Mauro Barni
#138,261
Most Influential Person Now
Italian engineer and professor
Mauro Barni 's AcademicInfluence.com Rankings
Mauro Barni engineering Degrees
Engineering
#5055
World Rank
#6294
Historical Rank
Applied Physics
#1377
World Rank
#1406
Historical Rank
Electrical Engineering
#1343
World Rank
#1434
Historical Rank

Download Badge
Engineering
Mauro Barni 's Degrees
- Bachelors Electrical Engineering University of Florence
- Masters Electrical Engineering University of Florence
- PhD Electrical Engineering University of Florence
Why Is Mauro Barni Influential?
(Suggest an Edit or Addition)According to Wikipedia, Mauro Barni is an Italian engineer and professor. He graduated at University of Florence in 1991. In September 1998, he became associate professor at University of Siena, and then full professor. Barni was named Fellow of the Institute of Electrical and Electronics Engineers in 2012 «for contributions to signal and image processing for multimedia security».
Mauro Barni 's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Improved wavelet-based watermarking through pixel-wise masking (2001) (1039)
- A DCT-domain system for robust image watermarking (1998) (809)
- IEEE Transactions on Circuits and Systems for Video Technology information for authors (2018) (491)
- DCT-based watermark recovering without resorting to the uncorrupted original image (1997) (441)
- Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation (2013) (300)
- Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications (2007) (300)
- Comments on "A possibilistic approach to clustering" (1996) (273)
- A new decoder for the optimum recovery of nonadditive watermarks (2001) (209)
- On the Implementation of the Discrete Fourier Transform in the Encrypted Domain (2009) (208)
- An overview on video forensics (2012) (200)
- Privacy-Preserving ECG Classification With Branching Programs and Neural Networks (2011) (189)
- Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing (2007) (189)
- Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals (2010) (186)
- Privacy-preserving fingercode authentication (2010) (181)
- Rational dither modulation: a high-rate data-hiding method invariant to gain attacks (2005) (173)
- Image authentication techniques for surveillance applications (2001) (156)
- Multichannel watermarking of color images (2002) (153)
- Managing Copyright in Open Networks (2002) (146)
- Wavelet-based blind watermarking of 3D models (2004) (143)
- Optimum decoding and detection of multiplicative watermarks (2003) (142)
- Watermarked 3-D Mesh Quality Assessment (2007) (141)
- Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks (2017) (140)
- Secure Evaluation of Private Linear Branching Programs with Medical Applications (2009) (139)
- Adaptively weighted vector-median filters for motion-fields smoothing (1996) (137)
- A general framework for robust watermarking security (2003) (134)
- A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning (2019) (130)
- CNN-Based Adversarial Embedding for Image Steganography (2019) (125)
- A privacy-preserving protocol for neural-network-based computation (2006) (122)
- Image Processing for Virtual Restoration of Artworks (2000) (121)
- Oblivious Neural Network Computing via Homomorphic Encryption (2007) (120)
- Data hiding for fighting piracy (2004) (120)
- DWT-based technique for spatio-frequency masking of digital signatures (1999) (111)
- Capacity of the watermark channel: how many bits can be hidden within a digital image? (1999) (108)
- Watermark embedding: hiding a signal within a cover image (2001) (107)
- Mask building for perceptually hiding frequency embedded watermarks (1998) (107)
- Effectiveness of exhaustive search and template matching against watermark desynchronization (2005) (105)
- Watermarking Systems Engineering (Signal Processing and Communications, 21) (2004) (99)
- A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates (2010) (97)
- A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence (2013) (96)
- Image processing for the analysis and conservation of paintings: opportunities and challenges (2005) (94)
- Capacity of full frame DCT image watermarks (2000) (87)
- Lossless compression of encrypted grey-level and color images (2008) (87)
- A video forensic technique for detecting frame deletion and insertion (2014) (84)
- The Source Identification Game: An Information-Theoretic Perspective (2013) (83)
- Detection of video double encoding with GOP size estimation (2012) (82)
- Document and Image Compression (2006) (81)
