Skip to main content

Showing 1–45 of 45 results for author: Tubaro, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05324  [pdf, other

    cs.LG cs.AI eess.SP

    Back to the Future: GNN-based NO$_2$ Forecasting via Future Covariates

    Authors: Antonio Giganti, Sara Mandelli, Paolo Bestagini, Umberto Giuriato, Alessandro D'Ausilio, Marco Marcon, Stefano Tubaro

    Abstract: Due to the latest environmental concerns in kee** at bay contaminants emissions in urban areas, air pollution forecasting has been rising the forefront of all researchers around the world. When predicting pollutant concentrations, it is common to include the effects of environmental factors that influence these concentrations within an extended period, like traffic, meteorological conditions and… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: 5 pages, 4 figures, 1 table, accepted at IEEE-IGARSS 2024

  2. arXiv:2402.14205  [pdf, other

    cs.SD cs.CV cs.LG eess.AS eess.SP

    Compression Robust Synthetic Speech Detection Using Patched Spectrogram Transformer

    Authors: Amit Kumar Singh Yadav, Ziyue Xiang, Kratika Bhagtani, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Many deep learning synthetic speech generation tools are readily available. The use of synthetic speech has caused financial fraud, impersonation of people, and misinformation to spread. For this reason forensic methods that can detect synthetic speech have been proposed. Existing methods often overfit on one dataset and their performance reduces substantially in practical scenarios such as detect… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: Accepted as long oral paper at ICMLA 2023

  3. arXiv:2402.05567  [pdf, other

    cs.SD cs.MM eess.AS

    Listening Between the Lines: Synthetic Speech Detection Disregarding Verbal Content

    Authors: Davide Salvi, Temesgen Semu Balcha, Paolo Bestagini, Stefano Tubaro

    Abstract: Recent advancements in synthetic speech generation have led to the creation of forged audio data that are almost indistinguishable from real speech. This phenomenon poses a new challenge for the multimedia forensics community, as the misuse of synthetic media can potentially cause adverse consequences. Several methods have been proposed in the literature to mitigate potential risks and detect synt… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  4. arXiv:2306.12796  [pdf, other

    eess.IV cs.CV

    Super-Resolution of BVOC Emission Maps Via Domain Adaptation

    Authors: Antonio Giganti, Sara Mandelli, Paolo Bestagini, Marco Marcon, Stefano Tubaro

    Abstract: Enhancing the resolution of Biogenic Volatile Organic Compound (BVOC) emission maps is a critical task in remote sensing. Recently, some Super-Resolution (SR) methods based on Deep Learning (DL) have been proposed, leveraging data from numerical simulations for their training process. However, when dealing with data derived from satellite observations, the reconstruction is particularly challengin… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

    Comments: 4 pages, 4 figures, 1 table, accepted at IEEE-IGARSS 2023

  5. arXiv:2305.14180  [pdf, other

    eess.IV cs.CV cs.LG

    Multi-BVOC Super-Resolution Exploiting Compounds Inter-Connection

    Authors: Antonio Giganti, Sara Mandelli, Paolo Bestagini, Marco Marcon, Stefano Tubaro

    Abstract: Biogenic Volatile Organic Compounds (BVOCs) emitted from the terrestrial ecosystem into the Earth's atmosphere are an important component of atmospheric chemistry. Due to the scarcity of measurement, a reliable enhancement of BVOCs emission maps can aid in providing denser data for atmospheric chemical, climate, and air quality models. In this work, we propose a strategy to super-resolve coarse BV… ▽ More

    Submitted 22 June, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: 5 pages, 4 figures, 1 table, accepted at EURASIP-EUSIPCO 2023

  6. arXiv:2304.03323  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    DSVAE: Interpretable Disentangled Representation for Synthetic Speech Detection

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Tools to generate high quality synthetic speech signal that is perceptually indistinguishable from speech recorded from human speakers are easily available. Several approaches have been proposed for detecting synthetic speech. Many of these approaches use deep learning methods as a black box without providing reasoning for the decisions they make. This limits the interpretability of these approach… ▽ More

    Submitted 28 July, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

  7. arXiv:2302.07570  [pdf, other

    eess.IV cs.CV

    Super-Resolution of BVOC Maps by Adapting Deep Learning Methods

    Authors: Antonio Giganti, Sara Mandelli, Paolo Bestagini, Marco Marcon, Stefano Tubaro

