Open Journal on Signal Processing, vol. 3, pp. 261-287, July 2022, 10.1109/OJSP.2022.3190213
J. Wang, B. Tondi, M. Barni
An Eyes-Based Siamese Neural Network for the Detection of GAN-Generated Face Images, Front. Sig. Proc. 2:918725, (2022). doi: 10.3389/frsip.2022.918725
W. Tang, B. Li, M. Barni, J. Li and J. Huang
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge, IEEE Transactions on Circuits and Systems for Video Technology, September 2021, doi: 10.1109/TCSVT.2021.3115600.

2021

Y. Li, B. Tondi, M. Barni
Spread-Transform Dither Modulation Watermarking of Deep Neural Network, Journal of Information Security and Applications, vol. 63, December 2021, https://doi.org/10.1016/j.jisa.2021.103004
Y. Niu, B. Tondi, Y. Zhao, R. Ni, M. Barni
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5397-5412, November 2021, DOI: 10.1109/TIFS.2021.3129654
Y. Li, H. Wang, M. Barni
A Survey of Deep Neural Network Watermarking Techniques, Neurocomputing, vol. 461, October 2021, pp. 171-193, https://doi.org/10.1016/j.neucom.2021.07.051.
M. Barni, R. Donida Labati, A. Genovese, V. Piuri, F. Scotti
Iris Deidentification with High Visual Realism for Privacy Protection in Websites and Social Networks, IEEE Access, vol. 9, pp. 131995 – 132010, September 2021, DOI: 10.1109/ACCESS.2021.3114588
A. Ferreira, N. Purnekar, M. Barni
Ensembling Shallow Siamese Neural Network Architectures for Printed Documents Verification in Data-Scarcity Scenarios, IEEE Access, vol. 9, pp. 133924 – 133939, Sept. 2021, DOI: 10.1109/ACCESS.2021.3110297
P. Addesso, M. Barni, M. Di Mauro, V. Matta
Adversarial Kendall’s Model Towards Containment of Distributed Cyber-Threats, IEEE Transactions on Information Forensics and Security, vol. 16, pp 3604-3619, May 2021, doi: 10.1109/TIFS.2021.3082327
A. Ferreira, E. Nowroozi, M. Barni
VIPPrint: Validating Synthetic Images Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents, Journal of Imaging, 2021, vol. 7, no. 3, 50, https://doi.org/ 10.3390/jimaging7030050.
W. Tang, B. Li, M. Barni, J. Li, J. Huang
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning, IEEE Transactions on Information Forensics and Security, vol. 16, 2021, pp. 952-967, doi: 10.1109/TIFS.2020.3025438. 
M. Barni, Q-T. Phan, B. Tondi
Copy Move Source-Target Disambiguation through Multi-Branch CNNs, IEEE Transactions on Information Forensics and Security, vol. 16, 2021, pp. 1825-1840, doi: 10.1109/TIFS.2020.3045903
Source Code released here.
W. Guo, B. Tondi, M. Barni
A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification, Pattern Recognition Letters, vol. 144, April 2021, Pages 61-67, https://doi.org/10.1016/j.patrec.2021.01.009

2020

Y. Niu, B. Tondi, Y. Zhao, M. Barni
Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN, IEEE Signal Processing Letters, vol. 27, pp. 191-195, 2020. DOI: 10.1109/LSP.2019.2962997
M. Barni, E. Nowroozi, B. Tondi
Improving the Security of Image Manipulation Detection through One-and-a-half-class Multiple Classification, Multimedia Tools and Applications, 79, pp. 2383–2408, 2020. DOI: 10.1007/s11042-019-08425-z
B. Zhang, B. Tondi, M. Barni
Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability, Computer Vision and Image Understanding, vol. 197-198, August 2020, DOI 10.1016/j.cviu.2020.102988
B. Zhang, B.Tondi, X. Lv, M. Barni
Challenging the adversarial robustness of DNNs based on error correcting output codes, Journal of Security and Communication Networks, November 2020
X.Shi, B. Tondi, B.Li, M.Barni,
CNN-based Steganalysis and Parametric Adversarial Embedding: a Game-Theoretic Framework, Signal Processing: Image Communication, Elsevier, vol. 89, November 2020.