- Error-Resilient and Low-Complexity Onboard Lossless Compression of Hyperspectral Images by Means of Distributed Source Coding (2010) (79)
- Fast vector median filter based on Euclidean norm approximation (1994) (78)
- Detection of ±1 LSB steganography based on the amplitude of histogram local extrema (2008) (78)
- Encrypted Domain DCT Based on Homomorphic Cryptosystems (2009) (76)
- Watermarking of MPEG-4 video objects (2005) (75)
- Forensic Analysis of SIFT Keypoint Removal and Injection (2014) (71)
- Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing (2015) (70)
- Detection of malevolent changes in digital video for forensic applications (2007) (67)
- A quasi-Euclidean norm to speed up vector median filtering (2000) (66)
- Copyright protection of digital images by embedded unperceivable marks (1998) (64)
- A universal technique to hide traces of histogram-based image manipulations (2012) (63)
- A Comparative Study of ±1 Steganalyzers (2008) (62)
- What is the future for watermarking? (part I) (2003) (61)
- Objective evaluation of the perceptual quality of 3D watermarking (2005) (59)
- Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding (2005) (58)
- Coping with the enemy: Advances in adversary-aware signal processing (2013) (58)
- Exploiting the cross-correlation of RGB-channels for robust watermarking of color images (1999) (57)
- Exploring image dependencies: a new challenge in image forensics (2010) (57)
- Identification of cut & paste tampering by means of double-JPEG detection and image segmentation (2010) (55)
- Robust watermarking of still images for copyright protection (1997) (52)
- Robust video watermarking for wireless multimedia communications (2000) (48)
- Distributed Source Coding Techniques for Lossless Compression of Hyperspectral Images (2007) (47)
- An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning (2021) (46)
- overview paper An overview on video forensics (2012) (46)
- Near-lossless digital watermarking for copyright protection of remote sensing images (2002) (45)
- Threshold Selection for Correlation-based Watermark Detection (1998) (44)
- Optimum Decoding of Non-additive Full Frame DFT Watermarks (1999) (43)
- A compressive-sensing based watermarking scheme for sparse image tampering identification (2009) (43)
- Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics (2015) (43)
- Colour-based detection of defects on chicken meat (1997) (42)
- Geometric-invariant robust watermarking through constellation matching in the frequency domain (2000) (42)
- Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing (2018) (42)
- A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel (2001) (41)
- Copyright protection of digital images by means of frequency domain watermarking (1998) (40)
- A comparative study of ± steganalyzers (2008) (40)
- A survey of deep neural network watermarking techniques (2021) (40)
- Digital watermarking for copyright protection: a communications perspective (2001) (39)
- Adversarial Multimedia Forensics: Overview and Challenges Ahead (2018) (39)
- Informed watermarking by means of orthogonal and pseudo-random dirty paper coding (2005) (38)
- Performance analysis of ST-DM watermarking in presence of nonadditive attacks (2004) (38)
- eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics (2010) (38)
- Counter-forensics of SIFT-based copy-move detection by means of keypoint classification (2013) (38)
- Hiding traces of median filtering in digital images (2012) (38)
- A fuzzy approach to deal with uncertainty in image forensics (2012) (37)
- Joint near-lossless compression and watermarking of still images for authentication and tamper localization (2006) (36)
- Progressive Compressed Sensing and Reconstruction of Multidimensional Signals Using Hybrid Transform/Prediction Sparsity Model (2012) (36)
- CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis (2020) (36)
- A Full-Reference Quality Metric for Geometrically Distorted Images (2010) (35)
- A M.A.P. identification criterion for DCT-based watermarking (1998) (35)
- Pushing Science into Signal Processing (2005) (33)
- A fast algorithm for 1-norm vector median filtering (1997) (33)
- Efficient privacy-preserving classification of ECG signals (2009) (33)
- Low-complexity predictive lossy compression of hyperspectral and ultraspectral images (2011) (33)
- Forensics aided steganalysis of heterogeneous images (2010) (32)
- Binary Hypothesis Testing Game With Training Data (2013) (32)
- A Dempster-Shafer framework for decision fusion in image forensics (2011) (32)
- ArtShop: an art-oriented image-processing tool for cultural heritage applications (2003) (31)