    Abstract: Biogenic Volatile Organic Compounds (BVOCs) play a critical role in biosphere-atmosphere interactions, being a key factor in the physical and chemical properties of the atmosphere and climate. Acquiring large and fine-grained BVOC emission maps is expensive and time-consuming, so most available BVOC data are obtained on a loose and sparse sampling grid or on small regions. However, high-resolution… ▽ More

    Submitted 3 July, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: 5 pages, 4 figures, 3 tables, accepted at IEEE-ICIP 2023

  8. arXiv:2210.17222  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    Combining Automatic Speaker Verification and Prosody Analysis for Synthetic Speech Detection

    Authors: Luigi Attorresi, Davide Salvi, Clara Borrelli, Paolo Bestagini, Stefano Tubaro

    Abstract: The rapid spread of media content synthesis technology and the potentially damaging impact of audio and video deepfakes on people's lives have raised the need to implement systems able to detect these forgeries automatically. In this work we present a novel approach for synthetic speech detection, exploiting the combination of two high-level semantic properties of the human voice. On one side, we… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

  9. H4VDM: H.264 Video Device Matching

    Authors: Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Methods that can determine if two given video sequences are captured by the same device (e.g., mobile telephone or digital camera) can be used in many forensics tasks. In this paper we refer to this as "video device matching". In open-set video forensics scenarios it is easier to determine if two video sequences were captured with the same device than identifying the specific device. In this paper… ▽ More

    Submitted 22 August, 2023; v1 submitted 20 October, 2022; originally announced October 2022.

  10. arXiv:2209.08984  [pdf, other

    cs.CV eess.IV

    An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images

    Authors: Lydia Abady, Edoardo Daniele Cannas, Paolo Bestagini, Benedetta Tondi, Stefano Tubaro, Mauro Barni

    Abstract: Due to the reduction of technological costs and the increase of satellites launches, satellite images are becoming more popular and easier to obtain. Besides serving benevolent purposes, satellite data can also be used for malicious reasons such as misinformation. As a matter of fact, satellite images can be easily manipulated relying on general image editing tools. Moreover, with the surge of Dee… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: 25 pages, 17 figures, 5 tables, APSIPA 2022

  11. arXiv:2209.08000  [pdf, other

    cs.MM

    TIMIT-TTS: a Text-to-Speech Dataset for Multimodal Synthetic Media Detection

    Authors: Davide Salvi, Brian Hosler, Paolo Bestagini, Matthew C. Stamm, Stefano Tubaro

    Abstract: With the rapid development of deep learning techniques, the generation and counterfeiting of multimedia material are becoming increasingly straightforward to perform. At the same time, sharing fake content on the web has become so simple that malicious users can create unpleasant situations with minimal effort. Also, forged media are getting more and more complex, with manipulated videos that are… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

  12. Speaker-Independent Microphone Identification in Noisy Conditions

    Authors: Antonio Giganti, Luca Cuccovillo, Paolo Bestagini, Patrick Aichroth, Stefano Tubaro

    Abstract: This work proposes a method for source device identification from speech recordings that applies neural-network-based denoising, to mitigate the impact of counter-forensics attacks using noise injection. The method is evaluated by comparing the impact of denoising on three state-of-the-art features for microphone classification, determining their discriminating power with and without denoising bei… ▽ More

    Submitted 26 January, 2023; v1 submitted 23 June, 2022; originally announced June 2022.

    Journal ref: in European Signal Processing Conference (EUSIPCO), Belgrade, Serbia, 2022, pp. 1047-1051

  13. arXiv:2205.01805  [pdf, other

    cs.CV cs.LG eess.IV

    Splicing Detection and Localization In Satellite Imagery Using Conditional GANs

    Authors: Emily R. Bartusiak, Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Stefano Tubaro, Fengqing M. Zhu, Edward J. Delp

    Abstract: The widespread availability of image editing tools and improvements in image processing techniques allow image manipulation to be very easy. Oftentimes, easy-to-use yet sophisticated image manipulation tools yields distortions/changes imperceptible to the human observer. Distribution of forged images can have drastic ramifications, especially when coupled with the speed and vastness of the Interne… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

    Comments: Accepted to the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)

    Journal ref: IEEE Conference on Multimedia Information Processing and Retrieval, pp. 91-96, March 2019, San Jose, CA

  14. Spectral Denoising for Microphone Classification

    Authors: L. Cuccovillo, A. Giganti, P. Bestagini, P. Aichroth, S. Tubaro

    Abstract: In this paper, we propose the use of denoising for microphone classification, to enable its usage for several key application domains that involve noisy conditions. We describe the proposed analysis pipeline and the baseline algorithm for microphone classification, and discuss various denoising approaches which can be applied to it within the time or spectral domain; finally, we determine the best… ▽ More

    Submitted 1 July, 2022; v1 submitted 6 April, 2022; originally announced April 2022.