2019

Y. Huang, B. Li, M. Barni, J. Huang
Identification of VoIP Speech with Multiple Domain Deep Features, IEEE Transactions on Information Forensics and Security, vol. 15, December 2019, pp. 2253-2267, DOI: 10.1109/TIFS. 2019.2960635
Y. Niu, B. Tondi, Y. Zhao, M. Barni
Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNNIEEE Signal Processing Letters, December 2019
D. Vázquez-Padín, M. Fontani, F. Pérez-Gonzàlez, D. Shullani, A. Piva, M. Barni
Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint, IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1815-1830, November 2019. DOI: 10.1109/TIFS.2019.2951313
B. Tondi, N. Merhav, M. Barni
Detection Games Under Fully Active AdversariesEntropy 2019, 21, 23. 
M.Barni, E. Nowroozi, B. Tondi,
Improving the Security of Image Manipulation Detection through One-and-a-half-class Multiple Classification, Multimedia Tools and Applications, Springer, 2019.
Z. Chen, B. Tondi, X. Li, R. Ni, Y. Zhao, M. Barni
Secure Detection of Image Manipulation by means of Random Feature SelectionIEEE Transactions on Information Forensics and Security, Vol 14, Issue 9, September 2019.
W. Tang, B. Li, S. Tan, M. Barni, J. Huang
CNN-based Adversarial Embedding for Image Steganography, a IEEE Trans. on Information Forensics and Security, vol. 14, no. 8, pp. 2074 – 2087, August 2019, DOI: 10.1109/TIFS.2019.2891237
M. Barni, G. Droandi, R. Lazzeretti, T. Pignata
SEMBA: SEcure Multi-Biometric Authentication, IET Biometrics, vol. 8,. No. 6, pp. 411- 421, June 2019

2018

M. Barni, H. Santoyo Garcia, B. Tondi.
An Improved Statistic for the Pooled Triangle Test against PRNU-Copy AttackIEEE Signal Processing Letters, Vol. 25, Issue 10 Oct 2018.
M. Barni, B. Tondi.
Adversarial Source Identification Game with Corrupted TrainingIEEE Transactions on Information Theory, Vol. 64, No. 5, May 2018.
A. Abrardo, M. Barni, K. Kallas, B. Tondi.
A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor NetworksInformation Fusion Journal, Elsevier, Vol.40, March 2018, Pages 101–111.

2017

Y. Luo, S-C. S. Cheung, R. Lazzeretti, T. Pignata, Mauro Barni
Anonymous Subject Identification and Privacy Information Management in Video Surveillance, International Journal of Information Security, Springer, 2017, pp 1-18, DOI: 10.1007/s10207-017-0380-2
M. Barni, L. Bondi, N. Bonettini, P. Bestagini, A. Costanzo, M. Maggini, B. Tondi, S. Tubaro,
Aligned and non-aligned double JPEG detection using convolutional neural networksJournal of Visual Communication and Image Representation, Elsevier, Vol. 49, 2017, pp 153-163.
B. Tondi, P. Comesana-Alfaro, F. Perez-Gonzalez, M. Barni
Smart Detection of line Search Oracle AttacksIEEE Transactions on Information Forensics and Security, Vol. 12,  Issue 3 , pp 588 - 603, DOI: 10.1109/TIFS.2016.2624280, March 2017

2016

R. Lazzeretti, T. Pignata, M. Barni
Piecewise Function Approximation with Private Data, IEEE Transactions on Information Forensics and Security, vol. 11, n. 3, pp. 642-657, March 2016.
A. Oliveira, P. Ferrara, A. De Rosa, A. Piva, M. Barni, S. Goldenstein, Z. Dias, A. Rocha
Multiple Parenting Phylogeny Relationships in Digital Images, IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, February 2016, pp. 328-343, doi 10.1109/TIFS.2015.2493989.
M. Barni, B. Tondi
Source Distinguishability Under Distortion-Limited Attack: an Optimal Transport PerspectiveIEEE Transactions on Information Forensics and Security, vol. 11, no. 10, 2016, pp. 2145-2159, doi:10.1109/TIFS.2016.2570739.
A. Abrardo, M. Barni, K. Kallas, B. Tondi
A Game-Theoretic Framework for Decision Fusion in the Presence of ByzantinesIEEE Transactions on Information Forensics and Security, vol. 11, no. 6, 2016, pp. 1333-1345, doi:10.1109/TIFS.2016.2526963.

2015

M. Barni, G. Droandi, R. Lazzeretti
Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processingIEEE Signal Processing Magazine, vol. 32, no. 5, pp. 66 - 76, 2015

2014

M. Barni, B. Tondi
Binary Hypothesis Testing Game with Training Data, IEEE Transactions on Information Theory, vol. 60, no. 8, 2014, pp. 4848-4866, doi:10.1109/TIT.2014.2325571.
A. Costanzo, I. Amerini, R. Caldelli, M. Barni
Forensic analysis of SIFT keypoint removal and injectionIEEE Transactions on Information Forensics and Security, Vol. 9, No. 9, pp. 1450 - 1464, IEEE, 2014
D. Dupplaw, M. Matthews, R. Johansson, G. Boato, A. Costanzo, M, Fontani, E. Minack, E. Demidova, R. Blanco, T. Griffiths and others
Information extraction from multimedia web documents: an open-source platform and testbedInternational Journal of Multimedia Information Retrieval, Vol. 3, No. 2, pp. 97 - 111, Springer, 2014.