- Regularization of optic flow estimates by means of weighted vector median filtering (1999) (30)
- On the Transferability of Adversarial Examples against CNN-based Image Forensics (2018) (30)
- Color image watermarking in the Karhunen-Loeve transform domain (2002) (30)
- On the computational complexity of multivariate median filters (1998) (29)
- Multiple Parenting Phylogeny Relationships in Digital Images (2016) (29)
- CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography (2018) (27)
- Copy Move Source-Target Disambiguation Through Multi-Branch CNNs (2019) (26)
- Improving wavelet-based merging of panchromatic and multispectral images by contextual information (2001) (26)
- Localization of forgeries in MPEG-2 video through GOP size and DQ analysis (2013) (26)
- An Information Theoretic Perspective (2004) (25)
- Watermarking-based protection of remote sensing images: requirements and possible solutions (2001) (25)
- An efficient protocol for private iris-code matching by means of garbled circuits (2012) (25)
- Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks (2004) (25)
- Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability (2020) (24)
- Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010) [Book Reviews] (2011) (24)
- Division between encrypted integers by means of Garbled Circuits (2011) (23)
- Electronic copyright management systems: requirements, players and technologies (1999) (23)
- Secure Detection of Image Manipulation by Means of Random Feature Selection (2018) (23)
- MPSteg-color: A New Steganographic Technique for Color Images (2007) (22)
- Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder (2016) (22)
- Multiple parenting identification in image phylogeny (2014) (22)
- Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking (2007) (21)
- THE USE OF DIFFERENT METRICS IN VECTOR MEDIAN FILTERING: APPLICATION TO FINE ARTS AND PAINTINGS (1992) (21)
- GAN generation of synthetic multispectral satellite images (2020) (21)
- Emerging cryptographic challenges in image and video processing (2012) (21)
- SEMBA: SEcure multi-biometric authentication (2018) (21)
- Statistical modelling of full frame DCT coefficients (1998) (21)
- Enforcement of copyright laws for multimedia through blind, detectable, reversible watermarking (1999) (21)
- Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint (2020) (20)
- A Universal Attack Against Histogram-Based Image Forensics (2013) (20)
- Private Computing with Garbled Circuits [Applications Corner] (2013) (20)
- Data hiding technologies for digital radiography (2005) (20)
- Expanding the class of watermark de-synchronization attacks (2007) (19)
- The first BOWS contest: Break Our Watermarking System (2007) (19)
- Roughness-Adaptive 3-D Watermarking Based on Masking Effect of Surface Roughness (2010) (19)
- A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines (2015) (19)
- Spread-Transform Dither Modulation Watermarking of Deep Neural Network (2020) (19)
- On the effectiveness of local warping against SIFT-based copy-move detection (2012) (19)
- What is the future for watermarking? (Part II) (2003) (18)
- Perceptual quality evaluation of geometric distortions in images (2007) (18)
- Improved low-complexity intraband lossless compression of hyperspectral images by means of Slepian-Wolf coding (2005) (18)
- Texture segmentation in remote sensing images by means of packet wavelets and fuzzy clustering (1995) (18)
- Enhancing Privacy in Remote Data Classification (2008) (17)
- dsp Forum - Future of Video Coding and Transmission (2006) (17)
- Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime (2010) (17)
- Implementing the discrete Fourier transform in the encrypted domain (2008) (17)
- Watermarking techniques for electronic delivery of remote sensing images (2001) (17)
- A game theoretic approach to source identification with known statistics (2012) (17)
- A gradient-based pixel-domain attack against SVM detection of global image manipulations (2017) (17)
- Unsupervised fusion for forgery localization exploiting background information (2015) (16)
- Stochastic Image Warping for Improved Watermark Desynchronization (2008) (16)
- Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN (2019) (16)
- Object watermarking for for MPEG-4 video streams copyright protection (2000) (16)
- Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective (2014) (16)
- Universal Counterforensics of Multiple Compressed JPEG Images (2014) (16)
- Using a wavelet-based fractal feature to improve texture discrimination on SAR images (1997) (16)
