What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mauro Barni
Google Scholar
ORCID:
0000-0002-7368-0866
38
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
BOSC: A Backdoor-Based Framework for Open Set Synthetic Image Attribution.
Jun Wang
Benedetta Tondi
Mauro Barni
2024
journals/tifs
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment.
Kaiqing Lin
Bin Li
Weixiang Li
Mauro Barni
Benedetta Tondi
Xulong Liu
2024
journals/tifs
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis.
Wei Guo
Benedetta Tondi
Mauro Barni
2024
journals/tifs
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs.
Jianwei Fei
Zhihua Xia
Benedetta Tondi
Mauro Barni
2024
conf/ih
Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation.
Nischay Purnekar
Lydia Abady
Benedetta Tondi
Mauro Barni
2021
journals/istr
Spread-Transform Dither Modulation Watermarking of Deep Neural Network.
Yue Li
Benedetta Tondi
Mauro Barni
2021
journals/tifs
Adversarial Kendall's Model Towards Containment of Distributed Cyber-Threats.
Paolo Addesso
Mauro Barni
Mario Di Mauro
Vincenzo Matta
2021
journals/tifs
Copy Move Source-Target Disambiguation Through Multi-Branch CNNs.
Mauro Barni
Quoc-Tin Phan
Benedetta Tondi
2021
journals/tifs
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
Weixuan Tang
Bin Li
Mauro Barni
Jin Li
Jiwu Huang
2021
journals/tifs
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering.
Yakun Niu
Benedetta Tondi
Yao Zhao
Rongrong Ni
Mauro Barni
2021
conf/ih
DNN Watermarking: Four Challenges and a Funeral.
Mauro Barni
Fernando Pérez-González
Benedetta Tondi
2020
journals/tifs
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint.
David Vázquez-Padín
Marco Fontani
Dasara Shullani
Fernando Pérez-González
Alessandro Piva
Mauro Barni
2020
journals/tifs
Identification of VoIP Speech With Multiple Domain Deep Features.
Yuankun Huang
Bin Li
Mauro Barni
Jiwu Huang
2019
journals/tifs
Secure Detection of Image Manipulation by Means of Random Feature Selection.
Zhipeng Chen
Benedetta Tondi
Xiaolong Li
Rongrong Ni
Yao Zhao
Mauro Barni
2019
journals/tifs
CNN-Based Adversarial Embedding for Image Steganography.
Weixuan Tang
Bin Li
Shunquan Tan
Mauro Barni
Jiwu Huang
2017
journals/tifs
Farewell Message.
Mauro Barni
2017
journals/tifs
Smart Detection of Line-Search Oracle Attacks.
Benedetta Tondi
Pedro Comesaña Alfaro
Fernando Pérez-González
Mauro Barni
2016
journals/tifs
A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
Andrea Abrardo
Mauro Barni
Kassem Kallas
Benedetta Tondi
2016
journals/tifs
Piecewise Function Approximation With Private Data.
Riccardo Lazzeretti
Tommaso Pignata
Mauro Barni
2016
journals/tifs
Multiple Parenting Phylogeny Relationships in Digital Images.
Alberto A. de Oliveira
Pasquale Ferrara
Alessia De Rosa
Alessandro Piva
Mauro Barni
Siome Goldenstein
Zanoni Dias
Anderson Rocha
2016
journals/tifs
Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.
Mauro Barni
Benedetta Tondi
2014
journals/tifs
A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding.
Andrea Abrardo
Mauro Barni
2014
journals/tifs
Forensic Analysis of SIFT Keypoint Removal and Injection.
Andrea Costanzo
Irene Amerini
Roberto Caldelli
Mauro Barni
2013
journals/tifs
A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence.
Marco Fontani
Tiziano Bianchi
Alessia De Rosa
Alessandro Piva
Mauro Barni
2013
journals/tifs
The Source Identification Game: An Information-Theoretic Perspective.
Mauro Barni
Benedetta Tondi
2013
conf/ih
SIFT keypoint removal and injection for countering matching-based image forensics.