2013

M. Fontani, T. Bianchi, A. De Rosa, A. Piva, M. Barni
A Forensic Tool for Investigating Image ForgeriesInternational Journal of Digital Crime and Forensics, vol. 5, no. 4, 2013, pp. 15-33, doi:10.4018/ijdcf.2013100102.
I. Amerini, M. Barni, R. Caldelli, A. Costanzo
Counter-forensics of SIFT-based copy-move detection by means of keypoint classificationJournal on Image and Video Processing, 2013(1):18, EURASIP, 2013.
I. Amerini, M. Barni, R. Caldelli, A. Costanzo
Removal and injection of keypoints for SIFT-based copy-move counter-forensicsJournal on Information Security, 2013:8, EURASIP, 2013.

M. Barni, M. Fontani, B. Tondi
A Universal Attack Against Histogram-Based Image ForensicsInternational Journal of Digital Crime and Forensics (IJDCF), IGI Global, USA, Vol. 5, no. 3, 2013.
M. Barni, B. Tondi
The Source Identification Game: an Information Theoretic Perspective, IEEE Transactions on Information Forensics and Security, Vol. 8, no. 3, pp 450-463, March 2013.
M. Fontani, T. Bianchi, A. De Rosa, A. Piva, M. Barni
A Framework for Decision Fusion in Image Forensics based on Dempster-Shafer Theory of EvidenceIEEE Transactions on Information Forensics and Security, Vol. 8, no. 4, pp. 593-607, 2013.

2012

S. Milani, M. Fontani, P. Bestagini, M. Barni, A. Piva, M. Tagliasacchi, S. Tubaro
An Overview on Video ForensicsAPSIPA Trans. on Signal and Information Processing, 1, e2, doi: http://dx.doi.org/10.1017/ATSIP.2012.2
M. Barni, A. Costanzo,
A Fuzzy Approach to Deal with Uncertainty in Image ForensicsSignal Processing: Image Communication 27 (2012), pp. 998-1010, DOI information: 10.1016/j.image.2012.07.006
S. Kamdem Kuiteing, M.Barni, A. Abrardo, G. Coluccia, E. Magli
Progressive compressed sensing and reconstruction of multidimensional signals using hybrid transform/prediction sparsity model,
IEEE Journal on Emergin and Selected Topics in Circuits and Systems, Aug. 2012
K. Kim, M. Barni, D. Prattichizzo, Hong Z. Tan,
Visuohaptic Discrimination of 3D Gross Shape, Seeing Perceiving. 2012;25(3-4):351-64. doi: 10.1163/187847612X629937. Epub 2012 Mar 27.

2011

M. Barni, P. Failla, R. Lazzeretti, A-R. Sadeghi, T. Schneider,
Privacy-Preserving ECG Classification with Branching Programs and Neural NetworksIEEE Trans. on Information Forensics and Security, vol. 6, no. 2, June 2011, pp. 452-468.

2010

K. Kim, M. Barni, H. Z. Tan,
Roughness-Adaptive 3D Watermarking Based on Masking Effect of Surface Roughness, IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, December 2010, pp. 721-733.
P. Comesana, N. Merhav, M. Barni,
Asymptotically Optimum Universal Watermark Embedding and Detection in the High SNR RegimeIEEE Transactions on Information Theory, vol. 56, no. 6, June 2010, pp. 2804-2815.
A. Abrardo, M. Barni, E. Magli, F. Nencini,
Error-resilient and low-complexity onboard lossless compression of hyperspectral images by means of distributed source codingIEEE Transactions ont Geoscience and Remote Sensing, vol. 48, no. 4, Part:1, April 2010, pp. 1892-1904.
T. Bianchi, A. Piva, M. Barni,
Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted SignalsIEEE Transactions on Information Forensics and Security, vol. 5, no. 1, March 2010, pp. 180-187.
A. D’Angelo, L. Zhaoping, M. Barni,
A full reference quality metric for geometrically distorted images, IEEE Transactions on Image Processing, vol. 19, no. 4, April 2010, pp. 867-881.

2009

G. Cancelli, M. Barni,
MPSteg-color: data hiding through redundant basis decompositionIEEE Transactions on Information Forensics and Security, vol. 4 no. 3, September 2009, pp. 346-358.

T. Bianchi, A. Piva, M. Barni,

Implementing the Discrete Fourier Transform in the encrypted domainIEEE Transactions on Information Forensics and Security, vol. 4 no. 1, March 2009, pp. 86-97

T. Bianchi, A. Piva, M. Barni,
Encrypted Domain DCT based on Homomorphic CryptosystemsEURASIP Journal on Information Security, vol. 2009, Article ID 716357, 12 pages, 2009, doi:10.1155/2009/716357.