- MPSteg-Color: Data Hiding Through Redundant Basis Decomposition (2009) (16)
- Privacy preserving evaluation of signal quality with application to ECG analysis (2010) (16)
- Low-complexity lossy compression of hyperspectral images via informed quantization (2010) (15)
- Distributed source coding of hyperspectral images (2005) (15)
- Multiple-observation hypothesis testing under adversarial conditions (2013) (15)
- Image segmentation and region filling for virtual restoration of artworks (2001) (15)
- Countering anti-forensics by means of data fusion (2014) (15)
- Zero-knowledge ST-DM watermarking (2006) (14)
- Low-Complexity Approaches for Lossless and Near-Lossless Hyperspectral Image Compression (2012) (14)
- Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings (2005) (14)
- Processing in the encrypted domain using a composite signal representation: Pros and cons (2009) (14)
- Towards 3D watermarking technology (2003) (14)
- Efficient pointwise and blockwise encrypted operations (2008) (14)
- Pushing science into signal processing [my turn] (2005) (14)
- Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors] (2013) (14)
- Information theoretic aspects in digital watermarking (2001) (14)
- Digital Watermarking (2010) (14)
- Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples (2019) (13)
- Perceptual Issues in Haptic Digital Watermarking (2007) (13)
- A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding (2014) (13)
- Perceptibility of haptic digital watermarking of virtual textures (2005) (13)
- Compressive hyperspectral imaging using progressive total variation (2014) (13)
- Removal and injection of keypoints for SIFT-based copy-move counter-forensics (2013) (13)
- Performance of syntax-based error detection in H.263 video coding: a quantitative analysis (2000) (13)
- Detection of resampled images: Performance analysis and practical challenges (2010) (12)
- Multichannel M-filtering for color image restoration (2000) (12)
- Document and Image Compression (Signal Processing and Communications) (2006) (12)
- Detection of adaptive histogram equalization robust against JPEG compression (2018) (12)
- A new possibilistic clustering algorithm for line detection in real world imagery (1999) (12)
- Optimum decoding and detection of a multiplicative amplitude-encoded watermark (2002) (11)
- Orthogonal dirty paper coding for informed data hiding (2004) (11)
- Detection of double AVC/HEVC encoding (2016) (11)
- Advantages and drawbacks of multiplicative spread spectrum watermarking (2003) (11)
- An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences (2021) (11)
- MPSteg: hiding a message in the matching pursuit domain (2006) (11)
- Discrete cosine transform of encrypted images (2008) (11)
- Image Diversity Analysis: Context, Opinion and Bias (2009) (11)
- Anonymous subject identification and privacy information management in video surveillance (2018) (11)
- Digital watermarking for the authentication of AVS data (2000) (11)
- Digital watermarking of 3D meshes (2004) (11)
- Perceptibility of digital watermarking in haptically enabled 3D meshes (2006) (10)
- Dealing with uncertainty in image forensics: A fuzzy approach (2012) (10)
- A compressive sampling scheme for iterative hyperspectral image reconstruction (2011) (10)
- VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents (2021) (10)
- Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks (2008) (10)
- Comparison of different FFT implementations in the encrypted domain (2008) (10)
- Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach (2014) (10)
- Improving the robustness of nonadditive watermarks through optimum detection theory (2000) (10)
- Robust Watermarking of Cartographic Images (2002) (10)
- Adversarial Source Identification Game With Corrupted Training (2017) (10)
- A Roughness-based algorithm for perceptual watermarking of 3D Meshes (2004) (10)
- A robust frame-based technique for video watermarking (2000) (10)
- DNN Watermarking: Four Challenges and a Funeral (2021) (10)
- Star-configuration searching for satellite attitude computation (1995) (10)
- Watermarking through color image bands decorrelation (2000) (10)
- Improving the performance of RDM watermarking by means of trellis coded quantisation (2006) (9)
- Optimum linear approximation of the Euclidean norm to speed up vector median filtering (1995) (9)
- HVS modelling for quality evaluation of art images (2002) (9)
- Copyright protection of cultural heritage multimedia data through digital watermarking techniques (2000) (9)