    Journal ref: in ACM International Workshop on Multimedia AI against Disinformation (MAD), Newark, NJ, USA, 2022, pp. 10-17

  15. Forensic Analysis and Localization of Multiply Compressed MP3 Audio Using Transformers

    Authors: Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Audio signals are often stored and transmitted in compressed formats. Among the many available audio compression schemes, MPEG-1 Audio Layer III (MP3) is very popular and widely used. Since MP3 is lossy it leaves characteristic traces in the compressed audio which can be used forensically to expose the past history of an audio file. In this paper, we consider the scenario of audio signal manipulat… ▽ More

    Submitted 28 April, 2022; v1 submitted 30 March, 2022; originally announced March 2022.

  16. arXiv:2203.02246  [pdf, other

    cs.CV cs.AI

    Detecting GAN-generated Images by Orthogonal Training of Multiple CNNs

    Authors: Sara Mandelli, Nicolò Bonettini, Paolo Bestagini, Stefano Tubaro

    Abstract: In the last few years, we have witnessed the rise of a series of deep learning methods to generate synthetic images that look extremely realistic. These techniques prove useful in the movie industry and for artistic purposes. However, they also prove dangerous if used to spread fake news or to generate fake online accounts. For this reason, detecting if an image is an actual photograph or has been… ▽ More

    Submitted 4 March, 2022; originally announced March 2022.

  17. arXiv:2201.02409  [pdf, other

    eess.IV cs.CV eess.SP

    Amplitude SAR Imagery Splicing Localization

    Authors: Edoardo Daniele Cannas, Nicolò Bonettini, Sara Mandelli, Paolo Bestagini, Stefano Tubaro

    Abstract: Synthetic Aperture Radar (SAR) images are a valuable asset for a wide variety of tasks. In the last few years, many websites have been offering them for free in the form of easy to manage products, favoring their widespread diffusion and research work in the SAR field. The drawback of these opportunities is that such images might be exposed to forgeries and manipulations by malicious users, raisin… ▽ More

    Submitted 3 April, 2022; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: The manuscript has been published in IEEE Access. Changes include the full citation to the IEEE published version

    Journal ref: in IEEE Access, vol. 10, pp. 33882-33899, 2022

  18. Forensic Analysis of Synthetically Generated Western Blot Images

    Authors: Sara Mandelli, Davide Cozzolino, Edoardo D. Cannas, Joao P. Cardenuto, Daniel Moreira, Paolo Bestagini, Walter J. Scheirer, Anderson Rocha, Luisa Verdoliva, Stefano Tubaro, Edward J. Delp

    Abstract: The widespread diffusion of synthetically generated content is a serious threat that needs urgent countermeasures. As a matter of fact, the generation of synthetic content is not restricted to multimedia data like videos, photographs or audio sequences, but covers a significantly vast area that can include biological images as well, such as western blot and microscopic images. In this paper, we fo… ▽ More

    Submitted 1 June, 2022; v1 submitted 16 December, 2021; originally announced December 2021.

  19. Forensic Analysis of Video Files Using Metadata

    Authors: Ziyue Xiang, János Horváth, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: The unprecedented ease and ability to manipulate video content has led to a rapid spread of manipulated media. The availability of video editing tools greatly increased in recent years, allowing one to easily generate photo-realistic alterations. Such manipulations can leave traces in the metadata embedded in video files. This metadata information can be used to determine video manipulations, bran… ▽ More

    Submitted 22 January, 2022; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: v2: fixed a typo in Section 3.4; added page number; added IEEE copyright notice

  20. arXiv:2101.11361  [pdf, other

    eess.SP cs.LG physics.geo-ph

    Anti-Aliasing Add-On for Deep Prior Seismic Data Interpolation

    Authors: Francesco Picetti, Vincenzo Lipari, Paolo Bestagini, Stefano Tubaro

    Abstract: Data interpolation is a fundamental step in any seismic processing workflow. Among machine learning techniques recently proposed to solve data interpolation as an inverse problem, Deep Prior paradigm aims at employing a convolutional neural network to capture priors on the data in order to regularize the inversion. However, this technique lacks of reconstruction precision when interpolating highly… ▽ More

    Submitted 27 January, 2021; originally announced January 2021.

