Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Piva, Alessandro
add a person with the name Piva, Alessandro
 

Other publications of authors with the same name

Reverse engineering of double compressed images in the presence of contrast enhancement., , , and . MMSP, page 141-146. IEEE, (2013)Effectiveness of ST-DM Watermarking Against Intra-video Collusion., , , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 158-170. Springer, (2005)Oblivious Neural Network Computing via Homomorphic Encryption., , and . EURASIP J. Information Security, (2007)Design and Analysis of the First BOWS Contest., and . EURASIP J. Information Security, (2007)VISION: a video and image dataset for source identification., , , , and . EURASIP J. Information Security, (2017)A Hybrid Approach to Video Source Identification., , , and . CoRR, (2017)Physical layer security based on spread-spectrum watermarking and jamming receiver., , , , and . Trans. Emerging Telecommunications Technologies, (2017)Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain., , , and . ICIP, page 65-68. (2000)Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues., and . IEEE Signal Process. Mag., 30 (2): 87-96 (2013)An efficient buyer-seller watermarking protocol based on composite signal representation., , , and . MM&Sec, page 9-18. ACM, (2009)