- Detection games with a fully active attacker (2015) (9)
- Vector median deblurring filter for colour image restoration (1991) (9)
- Are you threatening me?: Towards smart detectors in watermarking (2014) (9)
- Analysis of the security of linear blinding techniques from an information theoretical point of view (2011) (9)
- Effectiveness of ST-DM Watermarking Against Intra-video Collusion (2005) (9)
- Optimum forensic and counter-forensic strategies for source identification with training data (2012) (9)
- Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting (2013) (9)
- An improved H.263 video coder relying on weighted median filtering of motion vectors (2001) (9)
- Image Watermarking Robust Against Non-Linear Value-Metric Scaling Based on Higher Order Statistics (2006) (9)
- Privacy preserving ECG quality evaluation (2012) (9)
- ArtShop: a tool for art image processing (2002) (9)
- Robust frame-based watermarking for digital video (2001) (8)
- From watermark detection to watermark decoding: a PPM approach (2001) (8)
- Joint near-lossless watermarking and compression for the authentication of remote sensing images (2004) (8)
- SIFT keypoint removal and injection for countering matching-based image forensics (2013) (7)
- Fuzzy clustering of textured SAR images based on a fractal dimension feature (1997) (7)
- A watermarking technique for the protection of digital images IPR (1998) (7)
- Attacking image classification based on bag-of-visual-words (2013) (7)
- Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge (2021) (7)
- CNN-based Steganalysis and Parametric Adversarial Embedding: a Game-Theoretic Framework (2019) (7)
- A Master Key backdoor for universal impersonation attack against DNN-based face verification (2021) (7)
- Signal Processing in Visual Cultural Heritage [From the Guest Editors] (2008) (7)
- A Forensic Tool for Investigating Image Forgeries (2013) (7)
- Efficient linear filtering of encrypted signals via composite representation (2009) (7)
- The watchful forensic analyst: Multi-clue information fusion with background knowledge (2013) (7)
- A psychovisual experiment on the use of Gibbs potential for the quality assessment of geometrically distorted images (2008) (7)
- Improving the security of image manipulation detection through one-and-a-half-class multiple classification (2019) (7)
- Detection Games under Fully Active Adversaries (2018) (7)
- Unsupervised detection of straight lines through possibilistic clustering (1996) (6)
- A message passing approach for decision fusion in adversarial multi-sensor networks (2017) (6)
- Text based geometric normalization for robust watermarking of digital maps (2001) (6)
- A structural method for quality evaluation of desynchronization attacks in image watermarking (2008) (6)
- Image counter-forensics based on feature injection (2014) (6)
- Copyright protection of remote sensing imagery by means of digital watermarking (2001) (6)
- Privacy Protection in Biometric-Based Recognition Systems (2015) (6)
- Is haptic watermarking worth it? (2006) (6)
- Luminance-based video backdoor attack against anti-spoofing rebroadcast detection (2019) (6)
- Gram-Schmidt Orthogonalization on Encrypted Vectors (2011) (6)
- A fuzzy expert system for low level image segmentation (1996) (6)
- Roughness-Adaptive 3D Watermarking of Polygonal Meshes (2009) (6)
- Digital watermarking of visual data: State of the art and new trends (2000) (6)
- Shedding light on some possible remedies against watermark desynchronization: a case study (2005) (6)
- Adversarial Kendall’s Model Towards Containment of Distributed Cyber-Threats (2021) (6)
- Application of possibilistic shell-clustering to the detection of craters in real-world imagery (2000) (6)
- General function evaluation in a STPC setting via piecewise linear approximation (2012) (5)
- Trellis-Coded Rational Dither Modulation for Digital Watermarking (2005) (5)
- Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking (2004) (5)
- Minimum-Impact-on-Classifier (MIC) watermarking for protection of remote sensing imagery (2004) (5)
- 3D Watermarking Technology: Visual Quality Aspects (2003) (5)
- Watermarking in the Encrypted Domain (2016) (5)
- Watermark capacity measure incorporating a model of the human visual system (2001) (5)
- Craters detection via possibilistic shell clustering (2000) (5)
- Coping with random bending attack by means of exhaustive search detection (2005) (5)
- Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering (2021) (5)
- On the performance of multiplicative spread spectrum watermarking (2002) (5)