  21. arXiv:2012.03581  [pdf, other

    cs.MM cs.CV

    DIPPAS: A Deep Image Prior PRNU Anonymization Scheme

    Authors: Francesco Picetti, Sara Mandelli, Paolo Bestagini, Vincenzo Lipari, Stefano Tubaro

    Abstract: Source device identification is an important topic in image forensics since it allows to trace back the origin of an image. Its forensics counter-part is source device anonymization, that is, to mask any trace on the image that can be useful for identifying the source device. A typical trace exploited for source device identification is the Photo Response Non-Uniformity (PRNU), a noise pattern lef… ▽ More

    Submitted 18 October, 2021; v1 submitted 7 December, 2020; originally announced December 2020.

  22. arXiv:2011.07792  [pdf, other

    cs.CV cs.LG cs.MM eess.IV

    Training Strategies and Data Augmentations in CNN-based DeepFake Video Detection

    Authors: Luca Bondi, Edoardo Daniele Cannas, Paolo Bestagini, Stefano Tubaro

    Abstract: The fast and continuous growth in number and quality of deepfake videos calls for the development of reliable detection systems capable of automatically warning users on social media and on the Internet about the potential untruthfulness of such contents. While algorithms, software, and smartphone apps are getting better every day in generating manipulated videos and swap** faces, the accuracy o… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

  23. arXiv:2009.12088  [pdf, other

    cs.CV cs.LG cs.MM eess.IV

    Training CNNs in Presence of JPEG Compression: Multimedia Forensics vs Computer Vision

    Authors: Sara Mandelli, Nicolò Bonettini, Paolo Bestagini, Stefano Tubaro

    Abstract: Convolutional Neural Networks (CNNs) have proved very accurate in multiple computer vision image classification tasks that required visual inspection in the past (e.g., object recognition, face detection, etc.). Motivated by these astonishing results, researchers have also started using CNNs to cope with image forensic problems (e.g., camera model identification, tampering detection, etc.). Howeve… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

  24. FOCAL: A Forgery Localization Framework based on Video Coding Self-Consistency

    Authors: Sebastiano Verde, Paolo Bestagini, Simone Milani, Giancarlo Calvagno, Stefano Tubaro

    Abstract: Forgery operations on video contents are nowadays within the reach of anyone, thanks to the availability of powerful and user-friendly editing software. Integrity verification and authentication of videos represent a major interest in both journalism (e.g., fake news debunking) and legal environments dealing with digital evidence (e.g., a court of law). While several strategies and different foren… ▽ More

    Submitted 4 September, 2020; v1 submitted 24 August, 2020; originally announced August 2020.

  25. arXiv:2005.09984  [pdf, other

    cs.MM cs.CV

    A Modified Fourier-Mellin Approach for Source Device Identification on Stabilized Videos

    Authors: Sara Mandelli, Fabrizio Argenti, Paolo Bestagini, Massimo Iuliani, Alessandro Piva, Stefano Tubaro

    Abstract: To decide whether a digital video has been captured by a given device, multimedia forensic tools usually exploit characteristic noise traces left by the camera sensor on the acquired frames. This analysis requires that the noise pattern characterizing the camera and the noise pattern extracted from video frames under analysis are geometrically aligned. However, in many practical scenarios this doe… ▽ More

    Submitted 20 May, 2020; originally announced May 2020.

