A sift-based forensic method for copy–move attack detection and transformation recovery I Amerini, L Ballan, R Caldelli, A Del Bimbo, G Serra IEEE transactions on information forensics and security 6 (3), 1099-1110, 2011 | 1204 | 2011 |
Deepfake video detection through optical flow based cnn I Amerini, L Galteri, R Caldelli, A Del Bimbo Proceedings of the IEEE/CVF international conference on computer vision …, 2019 | 389 | 2019 |
Copy-move forgery detection and localization by means of robust clustering with J-Linkage I Amerini, L Ballan, R Caldelli, A Del Bimbo, L Del Tongo, G Serra Signal Processing: Image Communication 28 (6), 659-669, 2013 | 377 | 2013 |
Reversible watermarking techniques: An overview and a classification R Caldelli, F Filippini, R Becarelli EURASIP Journal on Information Security 2010, 1-19, 2010 | 201 | 2010 |
Localization of JPEG double compression through multi-domain convolutional neural networks I Amerini, T Uricchio, L Ballan, R Caldelli 2017 IEEE Conference on computer vision and pattern recognition workshops …, 2017 | 151 | 2017 |
Splicing forgeries localization through the use of first digit features I Amerini, R Becarelli, R Caldelli, A Del Mastio 2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014 | 116 | 2014 |
Geometric tampering estimation by means of a SIFT-based forensic analysis I Amerini, L Ballan, R Caldelli, A Del Bimbo, G Serra 2010 IEEE international conference on acoustics, speech and signal …, 2010 | 98 | 2010 |
Forensic analysis of SIFT keypoint removal and injection A Costanzo, I Amerini, R Caldelli, M Barni IEEE transactions on information forensics and security 9 (9), 1450-1464, 2014 | 96 | 2014 |
Fast image clustering of unknown source images R Caldelli, I Amerini, F Picchioni, M Innocenti 2010 IEEE international workshop on information forensics and security, 1-5, 2010 | 93 | 2010 |
A DWT-based object watermarking system for MPEG-4 video streams A Piva, R Caldelli, A De Rosa Proceedings 2000 International Conference on Image Processing (Cat. No …, 2000 | 91 | 2000 |
Image origin classification based on social network provenance R Caldelli, R Becarelli, I Amerini IEEE Transactions on Information Forensics and Security 12 (6), 1299-1308, 2017 | 85 | 2017 |
Optical Flow based CNN for detection of unlearnt deepfake manipulations R Caldelli, L Galteri, I Amerini, A Del Bimbo Pattern Recognition Letters 146, 31-37, 2021 | 80 | 2021 |
Detection of malevolent changes in digital video for forensic applications N Mondaini, R Caldelli, A Piva, M Barni, V Cappellini Security, steganography, and watermarking of multimedia contents IX 6505 …, 2007 | 79 | 2007 |
Adversarial examples detection in features distance spaces F Carrara, R Becarelli, R Caldelli, F Falchi, G Amato Proceedings of the European conference on computer vision (ECCV) workshops, 0-0, 2018 | 78 | 2018 |
Geometric-invariant robust watermarking through constellation matching in the frequency domain R Caldelli, M Barni, F Bartolini, A Piva Proceedings 2000 International Conference on Image Processing (Cat. No …, 2000 | 73 | 2000 |
A robust watermarking approach for raw video M Barni, F Bartolini, R Caldelli, A DE ROSA, A Piva Proceedings of PV2000 10th international packet video workshop, 2000 | 68 | 2000 |
Tracing images back to their social network of origin: A CNN-based approach I Amerini, T Uricchio, R Caldelli 2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017 | 66 | 2017 |
Exploiting prediction error inconsistencies through LSTM-based classifiers to detect deepfake videos I Amerini, R Caldelli Proceedings of the 2020 ACM workshop on information hiding and multimedia …, 2020 | 63 | 2020 |
Social network identification through image classification with CNN I Amerini, CT Li, R Caldelli IEEE access 7, 35264-35273, 2019 | 60 | 2019 |
Self recovery authentication of images in the DWT domain A Piva, F Bartolini, R Caldelli International Journal of Image and Graphics 5 (01), 149-165, 2005 | 56 | 2005 |