- A New Self-Recovery Technique for Image Authentication (2003) (5)
- Supervised GAN Watermarking for Intellectual Property Protection (2022) (4)
- Fuzzy motion detection for highway traffic control (1999) (4)
- Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes (2020) (4)
- Watermark-Based Authentication (2010) (4)
- Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking (2005) (4)
- Attacking CNN-based anti-spoofing face authentication in the physical domain (2019) (4)
- Signal Processing in Visual Cultural Heritage (2008) (4)
- First Summary Report on Asymmetric Watermarking (2005) (4)
- Identification of VoIP Speech With Multiple Domain Deep Features (2020) (4)
- The Security Margin: A measure of source distinguishability under adversarial conditions (2013) (4)
- An intelligent perception system for food quality inspection using color analysis (1995) (4)
- Low-complexity lossless compression of hyperspectral images using scalar coset codes (2007) (4)
- Source distinguishability under corrupted training (2014) (4)
- Editorial Steganography and digital watermarking (2006) (4)
- An Eyes-Based Siamese Neural Network for the Detection of GAN-Generated Face Images (2022) (4)
- On the effectiveness of meta-detection for countering oracle attacks in watermarking (2015) (4)
- Detection of GAN-Synthesized street videos (2021) (4)
- Effectiveness of exhaustive search ant template matching against watermark de-synchronization (2005) (4)
- Anticollusion watermarking of 3D meshes by prewarping (2008) (4)
- MPEG-4 Video Data Protection for Internet Distribution (2001) (4)
- Piecewise Function Approximation With Private Data (2015) (3)
- ALINSPEC Project: An Intelligent Vision System for Automatic Inspection of Alimentary Products (1995) (3)
- Research of the Image Processing and Communications Lab. of the University of Florence in the cultural heritage field (2003) (3)
- Unequal error protection for H.263 video over indoor DECT channel (1999) (3)
- Digital watermarking of 3 D meshes (2003) (3)
- Interoperability Issues in Watermark-Based Electronic Copyright Management (1998) (3)
- Ensuring gain-invariance in high-rate data hiding (2005) (3)
- Design and Analysis of the First BOWS Contest (2007) (3)
- Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach (2018) (3)
- A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks (2017) (3)
- A Java-based system for remote correction of CRT color distortion (1999) (3)
- A Vision System for Automatic Inspection of Meat Quality (1995) (3)
- Iris Deidentification With High Visual Realism for Privacy Protection on Websites and Social Networks (2021) (3)
- Fast optimum decoding for nonadditive readable watermarking (2001) (3)
- Cartographic image watermarking using text-based normalization (2001) (3)
- Special Issue on Steganography and Digital Watermarking (2006) (3)
- ResearchArticle Oblivious Neural Network Computing via Homomorphic Encryption (2007) (3)
- A fast L1-metric vector median filter (1993) (2)
- Visuohaptic discrimination of 3D gross shape. (2012) (2)
- Secure Evaluation of Private Functions through Piecewise Linear Approximation (2013) (2)
- Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach (2016) (2)
- Theoretical Foundations of Adversarial Binary Detection (2020) (2)
- Applying Distributed Source Coding Principles to Remote Sensing Image Compression (2005) (2)
- IEEE Internet Computing: Issue Addendum - Managing Copyright: Watermark and Cryptography Algorithms (2002) (2)
- Threat Models and Games for Adversarial Multimedia Forensics (2017) (2)
- Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings (2009) (2)
- MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification (2021) (2)
- Watermarking-based copyright protection of Internet-delivered multimedia (2001) (2)
- Increased-Confidence Adversarial Examples for Deep Learning Counter-Forensics (2020) (2)
- Near-lossless image authentication transparent to near-lossless coding (2004) (2)
- Ensembling Shallow Siamese Neural Network Architectures for Printed Documents Verification in Data-Scarcity Scenarios (2021) (2)
- VIPPrint: A Large Scale Dataset for Colored Printed Documents Authentication and Source Linking (2021) (2)
- Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers (2005) (2)
- Watermarking Techniques for DRM Applications (2009) (2)
- Digital Watermarking for the Authentication of AVS Video Sequences (2000) (2)
- Processing encrypted signals: a new frontier for multimedia security (2006) (2)
- Farewell Message (2017) (2)
- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications (2015) (2)
