Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed., , , , and . I3E, volume 305 of IFIP, page 13-25. Springer, (2009)Image Origin Classification Based on Social Network Provenance., , and . IEEE Trans. Inf. Forensics Secur., 12 (6): 1299-1308 (2017)Detecting Adversarial Inputs by Looking in the Black Box., , , , and . ERCIM News, (2019)Trustworthiness in social networks.. University of Florence, Italy, (2016)Exploiting CNN Layer Activations to Improve Adversarial Image Classification., , , , and . ICIP, page 2289-2293. IEEE, (2019)Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 164-174. SPIE, (2005)Reversible Watermarking Techniques: An Overview and a Classification., , and . EURASIP J. Information Security, (2010)A DVB-MHP web browser to pursue convergence between Digital Terrestrial Television and Internet., , , , , and . Multimedia Tools Appl., 50 (2): 381-414 (2010)Integration between Digital Terrestrial Television and Internet by Means of a DVB-MHP Web Browser., , , , , and . WEBIST, page 323-328. INSTICC Press, (2009)Acquisition source identification through a blind image classification., , , and . IET Image Process., 9 (4): 329-337 (2015)