Irene Amerini
Mauro Barni
Roberto Caldelli
Andrea Costanzo
2013
conf/esorics
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting.
Mauro Barni
Massimo Bernaschi
Riccardo Lazzeretti
Tommaso Pignata
Alessandro Sabellico
2011
journals/tifs
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
Mauro Barni
Pierluigi Failla
Riccardo Lazzeretti
Ahmad-Reza Sadeghi
Thomas Schneider
2010
journals/tifs
Composite signal representation for fast and storage-efficient processing of encrypted signals.
Tiziano Bianchi
Alessandro Piva
Mauro Barni
2010
journals/tifs
Roughness-Adaptive 3-D Watermarking Based on Masking Effect of Surface Roughness.
Kwangtaek Kim
Mauro Barni
Hong Z. Tan
2009
journals/tifs
On the implementation of the discrete Fourier transform in the encrypted domain.
Tiziano Bianchi
Alessandro Piva
Mauro Barni
2009
journals/tifs
MPSteg-color: data hiding through redundant basis decomposition.
Giacomo Cancelli
Mauro Barni
2009
conf/ih
Roughness-Adaptive 3D Watermarking of Polygonal Meshes.
Kwangtaek Kim
Mauro Barni
Hong Z. Tan
2009
conf/esorics
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
Mauro Barni
Pierluigi Failla
Vladimir Kolesnikov
Riccardo Lazzeretti
Ahmad-Reza Sadeghi
Thomas Schneider
2008
conf/sec
Enhancing Privacy in Remote Data Classification.
Alessandro Piva
Claudio Orlandi
Michele Caini
Tiziano Bianchi
Mauro Barni
2007
conf/ih
MPSteg-color: A New Steganographic Technique for Color Images.
Giacomo Cancelli
Mauro Barni
2004
conf/ih
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking.
Andrea Abrardo
Mauro Barni
1999
conf/ih
Optimum Decoding of Non-additive Full Frame DFT Watermarks.
Alessia De Rosa
Mauro Barni
Franco Bartolini
Vito Cappellini
Alessandro Piva
Coauthors
Ahmad-Reza Sadeghi
(2)
Alberto A. de Oliveira
(1)
Alessandro Piva
(7)
Alessandro Sabellico
(1)
Alessia De Rosa
(3)
Anderson Rocha
(1)
Andrea Abrardo
(3)
Andrea Costanzo
(2)
Benedetta Tondi
(14)
Bin Li
(4)
Claudio Orlandi
(1)
Dasara Shullani
(1)
David Vazquez-Padin
(1)
Fernando Pérez-González
(3)
Franco Bartolini
(1)
Giacomo Cancelli
(2)
Hong Z. Tan
(2)
Irene Amerini
(2)
Jianwei Fei
(1)
Jin Li
(1)
Jiwu Huang
(3)
Jun Wang
(1)
Kaiqing Lin
(1)
Kassem Kallas
(1)
Kwangtaek Kim
(2)
Lydia Abady
(1)
Marco Fontani
(2)
Mario Di Mauro
(1)
Massimo Bernaschi
(1)
Mauro Barni
(38)
Michele Caini
(1)
Nischay Purnekar
(1)
Paolo Addesso
(1)
Pasquale Ferrara
(1)
Pedro Comesaña Alfaro
(1)
Pierluigi Failla
(2)
Quoc-Tin Phan
(1)
Riccardo Lazzeretti
(4)
Roberto Caldelli
(2)
Rongrong Ni
(2)
Shunquan Tan
(1)
Siome Goldenstein
(1)
Thomas Schneider
(2)
Tiziano Bianchi
(4)
Tommaso Pignata
(2)
Vincenzo Matta
(1)
Vito Cappellini
(1)
Vladimir Kolesnikov
(1)
Wei Guo
(1)
Weixiang Li
(1)
Weixuan Tang
(2)
Xiaolong Li
(1)
Xulong Liu
(1)
Yakun Niu
(1)
Yao Zhao
(2)
Yuankun Huang
(1)
Yue Li
(1)
Zanoni Dias
(1)
Zhihua Xia
(1)
Zhipeng Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to