- A computationally efficient implementation of the L/sub 1/ vector median filter (1997) (2)
- On the adversarial robustness of DNNs based on error correcting output codes (2020) (2)
- Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks (2020) (2)
- Encrypted Domain DCT based on Homomorphic (2009) (1)
- A system for the electronic management of copyright in multimedia (1999) (1)
- Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation (2013) (1)
- Information Fusion in Distributed Sensor Networks with Byzantines (2020) (1)
- KL-transform-based color image watermarking (2000) (1)
- Perceptual Data Hiding in Still Images (2008) (1)
- From Single Object to Contextual Authentication - A New Challenge in Multimedia Forensics and Beyond (2015) (1)
- Low-complexity and error-resilient hyperspectral image compression based on distributed source coding (2008) (1)
- An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities (2022) (1)
- Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors (2022) (1)
- An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack (2018) (1)
- Compressed sensing techniques for hyperspectral image recovery (2010) (1)
- Smart Detection of Line-Search Oracle Attacks (2017) (1)
- Robust Watermarking of Video for Copyright Protection (2003) (1)
- A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection (2022) (1)
- Technological issues in compressive sensing (2012) (1)
- Audio informed watermarking by means of dirty trellis codes (2013) (1)
- Low-complexity, secure and error-resilient hyperspectral image compression (2008) (1)
- Watermarking technology advances: moving from 2D to 3D methods (2002) (1)
- Improved group-of-block synchronization for robust transmission of H.263 video over slow-fading channels (2001) (1)
- Manipulation and generation of synthetic satellite images using deep learning models (2022) (1)
- CycleGANWM: A CycleGAN watermarking method for ownership verification (2022) (1)
- Countering the Pooled Triangle Test for PRNU-based camera identification (2018) (1)
- Adaptively Weighted Vector-Median Processing of Motion Fields in Block DCT and Object-Based Video Coding (1998) (1)
- Some Issues on 3D Watermarking (2003) (1)
- Data hiding for fighting piracy-Signal Processing Magazine, IEEE (2009) (1)
- Classification of Synthetic Facial Attributes by Means of Hybrid Classification/Localization Patch-Based Analysis (2023) (1)
- Quality evaluation of motion estimation algorithms based on structural distortions (2009) (1)
- A Feature-Map-Based Large-Payload DNN Watermarking Algorithm (2021) (1)
- Color transplant for reverse ageing of faded artworks (2008) (1)
- Adversarial Decision Fusion: A Heuristic Approach (2020) (1)
- CRT calibration for high-quality reproduction of color images (1999) (1)
- Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification (2009) (1)
- Object watermarking for MPEG4 video protection (2002) (1)
- 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, November 18-21, 2013 (2013) (0)
- Privacy-Preserving Classification of Electro Cardiogram (ECG) Data (2,3) (2009) (0)
- Comparative analysis of H.263 resilience techniques for H.223-based video transmission over slow-fading channels (2000) (0)
- Counter-forensics of SIFT-based copy-move detection by means of keypoint classification (2013) (0)
- Cascade Algorithm of Image Watermarking Based on Multiple Wavelet Components (2012) (0)
- Use of amplitude and position modulation to augment the payload of 1-bit watermarking (2001) (0)
- Security Attacks and Defenses in Distributed Sensor Networks (2020) (0)
- Iterative compressive sampling for hyperspectral images via source separation (2014) (0)
- LOW − COMPLEXITY LOSSLESS COMPRESSION OF HYPER − AND ULTRA − SPECTRAL IMAGES BASED ON SLEPIAN − WOLF CODING (2007) (0)
- Detecting Deepfake Videos in Data Scarcity Conditions by Means of Video Coding Features (2022) (0)
- Exploiting the distributed source coding paradigm for low-complexity compression of hyperspectral images (2005) (0)
- Visuohaptic Discrimination of 3 D Gross Shape (0)
- Optimum decision fusion in cognitive wireless sensor networks with unknown users location (2015) (0)
- Universal Detection of Backdoor Attacks via Density-based Clustering and Centroids Analysis (2023) (0)
- Perceptual quality assessment of geometrically distorted images (2008) (0)
- Proceedings of the 7th international conference on Information Hiding (2005) (0)
- Improving wireless video communication without feedback information (2001) (0)
- A VQ-DCT Scheme for Grayscale Image Watermarking (2020) (0)