  26. arXiv:2004.07682  [pdf, other

    cs.CV cs.MM eess.IV

    On the use of Benford's law to detect GAN-generated images

    Authors: Nicolò Bonettini, Paolo Bestagini, Simone Milani, Stefano Tubaro

    Abstract: The advent of Generative Adversarial Network (GAN) architectures has given anyone the ability of generating incredibly realistic synthetic imagery. The malicious diffusion of GAN-generated images may lead to serious social and political consequences (e.g., fake news spreading, opinion formation, etc.). It is therefore important to regulate the widespread distribution of synthetic imagery by develo… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

  27. arXiv:2004.07676  [pdf, other

    cs.CV cs.MM eess.IV

    Video Face Manipulation Detection Through Ensemble of CNNs

    Authors: Nicolò Bonettini, Edoardo Daniele Cannas, Sara Mandelli, Luca Bondi, Paolo Bestagini, Stefano Tubaro

    Abstract: In the last few years, several techniques for facial manipulation in videos have been successfully developed and made available to the masses (i.e., FaceSwap, deepfake, etc.). These methods enable anyone to easily edit faces in video sequences with incredibly realistic results and a very little effort. Despite the usefulness of these tools in many fields, if used maliciously, they can have a signi… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

  28. CNN-based fast source device identification

    Authors: Sara Mandelli, Davide Cozzolino, Paolo Bestagini, Luisa Verdoliva, Stefano Tubaro

    Abstract: Source identification is an important topic in image forensics, since it allows to trace back the origin of an image. This represents a precious information to claim intellectual property but also to reveal the authors of illicit materials. In this paper we address the problem of device identification based on sensor noise and propose a fast and accurate solution using convolutional neural network… ▽ More

    Submitted 8 July, 2020; v1 submitted 31 January, 2020; originally announced January 2020.

  29. arXiv:1906.08743  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    We Need No Pixels: Video Manipulation Detection Using Stream Descriptors

    Authors: David Güera, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Manipulating video content is easier than ever. Due to the misuse potential of manipulated content, multiple detection techniques that analyze the pixel data from the videos have been proposed. However, clever manipulators should also carefully forge the metadata and auxiliary header information, which is harder to do for videos than images. In this paper, we propose to identify forged videos by a… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: 7 pages, 6 figures, presented at the ICML 2019 Worksop on Synthetic Realities: Deep Learning for Detecting AudioVisual Fakes

  30. arXiv:1904.08497  [pdf, other

    cs.CV cs.LG stat.ML

    An In-Depth Study on Open-Set Camera Model Identification

    Authors: Pedro Ribeiro Mendes Júnior, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Anderson Rocha

    Abstract: Camera model identification refers to the problem of linking a picture to the camera model used to shoot it. As this might be an enabling factor in different forensic applications to single out possible suspects (e.g., detecting the author of child abuse or terrorist propaganda material), many accurate camera model attribution methods have been developed in the literature. One of their main drawba… ▽ More

    Submitted 13 November, 2019; v1 submitted 11 April, 2019; originally announced April 2019.

    Comments: Published through IEEE Access journal

  31. arXiv:1901.07927  [pdf, other

    cs.NE cs.LG eess.SP

    Interpolation and Denoising of Seismic Data using Convolutional Neural Networks

    Authors: Sara Mandelli, Vincenzo Lipari, Paolo Bestagini, Stefano Tubaro

    Abstract: Seismic data processing algorithms greatly benefit from regularly sampled and reliable data. Therefore, interpolation and denoising play a fundamental role as one of the starting steps of most seismic processing workflows. We exploit convolutional neural networks for the joint tasks of interpolation and random noise attenuation of 2D common shot gathers. Inspired by the great contributions achieve… ▽ More

    Submitted 21 October, 2019; v1 submitted 23 January, 2019; originally announced January 2019.

  32. arXiv:1811.01820  [pdf, other

    cs.MM

    Facing Device Attribution Problem for Stabilized Video Sequences

    Authors: Sara Mandelli, Paolo Bestagini, Luisa Verdoliva, Stefano Tubaro

    Abstract: A problem deeply investigated by multimedia forensics researchers is the one of detecting which device has been used to capture a video. This enables to trace down the owner of a video sequence, which proves extremely helpful to solve copyright infringement cases as well as to fight distribution of illicit material (e.g., underage clips, terroristic threats, etc.). Currently, the most promising me… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

  33. arXiv:1810.01316  [pdf, other

    cs.LG stat.ML

    Landmine Detection Using Autoencoders on Multi-polarization GPR Volumetric Data

    Authors: Paolo Bestagini, Federico Lombardi, Maurizio Lualdi, Francesco Picetti, Stefano Tubaro

    Abstract: Buried landmines and unexploded remnants of war are a constant threat for the population of many countries that have been hit by wars in the past years. The huge amount of human lives lost due to this phenomenon has been a strong motivation for the research community toward the development of safe and robust techniques designed for landmine clearance. Nonetheless, being able to detect and localize… ▽ More

    Submitted 2 October, 2018; originally announced October 2018.

