Benedetta Tondi
Benedetta Tondi
Department of Information Engineering of the University of Siena
Email verificata su unisi.it - Home page
TitoloCitata daAnno
The Source Identification Game: an Information-Theoretic Perspective
M Barni, B Tondi
IEEE, Transaction on Information Forensic and Security, 0
79*
Aligned and non-aligned double JPEG detection using convolutional neural networks
M Barni, L Bondi, N Bonettini, P Bestagini, A Costanzo, M Maggini, ...
Journal of Visual Communication and Image Representation 49, 153-163, 2017
612017
A universal technique to hide traces of histogram-based image manipulations
M Barni, M Fontani, B Tondi
Proceedings of the on Multimedia and security, 97-104, 2012
612012
Binary Hypothesis Testing Game with Training Data
M Barni, B Tondi
IEEE, Transaction on Information Theory, 2014
272014
A Universal Attack Against Histogram-Based Image Forensics
M Barni, M Fontani, B Tondi
International Journal of Digital Crime and Forensics (IJDCF) 5 (3), 18, 2013
172013
Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective
M Barni, B Tondi
IEEE Transaction on Information Theory, 0
17*
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
M Barni, Z Chen, B Tondi
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
152016
A game-theoretic framework for optimum decision fusion in the presence of Byzantines
A Abrardo, M Barni, K Kallas, B Tondi
IEEE Transactions on Information Forensics and Security 11 (6), 1333-1345, 2016
122016
Multiple-observation hypothesis testing under adversarial conditions
M Barni, B Tondi
2013 IEEE International Workshop on Information Forensics and Security (WIFS …, 2013
122013
Adversarial multimedia forensics: Overview and challenges ahead
M Barni, MC Stamm, B Tondi
2018 26th European Signal Processing Conference (EUSIPCO), 962-966, 2018
112018
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples
M Barni, E Nowroozi, B Tondi
2017 25th European Signal Processing Conference (EUSIPCO), 281-285, 2017
112017
A gradient-based pixel-domain attack against SVM detection of global image manipulations
Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni
2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017
102017
Universal counterforensics of multiple compressed jpeg images
M Barni, M Fontani, B Tondi
International Workshop on Digital Watermarking, 31-46, 2014
102014
Cnn-based detection of generic contrast adjustment with jpeg post-processing
M Barni, A Costanzo, E Nowroozi, B Tondi
2018 25th IEEE International Conference on Image Processing (ICIP), 3803-3807, 2018
92018
Detection games with a fully active attacker
B Tondi, M Barni, N Merhav
2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015
82015
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach
A Abrardo, M Barni, K Kallas, B Tondi
53rd IEEE Conference on Decision and Control, 505-510, 2014
82014
Are you threatening me?: Towards smart detectors in watermarking
M Barni, P Comesaña-Alfaro, F Pérez-González, B Tondi
Media Watermarking, Security, and Forensics 2014 9028, 902806, 2014
82014
Optimum forensic and counter-forensic strategies for source identification with training data
M Barni, B Tondi
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
82012
Adversarial source identification game with corrupted training
M Barni, B Tondi
IEEE Transactions on Information Theory 64 (5), 3894-3915, 2018
72018
The Security Margin: a Measure of Source Distinguishability under Adversarial Conditions
M Barni, B Tondi
IEEE Global Conference on Signal and Image Processing, 2013
62013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20