Benedetta Tondi
Benedetta Tondi
Department of Information Engineering of the University of Siena
Verifierad e-postadress på unisi.it - Startsida
Titel
Citeras av
Citeras av
År
Aligned and non-aligned double JPEG detection using convolutional neural networks
M Barni, L Bondi, N Bonettini, P Bestagini, A Costanzo, M Maggini, ...
Journal of Visual Communication and Image Representation 49, 153-163, 2017
992017
The Source Identification Game: an Information-Theoretic Perspective
M Barni, B Tondi
IEEE, Transaction on Information Forensic and Security, 0
85*
A universal technique to hide traces of histogram-based image manipulations
M Barni, M Fontani, B Tondi
Proceedings of the on Multimedia and security, 97-104, 2012
662012
Binary Hypothesis Testing Game with Training Data
M Barni, B Tondi
IEEE, Transaction on Information Theory, 2014
322014
Adversarial multimedia forensics: Overview and challenges ahead
M Barni, MC Stamm, B Tondi
2018 26th European Signal Processing Conference (EUSIPCO), 962-966, 2018
182018
A Universal Attack Against Histogram-Based Image Forensics
M Barni, M Fontani, B Tondi
International Journal of Digital Crime and Forensics (IJDCF) 5 (3), 18, 2013
172013
Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective
M Barni, B Tondi
IEEE Transaction on Information Theory, 0
17*
Cnn-based detection of generic contrast adjustment with jpeg post-processing
M Barni, A Costanzo, E Nowroozi, B Tondi
2018 25th IEEE International Conference on Image Processing (ICIP), 3803-3807, 2018
162018
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
M Barni, Z Chen, B Tondi
2016 IEEE international workshop on information forensics and security (WIFS …, 2016
162016
Multiple-observation hypothesis testing under adversarial conditions
M Barni, B Tondi
2013 IEEE International Workshop on Information Forensics and Security (WIFS …, 2013
152013
Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samples
M Barni, E Nowroozi, B Tondi
2017 25th European signal processing conference (EUSIPCO), 281-285, 2017
132017
A game-theoretic framework for optimum decision fusion in the presence of Byzantines
A Abrardo, M Barni, K Kallas, B Tondi
IEEE Transactions on Information Forensics and Security 11 (6), 1333-1345, 2016
132016
Universal counterforensics of multiple compressed JPEG images
M Barni, M Fontani, B Tondi
International Workshop on Digital Watermarking, 31-46, 2014
132014
A gradient-based pixel-domain attack against SVM detection of global image manipulations
Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni
2017 IEEE workshop on information forensics and security (WIFS), 1-6, 2017
122017
A new backdoor attack in CNNs by training set corruption without label poisoning
M Barni, K Kallas, B Tondi
2019 IEEE International Conference on Image Processing (ICIP), 101-105, 2019
112019
Secure detection of image manipulation by means of random feature selection
Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni
IEEE Transactions on Information Forensics and Security 14 (9), 2454-2469, 2019
102019
Pixel-domain adversarial examples against CNN-based manipulation detectors
B Tondi
Electronics Letters 54 (21), 1220-1222, 2018
92018
Adversarial source identification game with corrupted training
M Barni, B Tondi
IEEE Transactions on Information Theory 64 (5), 3894-3915, 2018
92018
Optimum forensic and counter-forensic strategies for source identification with training data
M Barni, B Tondi
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
92012
On the transferability of adversarial examples against cnn-based image forensics
M Barni, K Kallas, E Nowroozi, B Tondi
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
82019
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20