Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Giulia Boato is active.

Publication


Featured researches published by Giulia Boato.


Signal Processing-image Communication | 2011

A commutative digital image watermarking and encryption method in the tree structured Haar transform domain

Michela Cancellaro; Federica Battisti; Marco Carli; Giulia Boato; F.G.B. De Natale; Alessandro Neri

In this paper a commutative watermarking and ciphering scheme for digital images is presented. The commutative property of the proposed method allows to cipher a watermarked image without interfering with the embedded signal or to watermark an encrypted image still allowing a perfect deciphering. Both operations are performed on a parametric transform domain: the Tree Structured Haar transform. The key dependence of the adopted transform domain increases the security of the overall system. In fact, without the knowledge of the generating key it is not possible to extract any useful information from the ciphered-watermarked image. Experimental results show the effectiveness of the proposed scheme.


acm sigmm conference on multimedia systems | 2015

RAISE: a raw images dataset for digital image forensics

Duc-Tien Dang-Nguyen; Cecilia Pasquini; Valentina Conotter; Giulia Boato

Digital forensics is a relatively new research area which aims at authenticating digital media by detecting possible digital forgeries. Indeed, the ever increasing availability of multimedia data on the web, coupled with the great advances reached by computer graphical tools, makes the modification of an image and the creation of visually compelling forgeries an easy task for any user. This in turns creates the need of reliable tools to validate the trustworthiness of the represented information. In such a context, we present here RAISE, a large dataset of 8156 high-resolution raw images, depicting various subjects and scenarios, properly annotated and available together with accompanying metadata. Such a wide collection of untouched and diverse data is intended to become a powerful resource for, but not limited to, forensic researchers by providing a common benchmark for a fair comparison, testing and evaluation of existing and next generation forensic algorithms. In this paper we describe how RAISE has been collected and organized, discuss how digital image forensics and many other multimedia research areas may benefit of this new publicly available benchmark dataset and test a very recent forensic technique for JPEG compression detection.


IEEE Antennas and Wireless Propagation Letters | 2006

Design of a Prefractal Monopolar Antenna for 3.4-3.6 GHz Wi-Max Band Portable Devices

Renzo Azaro; Giulia Boato; Massimo Donelli; Andrea Massa; Edoardo Zeni

In this letter, the design of a miniaturized monopolar prefractal antenna for the 3.4-3.6 GHz WiMax band is presented. The geometrical configuration of the monopolar antenna, printed on a planar dielectric substrate, has been synthesized by means of a particle swarm optimizer in order to minimize the linear dimensions of the device and to obtain voltage standing wave ratio (VSWR) values within specifications. The results of numerical simulations are shown and compared, in terms of VSWR, with the experimental measurements


IEEE Communications Letters | 2007

Enhanced GPSR Routing in Multi-Hop Vehicular Communications through Movement Awareness

Fabrizio Granelli; Giulia Boato; Dzmitry Kliazovich; Gianni Vernazza

Providing reliable and efficient routing in presence of relative movement motivates the introduction of movement awareness to improve performance of existing position-based routing schemes in vehicular ad-hoc networks. The proposed algorithm represents a modification of well-known GPSR which exploits information about movement in order to improve the next forwarding node decision. Performance evaluation of the proposed protocol underlines a promising and robust basis for designing a routing strategy suitable for the automotive scenario.


IEEE Transactions on Information Forensics and Security | 2009

Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms

Giulia Boato; Valentina Conotter; F.G.B. De Natale; Claudio Fontanari

This paper presents a novel and flexible benchmarking tool based on genetic algorithms (GA) and designed to assess the robustness of any digital image watermarking system. The main idea is to evaluate robustness in terms of perceptual quality, measured by weighted peak signal-to-noise ratio. Through a stochastic approach, we optimize this quality metric, by finding the minimal degradation that needs to be introduced in a marked image in order to remove the embedded watermark. Given a set of attacks, chosen according to the considered application scenario, GA support the optimization of the parameters to be assigned to each processing operation, in order to obtain an unmarked image with perceptual quality as high as possible. Extensive experimental results demonstrate the effectiveness of the proposed evaluation tool.


electronic imaging | 2008

A Joint Digital Watermarking and Encryption Method

Michela Cancellaro; Federica Battisti; Marco Carli; Giulia Boato; F.G.B. De Natale; Alessandro Neri

In this paper a joint watermarking and ciphering scheme for digital images is presented. Both operations are performed on a key-dependent transform domain. The commutative property of the proposed method allows to cipher a watermarked image without interfering with the embedded signal or to watermark an encrypted image still allowing a perfect deciphering. Furthermore, the key dependence of the transform domain increases the security of the overall system. Experimental results show the effectiveness of the proposed scheme.


international conference on image processing | 2010

Detecting photo manipulation on signs and billboards

Valentina Conotter; Giulia Boato; Hany Farid

The manipulation of text on a sign or billboard is relatively easy to do in a way that is perceptually convincing. When text is on a planar surface and imaged under perspective projection, the text undergoes a specific distortion. When text is manipulated, it is unlikely to precisely satisfy this geometric mapping. We describe a technique for detecting if text in an image obeys the expected perspective projection, deviations from which are used as evidence of tampering.


EURASIP Journal on Advances in Signal Processing | 2009

Joint watermarking and encryption of color images in the Fibonacci-Haar domain

Federica Battisti; Michela Cancellaro; Giulia Boato; Marco Carli; Alessandro Neri

A novel method for watermarking and ciphering color images, based on the joint use of a key-dependent wavelet transform with a secure cryptographic scheme, is presented. The system allows to watermark encrypted data without requiring the knowledge of the original data and also to cipher watermarked data without damaging the embedded signal. Since different areas of the proposed transform domain are used for encryption and watermarking, the extraction of the hidden information can be performed without deciphering the cover data and it is also possible to decipher watermarked data without removing the watermark. Experimental results show the effectiveness of the proposed scheme.


IEEE Transactions on Signal Processing | 2006

An improved asymmetric watermarking scheme suitable for copy protection

Giulia Boato; F.G.B. De Natale; Claudio Fontanari

A major limitation of some recently proposed asymmetric watermarking techniques based on linear algebra lies in the strong dependence of the watermark on the original image. The present correspondence suggests an alternative scheme that not only is secure against projection attack but also allows the insertion of arbitrary watermarking sequences


IEEE Transactions on Multimedia | 2007

Digital Image Tracing by Sequential Multiple Watermarking

Giulia Boato; F.G.B. De Natale; Claudio Fontanari

The possibility of adding several watermarks to the same image would enable many interesting applications such as multimedia document tracing, data usage monitoring, multiple property management. In this paper, we present a novel watermarking scheme which allows to insert and reliably detect multiple watermarks sequentially embedded into a digital image. The proposed method, based on elementary linear algebra, is asymmetric, secure under projection attack and robust against distortion due to basic operations such as storage, transmission, format conversion, etc

Collaboration


Dive into the Giulia Boato's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Luca Piras

University of Cagliari

View shared research outputs
Researchain Logo
Decentralizing Knowledge