- Digital watermarking of still images in the presence of de-synchronization attacks: theoretical analysis and development of practical algorithms WP2: Development of practical algorithms (2008) (0)
- Peak-error-controlled watermarking of remote sensing imagery (2002) (0)
- 2014 IEEE Workshop on Signal Processing Systems, SiPS 2014, Belfast, United Kingdom, October 20-22, 2014 (2014) (0)
- Investigating applications, requirements, limitations, and possible future developments of watermarking technologies in DRM systems. (2004) (0)
- Removal and injection of keypoints for SIFT-based copy-move counter-forensics (2013) (0)
- Stochastic ImageWarping for ImprovedWatermark Desynchronization (2008) (0)
- Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach (2019) (0)
- Anticollusion Watermarking of 3 D Meshes by Prewarping (2008) (0)
- Performance assessment of voice and video transmission in a simulated UMTS environment (2003) (0)
- Performance Evaluation of Distributed Source Coding for Lossless Compression of Hyperspectral Images (2006) (0)
- Digital watermarking of still images in the presence of de-synchronization attacks: theoretical analysis and development of practical algorithms WP1: Theoretical analysis (2010) (0)
- Detection and Localization of GAN Manipulated Multi-spectral Satellite Images (2022) (0)
- Backdooring Deep Learning Architectures: Threats and (some) Opportunities (2020) (0)
- Digital watermarking : 9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers (2011) (0)
- Evaluating the performance of ST-DM watermarking in nonadditive channels (2004) (0)
- Video Watermarking: Approaches, Applications, and Perspectives (2004) (0)
- VIPPrint: A Large Scale Dataset of Printed and Scanned Images for Synthetic Face Images Detection and Source Linking (2021) (0)
- Covert Task Embedding: Turning a DNN Into an Insider Agent Leaking Out Private Information. (2022) (0)
- Physical Realization of a Hyper Unclonable Function (2022) (0)
- A Quasi-Euclidean Norm to Speed Up (2000) (0)
- Watermark Impairments and Benchmarking (2004) (0)
- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks (2009) (0)
- Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture (2023) (0)
- STATISTICAL OF FULL FRAME DCT COEFFICIENTS (1998) (0)
- AMULET: A MUlti-cLuE Approach to Image Forensics (2014) (0)
- Dual-channel iterative even-median filter (1994) (0)
- Error resilient transmission of H.263 video for mobile communications (2001) (0)
- Dates ahead (2018) (0)
- Which country is this picture from? New data and methods for DNN-based country recognition (2022) (0)
- Basic Notions of Distributed Detection, Information Fusion and Game Theory (2020) (0)
- Scene inspection in complex heterogeneous environments by means of knowledge-maps (1993) (0)
- Integrity of Multimedia and Multimodal Data: From Capture to Use (2022) (0)
- Anonymous subject identification and privacy information management in video surveillance (2017) (0)
- Preface - Digital Watermarking (2009) (0)
- Integration of Spatio-Temporal Information for Motion Detection by Means of Fuzzy Reasoning (1997) (0)
- A general frameworkfor robust watermark ing security (2003) (0)
- Session details: Digital watermarking 2 (2010) (0)
- Universal BlackMarks: Key-Image-Free Blackbox Multi-Bit Watermarking of Deep Neural Networks (2023) (0)
- Improving the security of image manipulation detection through one-and-a-half-class multiple classification (2019) (0)
- Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks (2008) (0)
- Even-median filters for noisy image restoration (1994) (0)
- Robust DNN Watermarking via Fixed Embedding Weights with Optimized Distribution (2022) (0)
- An Efficient Nearly-Optimum Decision Fusion Technique Based on Message Passing (2020) (0)
- POLITECNICO DI TORINO Repository ISTITUZIONALE A Framework for Decision Fusion in Image Forensics Based on Dempster (0)
- An information-theoretic analysis of dirty paper coding for informed audio watermarking (2014) (0)
- Editorial (2002) (0)
- Visuohaptic Gross Shape Discrimination for 3D Watermarking (2010) (0)
- An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images (2022) (0)
- Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks (2015) (0)
- Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection (2021) (0)
- Proceedings of the Third international conference on Digital Watermarking (2002) (0)
This paper list is powered by the following services:
Other Resources About Mauro Barni
What Schools Are Affiliated With Mauro Barni ?
Mauro Barni is affiliated with the following schools: