Follow
Roberto Caldelli
Roberto Caldelli
Researcher at CNIT and Full Prof. at Universitas Mercatorum
Verified email at unifi.it
Title
Cited by
Cited by
Year
A sift-based forensic method for copy–move attack detection and transformation recovery
I Amerini, L Ballan, R Caldelli, A Del Bimbo, G Serra
IEEE transactions on information forensics and security 6 (3), 1099-1110, 2011
12452011
Deepfake video detection through optical flow based cnn
I Amerini, L Galteri, R Caldelli, A Del Bimbo
Proceedings of the IEEE/CVF international conference on computer vision …, 2019
4222019
Copy-move forgery detection and localization by means of robust clustering with J-Linkage
I Amerini, L Ballan, R Caldelli, A Del Bimbo, L Del Tongo, G Serra
Signal Processing: Image Communication 28 (6), 659-669, 2013
3932013
Reversible watermarking techniques: An overview and a classification
R Caldelli, F Filippini, R Becarelli
EURASIP Journal on Information Security 2010, 1-19, 2010
2032010
Localization of JPEG double compression through multi-domain convolutional neural networks
I Amerini, T Uricchio, L Ballan, R Caldelli
2017 IEEE Conference on computer vision and pattern recognition workshops …, 2017
1662017
Splicing forgeries localization through the use of first digit features
I Amerini, R Becarelli, R Caldelli, A Del Mastio
2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014
1172014
Forensic analysis of SIFT keypoint removal and injection
A Costanzo, I Amerini, R Caldelli, M Barni
IEEE transactions on information forensics and security 9 (9), 1450-1464, 2014
1042014
Geometric tampering estimation by means of a SIFT-based forensic analysis
I Amerini, L Ballan, R Caldelli, A Del Bimbo, G Serra
2010 IEEE international conference on acoustics, speech and signal …, 2010
982010
Fast image clustering of unknown source images
R Caldelli, I Amerini, F Picchioni, M Innocenti
2010 IEEE international workshop on information forensics and security, 1-5, 2010
942010
Optical Flow based CNN for detection of unlearnt deepfake manipulations
R Caldelli, L Galteri, I Amerini, A Del Bimbo
Pattern Recognition Letters 146, 31-37, 2021
932021
A DWT-based object watermarking system for MPEG-4 video streams
A Piva, R Caldelli, A De Rosa
Proceedings 2000 International Conference on Image Processing (Cat. No …, 2000
912000
Image origin classification based on social network provenance
R Caldelli, R Becarelli, I Amerini
IEEE Transactions on Information Forensics and Security 12 (6), 1299-1308, 2017
882017
Adversarial examples detection in features distance spaces
F Carrara, R Becarelli, R Caldelli, F Falchi, G Amato
Proceedings of the European conference on computer vision (ECCV) workshops, 0-0, 2018
832018
Detection of malevolent changes in digital video for forensic applications
N Mondaini, R Caldelli, A Piva, M Barni, V Cappellini
Security, steganography, and watermarking of multimedia contents IX 6505 …, 2007
792007
Geometric-invariant robust watermarking through constellation matching in the frequency domain
R Caldelli, M Barni, F Bartolini, A Piva
Proceedings 2000 International Conference on Image Processing (Cat. No …, 2000
732000
Exploiting prediction error inconsistencies through LSTM-based classifiers to detect deepfake videos
I Amerini, R Caldelli
Proceedings of the 2020 ACM workshop on information hiding and multimedia …, 2020
702020
A robust watermarking approach for raw video
M Barni, F Bartolini, R Caldelli, A DE ROSA, A Piva
Proceedings of PV2000 10th international packet video workshop, 2000
682000
Tracing images back to their social network of origin: A CNN-based approach
I Amerini, T Uricchio, R Caldelli
2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017
662017
Social network identification through image classification with CNN
I Amerini, CT Li, R Caldelli
IEEE access 7, 35264-35273, 2019
622019
Adversarial image detection in deep neural networks
F Carrara, F Falchi, R Caldelli, G Amato, R Becarelli
Multimedia Tools and Applications 78, 2815-2835, 2019
572019
The system can't perform the operation now. Try again later.
Articles 1–20