    Comments: https://github.com/polimi-ispl/landmine_detection_autoencoder

  34. A Counter-Forensic Method for CNN-Based Camera Model Identification

    Authors: David Güera, Yu Wang, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: An increasing number of digital images are being shared and accessed through websites, media, and social applications. Many of these images have been modified and are not authentic. Recent advances in the use of deep convolutional neural networks (CNNs) have facilitated the task of analyzing the veracity and authenticity of largely distributed image datasets. We examine in this paper the problem o… ▽ More

    Submitted 5 May, 2018; originally announced May 2018.

    Comments: Presented at the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Workshop on Media Forensics

  35. arXiv:1805.01946  [pdf, other

    cs.CV

    Reliability Map Estimation For CNN-Based Camera Model Attribution

    Authors: David Güera, Sri Kalyan Yarlagadda, Paolo Bestagini, Fengqing Zhu, Stefano Tubaro, Edward J. Delp

    Abstract: Among the image forensic issues investigated in the last few years, great attention has been devoted to blind camera model attribution. This refers to the problem of detecting which camera model has been used to acquire an image by only exploiting pixel information. Solving this problem has great impact on image integrity assessment as well as on authenticity verification. Recent advancements that… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: Presented at the IEEE Winter Conference on Applications of Computer Vision (WACV18)

  36. arXiv:1802.04881  [pdf, other

    cs.CV

    Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier

    Authors: Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Fengqing Maggie Zhu, Stefano Tubaro, Edward J. Delp

    Abstract: Current satellite imaging technology enables shooting high-resolution pictures of the ground. As any other kind of digital images, overhead pictures can also be easily forged. However, common image forensic techniques are often developed for consumer camera images, which strongly differ in their nature from satellite ones (e.g., compression schemes, post-processing, sensors, etc.). Therefore, many… ▽ More

    Submitted 13 February, 2018; originally announced February 2018.

    Comments: Presented at the IS&T International Symposium on Electronic Imaging (EI)

  37. Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks

    Authors: Mauro Barni, Luca Bondi, Nicolò Bonettini, Paolo Bestagini, Andrea Costanzo, Marco Maggini, Benedetta Tondi, Stefano Tubaro

    Abstract: Due to the wide diffusion of JPEG coding standard, the image forensic community has devoted significant attention to the development of double JPEG (DJPEG) compression detectors through the years. The ability of detecting whether an image has been compressed twice provides paramount information toward image authenticity assessment. Given the trend recently gained by convolutional neural networks (… ▽ More

    Submitted 2 August, 2017; originally announced August 2017.

    Comments: Submitted to Journal of Visual Communication and Image Representation (first submission: March 20, 2017; second submission: August 2, 2017)

  38. arXiv:1610.04467  [pdf, other

    cs.IT cs.SD stat.ME

    A Geometrical-Statistical approach to outlier removal for TDOA measuments

    Authors: Marco Compagnoni, Alessia Pini, Antonio Canclini, Paolo Bestagini, Fabio Antonacci, Stefano Tubaro, Augusto Sarti

    Abstract: The curse of outlier measurements in estimation problems is a well known issue in a variety of fields. Therefore, outlier removal procedures, which enables the identification of spurious measurements within a set, have been developed for many different scenarios and applications. In this paper, we propose a statistically motivated outlier removal algorithm for time differences of arrival (TDOAs),… ▽ More

    Submitted 25 April, 2017; v1 submitted 14 October, 2016; originally announced October 2016.

    Comments: 30 pages, 10 figure, 3 tables, in press on IEEE Transactions on Signal Processing

  39. Reduced Memory Region Based Deep Convolutional Neural Network Detection

    Authors: Denis Tome', Luca Bondi, Emanuele Plebani, Luca Baroffio, Danilo Pau, Stefano Tubaro

    Abstract: Accurate pedestrian detection has a primary role in automotive safety: for example, by issuing warnings to the driver or acting actively on car's brakes, it helps decreasing the probability of injuries and human fatalities. In order to achieve very high accuracy, recent pedestrian detectors have been based on Convolutional Neural Networks (CNN). Unfortunately, such approaches require vast amounts… ▽ More

    Submitted 8 September, 2016; originally announced September 2016.

