Search Results - "Tiziano Bianchi"
-
1
Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts
Published in IEEE transactions on information forensics and security (01-10-2012)“…In this paper, a forensic tool able to discriminate between original and forged regions in an image captured by a digital camera is presented. We make the…”
Get full text
Journal Article -
2
Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps
Published in IEEE transactions on information forensics and security (01-04-2012)“…In this paper, a simple yet reliable algorithm to detect the presence of nonaligned double JPEG compression (NA-JPEG) in compressed images is proposed. The…”
Get full text
Journal Article -
3
User Authentication via PRNU-Based Physical Unclonable Functions
Published in IEEE transactions on information forensics and security (01-08-2017)“…Multifactor user authentication systems enhance security by augmenting passwords with the verification of additional pieces of information such as the…”
Get full text
Journal Article -
4
Cancelable templates for secure face verification based on deep learning and random projections
Published in EURASIP Journal on Information Security (08-03-2024)“…Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address security…”
Get full text
Journal Article -
5
Sparsity estimation from compressive projections via sparse random matrices
Published in EURASIP journal on advances in signal processing (10-09-2018)“…The aim of this paper is to develop strategies to estimate the sparsity degree of a signal from compressive projections, without the burden of recovery. We…”
Get full text
Journal Article -
6
Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training
Published in EURASIP Journal on Information Security (10-03-2023)“…In this work, we present the Gaussian Class-Conditional Simplex (GCCS) loss: a novel approach for training deep robust multiclass classifiers that improves…”
Get full text
Journal Article -
7
Synthetic Data Pretraining for Hyperspectral Image Super-Resolution
Published in IEEE access (01-01-2024)“…Large-scale self-supervised pretraining of deep learning models is known to be critical in several fields, such as language processing, where its has led to…”
Get full text
Journal Article -
8
Adversarial learning of mappings onto regularized spaces for biometric authentication
Published in IEEE access (01-01-2020)“…We present AuthNet: a novel framework for generic biometric authentication which, by learning a regularized mapping instead of a classification boundary, leads…”
Get full text
Journal Article -
9
Data Simulations of a Compressive Sensing Multispectral Imager in the Mid-Infrared Region and Its Performances for the Monitoring of High-Temperature Events
Published in Engineering proceedings (01-11-2023)“…The mid-infrared spectral (MIR) region is poorly exploited in Earth Observation (EO) applications despite its potential for impacting several application…”
Get full text
Journal Article -
10
TTP-free asymmetric fingerprinting protocol based on client side embedding
Published in 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-05-2014)“…In this paper, we propose a scheme to employ an asymmetric fingerprinting protocol within a client-side embedding distribution framework. The scheme is based…”
Get full text
Conference Proceeding -
11
SVD-Based Techniques for Zero-Padded Block Transmission Over Fading Channels
Published in IEEE transactions on signal processing (01-02-2007)“…In this paper, the performance of filter bank transceivers in the presence of a dispersive time-variant channel is investigated. It is well known that filter…”
Get full text
Journal Article -
12
Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing
Published in IEEE transactions on information forensics and security (01-02-2016)“…In this paper, the security of the compressed sensing (CS) framework as a form of data confidentiality is analyzed. Two important properties of one-time random…”
Get full text
Journal Article -
13
Fast image clustering based on compressed camera fingerprints
Published in Signal processing. Image communication (01-02-2021)“…Every camera sensor leaves unique traces on the acquired images that can be thought of as a camera fingerprint. This work presents an efficient algorithm for…”
Get full text
Journal Article -
14
Onboard Deep Lossless and Near-Lossless Predictive Coding of Hyperspectral Images With Line-Based Attention
Published in IEEE transactions on geoscience and remote sensing (2024)“…Deep learning methods have traditionally been difficult to apply to compression of hyperspectral images onboard spacecrafts due to the large computational…”
Get full text
Journal Article -
15
Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
Published in IEEE transactions on information forensics and security (01-06-2012)“…In this paper, we propose a forensic algorithm to discriminate between original and forged regions in JPEG images, under the hypothesis that the tampered image…”
Get full text
Journal Article -
16
A survey of landmine detection using hyperspectral imaging
Published in ISPRS journal of photogrammetry and remote sensing (01-02-2017)“…Hyperspectral imaging is a trending technique in remote sensing that finds its application in many different areas, such as agriculture, mapping, target…”
Get full text
Journal Article -
17
TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding
Published in IEEE transactions on information forensics and security (01-10-2014)“…In this paper, we propose a solution for implementing an asymmetric fingerprinting protocol within a client-side embedding distribution framework. The scheme…”
Get full text
Journal Article -
18
A Tutorial on Speckle Reduction in Synthetic Aperture Radar Images
Published in IEEE geoscience and remote sensing magazine (01-09-2013)“…Speckle is a granular disturbance, usually modeled as a multiplicative noise, that affects synthetic aperture radar (SAR) images, as well as all coherent…”
Get full text
Journal Article -
19
Frequency Domain Detectors in Different Short-Range Ultra-Wideband Communication Scenarios
Published in EURASIP journal on wireless communications and networking (19-12-2006)“…: We study the performance of an innovative communication scheme for ultra-wideband systems which are based on impulse radio in two different short-range…”
Get full text
Journal Article -
20
Compressed Fingerprint Matching and Camera Identification via Random Projections
Published in IEEE transactions on information forensics and security (01-07-2015)“…Sensor imperfections in the form of photoresponse nonuniformity (PRNU) patterns are a well-established fingerprinting technique to link pictures to the camera…”
Get full text
Journal Article