Benedetta Tondi
Benedetta Tondi
Department of Information Engineering of the University of Siena
Verified email at unisi.it - Homepage
Title
Cited by
Cited by
Year
Aligned and non-aligned double JPEG detection using convolutional neural networks
M Barni, L Bondi, N Bonettini, P Bestagini, A Costanzo, M Maggini, ...
Journal of Visual Communication and Image Representation 49, 153-163, 2017
1252017
The Source Identification Game: an Information-Theoretic Perspective
M Barni, B Tondi
IEEE, Transaction on Information Forensic and Security, 0
91*
A universal technique to hide traces of histogram-based image manipulations
M Barni, M Fontani, B Tondi
Proceedings of the on Multimedia and security, 97-104, 2012
682012
Binary Hypothesis Testing Game with Training Data
M Barni, B Tondi
IEEE, Transaction on Information Theory, 2014
362014
Adversarial multimedia forensics: Overview and challenges ahead
M Barni, MC Stamm, B Tondi
2018 26th European Signal Processing Conference (EUSIPCO), 962-966, 2018
312018
Cnn-based detection of generic contrast adjustment with jpeg post-processing
M Barni, A Costanzo, E Nowroozi, B Tondi
2018 25th IEEE International Conference on Image Processing (ICIP), 3803-3807, 2018
262018
A new backdoor attack in CNNs by training set corruption without label poisoning
M Barni, K Kallas, B Tondi
2019 IEEE International Conference on Image Processing (ICIP), 101-105, 2019
212019
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
M Barni, Z Chen, B Tondi
2016 IEEE international workshop on information forensics and security (WIFS …, 2016
212016
Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective
M Barni, B Tondi
IEEE Transaction on Information Theory, 0
20*
Secure detection of image manipulation by means of random feature selection
Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni
IEEE Transactions on Information Forensics and Security 14 (9), 2454-2469, 2019
182019
A Universal Attack Against Histogram-Based Image Forensics
M Barni, M Fontani, B Tondi
International Journal of Digital Crime and Forensics (IJDCF) 5 (3), 18, 2013
182013
On the transferability of adversarial examples against cnn-based image forensics
M Barni, K Kallas, E Nowroozi, B Tondi
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
172019
A gradient-based pixel-domain attack against SVM detection of global image manipulations
Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni
2017 IEEE workshop on information forensics and security (WIFS), 1-6, 2017
172017
Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samples
M Barni, E Nowroozi, B Tondi
2017 25th European signal processing conference (EUSIPCO), 281-285, 2017
172017
A game-theoretic framework for optimum decision fusion in the presence of Byzantines
A Abrardo, M Barni, K Kallas, B Tondi
IEEE Transactions on Information Forensics and Security 11 (6), 1333-1345, 2016
172016
Multiple-observation hypothesis testing under adversarial conditions
M Barni, B Tondi
2013 IEEE International Workshop on Information Forensics and Security (WIFS …, 2013
172013
Universal counterforensics of multiple compressed JPEG images
M Barni, M Fontani, B Tondi
International Workshop on Digital Watermarking, 31-46, 2014
152014
Primary quantization matrix estimation of double compressed JPEG images via CNN
Y Niu, B Tondi, Y Zhao, M Barni
IEEE Signal Processing Letters 27, 191-195, 2019
142019
Pixel-domain adversarial examples against CNN-based manipulation detectors
B Tondi
Electronics Letters 54 (21), 1220-1222, 2018
122018
Adversarial source identification game with corrupted training
M Barni, B Tondi
IEEE Transactions on Information Theory 64 (5), 3894-3915, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20