2008

A. D'Angelo, M. Barni, and N. Merhav,
Stochastic Image Warping for Improved Watermark DesynchronizationEURASIP Journal on Information Security, vol. 2008, Article ID 345184, 14 pages, 2008. doi:10.1155/2008/345184.

2007

C. Orlandi, A. Piva, and M. Barni,
Oblivious Neural Network Computing via Homomorphic EncryptionEURASIP Journal on Information Security, vol. 2007, Article ID 37343, 11 pages, 2007. doi:10.1155/2007/37343
A. Piva and M. Barni,
Design and Analysis of the First BOWS ContestEURASIP Journal on Information Security, vol. 2007, Article ID 98684, 8 pages, 2007. doi:10.1155/2007/98684
Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni,
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal ProcessingEURASIP Journal on Information Security, vol. 2007, Article ID 78943, 20 pages, 2007. doi:10.1155/2007/78943
D. Prattichizzo, M. Barni, G. Menegaz, A. Formaglio, H. Z. Tan, S. Choi,
Perceptual issues in haptic digital watermarkingIEEE Multimedia Magazine, vol. 14, no.3, July/September 2007, pp. 84-91.
E. Magli, M. Barni, A. Abrardo, M. Grangetto,
Distributed Source Coding Techniques for Lossless Compression of Hyperspectral ImagesEURASIP Journal on Advances in Signal Processing, vol. 2007, Article ID 45493, 13 pages, 2007
M. Corsini, E. Drelie Gelasca, T. Ebrahimi, M. Barni,
Watermarked 3D Mesh Quality Assessment, IEEE Transactions on Multimedia, vol. 9. no. 2, February 2007, pp. 247-256

2006

R. Caldelli, F. Filippini, M. Barni,
Joint near-lossless compression and watermarking of still images for authentication and tamper localization, Signal Processing: Image Communication, Vol. 21, no. 10, November 2006, pp. 890-903
A. Abrardo, M. Barni, F. Perez-Gonzalez, C. Mosquera,
Improving the Performance of RDM Watermarking by Means of Trellis Coded QuantizationIEEE Proceedings on Information Security, vol. 153, no. 3, September 2006, pp. 107-114.

2005

F. Perez-Gonzalez, C. Mosquera, M. Barni, A. Abrardo,
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks,IEEE Trans. on Signal Processing, vol. 53, no. 10, Part 2, pp. 3960-3975, October 2005.
A. Piva, M. Barni, F. Bartolini, A. De Rosa,
Data hiding technologies for digital radiographiesIEEE Proc. on Vision, Image & Signal Processing, vol. 152, no. 5, pp. 604-610, October 2005.
M. Barni, A. Pelagotti, A. Piva,
Image processing for the analysis and conservation of paintings: opportunities and challenges, IEEE Signal Processing Magazine, vol. 22, no. 5, pp. 141-144, September 2005
M. Barni,
Effectiveness of exhaustive search ant template matching against watermark de-synchronizationIEEE Signal Processing Letters, vol. 12, no. 2, February 2005, pp. 158-161.
A. Abrardo, M. Barni,
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper codingIEEE Trans. on Signal Processing, vol. 53, no.2, February 2005, pp. 824-833.
M.Barni, F.Bartolini, N.Checcacci,
Watermarking of MPEG-4 video objects, IEEE Transactions on Multimedia, vol. 7, no. 1, February 2005, pp. 23-32. 

2004

F. Bartolini, M. Barni, A. Piva,
Performance analysis of ST-DM watermarking in presence of non-additive attacksIEEE Trans. on Signal Processing, vol. 52, no. 10, October 2004, pp. 2965-2974.
M.Barni, F. Bartolini,
Data hiding for fighting piracyIEEE Signal Processing Magazine, vol. 21, no. 2, March 2004, pp. 28-39.

2003

M.Barni, F.Bartolini, T.Furon
A general framework for robust watermarking securitySignal Processing, vol. 83, no. 10, pp. 2069-2084, October 2003
V. Cappellini, M. Barni, M. Corsini, A. De Rosa, A. Piva,
ArtShop: an art-oriented image-processing tool for cultural heritage applicationsJ. Visual. Comput. Animat. 2003; 14, pp. 1-10.
M.Barni, F.Bartolini, A.De Rosa, A. Piva,
Optimum decoding and detection of multiplicative watermarksIEEE Trans. on Signal Processing, vol. 51, no. 4, April 2003, pp. 1118-1123.

© Copyright 2023 VIPP Group - All Rights Reserved

Designed with Mobirise free site templates