    Comments: IEEE 2016 ICCE-Berlin

    Journal ref: 2016 IEEE 6th International Conference on Consumer Electronics - Berlin (ICCE-Berlin)

  40. First Steps Toward Camera Model Identification with Convolutional Neural Networks

    Authors: Luca Bondi, Luca Baroffio, David Güera, Paolo Bestagini, Edward J. Delp, Stefano Tubaro

    Abstract: Detecting the camera model used to shoot a picture enables to solve a wide series of forensic problems, from copyright infringement to ownership attribution. For this reason, the forensic community has developed a set of camera model identification algorithms that exploit characteristic traces left on acquired images by the processing pipelines specific of each camera model. In this paper, we inve… ▽ More

    Submitted 26 September, 2017; v1 submitted 3 March, 2016; originally announced March 2016.

  41. Deep convolutional neural networks for pedestrian detection

    Authors: Denis Tomè, Federico Monti, Luca Baroffio, Luca Bondi, Marco Tagliasacchi, Stefano Tubaro

    Abstract: Pedestrian detection is a popular research topic due to its paramount importance for a number of applications, especially in the fields of automotive, surveillance and robotics. Despite the significant improvements, pedestrian detection is still an open challenge that calls for more and more accurate algorithms. In the last few years, deep learning and in particular convolutional neural networks e… ▽ More

    Submitted 7 March, 2016; v1 submitted 13 October, 2015; originally announced October 2015.

    Comments: submitted to Elsevier Signal Processing: Image Communication special Issue on Deep Learning

  42. arXiv:1509.02380  [pdf, other

    cs.SD cs.IT stat.ME

    Source localization and denoising: a perspective from the TDOA space

    Authors: Marco Compagnoni, Antonio Canclini, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro

    Abstract: In this manuscript, we formulate the problem of denoising Time Differences of Arrival (TDOAs) in the TDOA space, i.e. the Euclidean space spanned by TDOA measurements. The method consists of pre-processing the TDOAs with the purpose of reducing the measurement noise. The complete set of TDOAs (i.e., TDOAs computed at all microphone pairs) is known to form a redundant set, which lies on a linear su… ▽ More

    Submitted 6 April, 2016; v1 submitted 8 September, 2015; originally announced September 2015.

    Comments: 25 pages, 9 figures

    Journal ref: Multidimensional Systems and Signal Processing 2016

  43. Coding local and global binary visual features extracted from video sequences

    Authors: Luca Baroffio, Antonio Canclini, Matteo Cesana, Alessandro Redondi, Marco Tagliasacchi, Stefano Tubaro

    Abstract: Binary local features represent an effective alternative to real-valued descriptors, leading to comparable results for many visual analysis tasks, while being characterized by significantly lower computational complexity and memory requirements. When dealing with large collections, a more compact representation based on global features is often preferred, which can be obtained from local features… ▽ More

    Submitted 26 February, 2015; originally announced February 2015.

    Comments: submitted to IEEE Transactions on Image Processing

  44. Hybrid coding of visual content and local image features

    Authors: Luca Baroffio, Matteo Cesana, Alessandro Redondi, Marco Tagliasacchi, Stefano Tubaro

    Abstract: Distributed visual analysis applications, such as mobile visual search or Visual Sensor Networks (VSNs) require the transmission of visual content on a bandwidth-limited network, from a peripheral node to a processing unit. Traditionally, a Compress-Then-Analyze approach has been pursued, in which sensing nodes acquire and encode the pixel-level representation of the visual content, that is subseq… ▽ More

    Submitted 27 February, 2015; originally announced February 2015.

    Comments: submitted to IEEE International Conference on Image Processing

  45. Transform coder identification based on quantization footprints and lattice theory

    Authors: Marco Tagliasacchi, Marco Visentini-Scarzanella, Pier Luigi Dragotti, Stefano Tubaro

    Abstract: Transform coding is routinely used for lossy compression of discrete sources with memory. The input signal is divided into N-dimensional vectors, which are transformed by means of a linear map**. Then, transform coefficients are quantized and entropy coded. In this paper we consider the problem of identifying the transform matrix as well as the quantization step sizes. We study the challenging c… ▽ More

    Submitted 16 November, 2012; originally announced November 2012.

    Comments: Submitted to IEEE Transactions on Information Theory