Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Roberto Caldelli is active.

Publication


Featured researches published by Roberto Caldelli.


IEEE Transactions on Information Forensics and Security | 2011

A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery

Irene Amerini; Lamberto Ballan; Roberto Caldelli; A. Del Bimbo; Giuseppe Serra

One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.


Eurasip Journal on Information Security | 2010

Reversible Watermarking Techniques: An Overview and a Classification

Roberto Caldelli; Francesco Filippini; Rudy Becarelli

An overview of reversible watermarking techniques appeared in literature during the last five years approximately is presented in this paper. In addition to this a general classification of algorithms on the basis of their characteristics and of the embedding domain is given in order to provide a structured presentation simply accessible for an interested reader. Algorithms are set in a category and discussed trying to supply the main information regarding embedding and decoding procedures. Basic considerations on achieved results are made as well.


Signal Processing-image Communication | 2013

Copy-move forgery detection and localization by means of robust clustering with J-Linkage

Irene Amerini; Lamberto Ballan; Roberto Caldelli; Alberto Del Bimbo; Luca Del Tongo; Giuseppe Serra

Understanding if a digital image is authentic or not, is a key purpose of image forensics. There are several different tampering attacks but, surely, one of the most common and immediate one is copy-move. A recent and effective approach for detecting copy-move forgeries is to use local visual features such as SIFT. In this kind of methods, SIFT matching is often followed by a clustering procedure to group keypoints that are spatially close. Often, this procedure could be unsatisfactory, in particular in those cases in which the copied patch contains pixels that are spatially very distant among them, and when the pasted area is near to the original source. In such cases, a better estimation of the cloned area is necessary in order to obtain an accurate forgery localization. In this paper a novel approach is presented for copy-move forgery detection and localization based on the JLinkage algorithm, which performs a robust clustering in the space of the geometric transformation. Experimental results, carried out on different datasets, show that the proposed method outperforms other similar state-of-the-art techniques both in terms of copy-move forgery detection reliability and of precision in the manipulated patch localization.


international conference on image processing | 2000

Geometric-invariant robust watermarking through constellation matching in the frequency domain

Roberto Caldelli; Mauro Barni; Franco Bartolini; Alessandro Piva

So far digital watermarking has been indicated as the most feasible answer for multimedia copyright protection issues, though many problems, especially regarding aspects of robustness against geometrical attacks, have not been completely and adequately solved yet. Robustness against geometric manipulations has been dealt with by inserting, together with the watermark, a synchronization template to be used later in the detection phase, to determine if a geometric distortion occurred and invert it before looking for the mark. A novel technique is presented, which, by exploiting the theory of geometric invariants, inserts a watermark intrinsically resistant to this sort of manipulations, thus avoiding the need of a synchronization pattern. Preliminary experimental results proving the goodness of the methodology are discussed along with some implementation problems due to the computational complexity.


international conference on image processing | 2000

A DWT-based object watermarking system for MPEG-4 video streams

Alessandro Piva; Roberto Caldelli; A. De Rosa

The MPEG-4 standard is revealing very attractive for a large set of applications. In some of them a copy protection system allowing to control the distribution of multimedia data is required. A new technology useful for copyright protection is watermarking: a digital code (watermark), indicating the copyright owner, is directly embedded into the video signal. The possibility of the MPEG-4 standard to directly access objects within a video sequence introduces a constraint to the watermarking process: even if a video object is transferred from a sequence to another, the copyright data of the single object has to be correctly detected. Another requirement is that, in order to be robust against format conversions, the watermark has to be inserted before compression. The method proposed in this paper satisfies the previous requirements by relying on an image watermarking algorithm which embeds the code in the discrete wavelet transform of each frame.


international conference on acoustics, speech, and signal processing | 2010

Geometric tampering estimation by means of a SIFT-based forensic analysis

Irene Amerini; Lamberto Ballan; Roberto Caldelli; Alberto Del Bimbo; Giuseppe Serra

In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watchers opinion. Image forensics tools provide answers to similar questions. This paper, in particular, focuses on the problem of detecting if a feigned image has been created by cloning an area of the image onto another zone to make a duplication or to cancel something awkward. The proposed method is based on SIFT features and allows both to understand which are the image points involved in the counterfeit attack and, furthermore, to recover the parameters of the geometric transformation. Experimental results are provided to witness the powerfulness of the proposed technique.


conference on security steganography and watermarking of multimedia contents | 2007

Detection of malevolent changes in digital video for forensic applications

N. Mondaini; Roberto Caldelli; Alessandro Piva; Mauro Barni; Vito Cappellini

In this paper we present a new method for the detection of forgeries in digital videos, using the sensors pattern noise. The camera pattern noise is a unique stochastic high frequency characteristic of imaging sensors and the detection of a forged frame in a video is determined by comparing the correlation between the noise within the frame itself and the reference pattern noise with an empirical threshold. The reference pattern is created for the identification of the camera and the authentication of the video too. Such a pattern is defined as self building because it is created from the video sequence during the time develop, with a technique applied frame per frame, by averaging the noise extracted from each frame. The method has been inherited from an existing system created by Fridrich et al.1 for still images. By using this method we are able to identify if all the scenes of a video sequence have been taken with the same camera and if the number and/or the content of the frames of the video have been modified. A large section of the paper is dedicated to the experimental results, where we demonstrate that it is possible to perform a reliable identification even from video that has undergone MPEG compression or frame interpolation.


International Journal of Image and Graphics | 2005

SELF RECOVERY AUTHENTICATION OF IMAGES IN THE DWT DOMAIN

Alessandro Piva; Franco Bartolini; Roberto Caldelli

The interest for multimedia contents authentication has recently increased. In particular watermarking-based authentication schemes seem to be offering some advantages with respect to classical cryptography tools (e.g. real content authentication, localization of manipulations, storage format independence, transparency to common signal processing, etc.). In this paper a simple and secure self recovery authentication algorithm which hides an image digest into some DWT subbands of the to be authenticated image is presented. This technique has been designed for video surveillance and/or remote sensing applications. The main goal of this approach is to detect possible malevolent object manipulations undergone by the image (object replacing and/or deletion) by means of a self recovery processing. This valuable characteristic has to be maintained also when an image is processed through an usual and friendly transformation like JPEG compression. Particular care is given to make the scheme robust against innocuous manipulations, and secure against forgery attempts. Experimental results are presented that demonstrate the good performance of the proposed system.


international workshop on information forensics and security | 2010

Fast image clustering of unknown source images

Roberto Caldelli; Irene Amerini; Francesco Picchioni; Matteo Innocenti

Succeeding in determining information about the origin of a digital image is a basic issue of multimedia forensics. In particular it could be interesting to individuate which is the specific camera (brand and/or model) that has taken that photo; to do that, additional knowledge are needed about the camera such as its fingerprint, usually computed by resorting at the extraction of the PRNU (Photo-Response-Uniformity-Noise) by using a group of images coming from that camera. It is easy to understand that in many application scenarios information at disposal are very limited; this is the case when, given a set of N images, we want to establish if they belong to M different cameras where M is less or, at most, equal to N, without having any knowledge about the source cameras. In this paper a new technique which aims at blindly clustering a given set of N digital images is presented. Such a technique is based on a pre-existing one [1] and improves it both in terms of error probability and of computational efficiency. The system is able, in an unsupervised and fast manner, to group photos without any initial information about their membership. Sensor pattern noise is extracted by each image as reference and the successive classification is performed by means of a hierarchical clustering procedure. Experimental results have been carried out to verify theoretical expectations and to witness the improvements with respect to the other technique. Tests have also been done in different operative circumstances (e.g. asymmetric distribution of the images within each cluster), obtaining satisfactory results.


database and expert systems applications | 2001

Robust frame-based watermarking for digital video

Vito Cappellini; Franco Bartolini; Roberto Caldelli; A. De Rosa; Alessandro Piva; A. Bami

Opening digital archives to the access of a large and spread variety of parties appears to depend on the development of more effective solutions for the transfer of rights, the protection of intellectual property and the access to digital libraries. A possible solution envisages the use of digital watermarking of multimedia works. In this paper a watermarking algorithm originally conceived for still images applications, is extended to raw video, treating it as a set of still frames. A good robustness against common image processing and geometric manipulations was achieved. Moreover, experiments with MPEG2 coding/decoding at different bit rates were carried out giving positive results.

Collaboration


Dive into the Roberto Caldelli's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge