Follow
Irene Amerini
Irene Amerini
Verified email at diag.uniroma1.it
Title
Cited by
Cited by
Year
A sift-based forensic method for copy–move attack detection and transformation recovery
I Amerini, L Ballan, R Caldelli, A Del Bimbo, G Serra
IEEE transactions on information forensics and security 6 (3), 1099-1110, 2011
12242011
Deepfake video detection through optical flow based cnn
I Amerini, L Galteri, R Caldelli, A Del Bimbo
Proceedings of the IEEE/CVF international conference on computer vision …, 2019
4092019
Copy-move forgery detection and localization by means of robust clustering with J-Linkage
I Amerini, L Ballan, R Caldelli, A Del Bimbo, L Del Tongo, G Serra
Signal Processing: Image Communication 28 (6), 659-669, 2013
3832013
Localization of JPEG double compression through multi-domain convolutional neural networks
I Amerini, T Uricchio, L Ballan, R Caldelli
2017 IEEE Conference on computer vision and pattern recognition workshops …, 2017
1622017
Splicing forgeries localization through the use of first digit features
I Amerini, R Becarelli, R Caldelli, A Del Mastio
2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014
1172014
Forensic analysis of SIFT keypoint removal and injection
A Costanzo, I Amerini, R Caldelli, M Barni
IEEE transactions on information forensics and security 9 (9), 1450-1464, 2014
1022014
Geometric tampering estimation by means of a SIFT-based forensic analysis
I Amerini, L Ballan, R Caldelli, A Del Bimbo, G Serra
2010 IEEE international conference on acoustics, speech and signal …, 2010
982010
Fast image clustering of unknown source images
R Caldelli, I Amerini, F Picchioni, M Innocenti
2010 IEEE international workshop on information forensics and security, 1-5, 2010
942010
Optical Flow based CNN for detection of unlearnt deepfake manipulations
R Caldelli, L Galteri, I Amerini, A Del Bimbo
Pattern Recognition Letters 146, 31-37, 2021
902021
Image origin classification based on social network provenance
R Caldelli, R Becarelli, I Amerini
IEEE Transactions on Information Forensics and Security 12 (6), 1299-1308, 2017
872017
Media forensics on social media platforms: a survey
C Pasquini, I Amerini, G Boato
EURASIP Journal on Information Security 2021 (1), 4, 2021
702021
Exploiting prediction error inconsistencies through LSTM-based classifiers to detect deepfake videos
I Amerini, R Caldelli
Proceedings of the 2020 ACM workshop on information hiding and multimedia …, 2020
672020
Tracing images back to their social network of origin: A CNN-based approach
I Amerini, T Uricchio, R Caldelli
2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017
662017
Social network identification through image classification with CNN
I Amerini, CT Li, R Caldelli
IEEE access 7, 35264-35273, 2019
602019
Smartphone fingerprinting combining features of on-board sensors
I Amerini, R Becarelli, R Caldelli, A Melani, M Niccolai
IEEE Transactions on Information Forensics and Security 12 (10), 2457-2466, 2017
552017
Counter-forensics of SIFT-based copy-move detection by means of keypoint classification
I Amerini, M Barni, R Caldelli, A Costanzo
EURASIP Journal on Image and Video Processing 2013, 1-17, 2013
502013
Blind image clustering based on the normalized cuts criterion for camera identification
I Amerini, R Caldelli, P Crescenzi, A Del Mastio, A Marino
Signal Processing: Image Communication 29 (8), 831-843, 2014
492014
Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification
I Amerini, R Caldelli, V Cappellini, F Picchioni, A Piva
2009 16th International Conference on Digital Signal Processing, 1-7, 2009
422009
Dealing with video source identification in social networks
I Amerini, R Caldelli, A Del Mastio, A Di Fuccia, C Molinari, AP Rizzo
signal processing: Image communication 57, 1-7, 2017
372017
PRNU-based image classification of origin social network with CNN
R Caldelli, I Amerini, CT Li
2018 26th European Signal Processing Conference (EUSIPCO), 1357-1361, 2018
332018
The system can't perform the operation now. Try again later.
Articles 1–20