Visual Information Processing and Protection Group

Tutorials

External Tutorials

Mauro Barni
GAN fingerprint for active detection/attribution of fake media. Journal on Image and Video Processing, webinar series, 2 November 2023
Mauro Barni
Adversarial examples: threat or  scarecrow, Keynote talk: WIFS 2022, Remote, 16 December 2022.
Mauro Barni
Adversarial examples: 10 years later, Keynote talk: ICFIP 2022, Japan, 26 October 2022.
Mauro Barni
LLR Calibration: What, Why, How. Remote, SemaFor Program, 26 January 2022
Mauro Barni
Ethics and etiquette of publication: some dos and don'ts researchers should be aware of. Auditorium S. Chiara Lab, University of Siena, 30 November 2017
Mauro Barni
Decision fusion with corrupted reports in multi-sensor networks. Invited talk: Nanjing University of Aeronautics and Astronautics (NUAA), 27 October 2017
Mauro Barni
Adversarial signal processing and the hypothesis testing game. Distinguished lecture Series: Hong Kong Baptist University, 23 May 2017
Benedetta Tondi
Adversarial Detection: theoretical foundations and Applications to Multimedia Forensics. Department of Computer Science, University of Innsbruck, 9 March 2017
Mauro Barni
From single object to contextual authentication, Keynote talk: VISIGRAPP 2015, Berlin, 13 March 2015
Mauro Barni
Computing with private data: when cryptography meets signal processing, Keynote talk: 2014 IEEE Workshop on Signal Processing Systems, Belfast, 21 October 2013

General Topics

Benedetta Tondi
Introduction to Game Theory, March 2013. Download slides.
Kassem Kallas
Cognitive Radio Communication and Networking: an Overview, March 2014. Download slides part I and part II.
Kassem Kallas
Attacks and Defenses on Consensus Algorithm for Distributed Networks, March 2013. Download slides.

Image Forensics

Jianwei Fei
From weights to outputs:  embedding watermarks into deep neural networks. February 2022. Download slides.
Benedetta Tondi
Afriat's Test for Detecting Malicious Agents, March 2013. Download slides.
Andrea Costanzo
Counter-Forensic of SIFT Algorithm by Means of Keypoint Removal and Injection, March 2013. Download slides.
Andrea Costanzo
A Fuzzy Approach to Deal With Uncertainty in Image Forensics, October 2012. Download slides.
Andrea Costanzo
Counter-Forensic of SIFT Algorithm by Means of Keypoint Classification: a Copy-Move Scenario, October 2012. Download slides.
Benedetta Tondi
The Method of Types: a Useful Tool for Forensic Analysis, October 2012. Download slides.
Marco Fontani e G. Di Domenico
Universal Counter Forensic Methods for First Order Statistics, September 2012. Download slides.

Signal Processing in Encrypted Domain

Giulia Droandi
SHE-based Non Interactive Privacy Preserving Biometric Authentication Protocol, May 2015. Download slides.
Giulia Droandi
Privacy Preserving Protocol for Iris Recognition based on Somewhat Homomorphic Encryption, March 2014. Download slides.
Giulia Droandi
Batch Somewhat Homomorphic Encryption Over Integers (Italian), December 2013. Download slides.
Tommaso Pignata
Approssimazione Lineare di Funzioni in un Contesto Rispettoso della Privacy (Italian), March 2013. Download slides.
Giulia Droandi
Fully Homomorphic Encryption (Italian), May 2012. Download slides.
Riccardo Lazzeretti
Privacy Preserving (ECG) Signal Quality Evaluation, September 2012. Download slides.

© Copyright 2024 VIPP Group - All Rights Reserved

Mobirise.com