OBD_SecureAlert: An anomaly detection system for vehicles

SN Narayanan, S Mittal, A Joshi - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Vehicles can be considered as a specialized form of Cyber Physical Systems with sensors,
ECU''s and actuators working together to produce a coherent behavior. With the advent of …

Hybrid reference-based video source identification

M Iuliani, M Fontani, D Shullani, A Piva - Sensors, 2019 - mdpi.com
Millions of users share images and videos generated by mobile devices with different
profiles on social media platforms. When publishing illegal content, they prefer to use …

An effective extension of the applicability of alignment-free biological sequence comparison algorithms with Hadoop

G Cattaneo, UF Petrillo, R Giancarlo… - The Journal of …, 2017 - Springer
Alignment-free methods are one of the mainstays of biological sequence comparison, ie, the
assessment of how similar two biological sequences are to each other, a fundamental and …

Spanning tree based state encoding for low power dissipation

W Nöth, R Kolla - Proceedings of the conference on Design, automation …, 1999 - dl.acm.org
In this paper we address the problem of state encoding for synchronous finite state
machines. The primary goal is the reduction of switching activity in the state register. At the …

A possible pitfall in the experimental analysis of tampering detection algorithms

G Cattaneo, G Roscigno - 2014 17th International Conference …, 2014 - ieeexplore.ieee.org
This paper aims to give a contribute to the experimental evaluation of tampered image
detection algorithms (ie Image Integrity algorithms), by describing a possible way to improve …

Evaluation of local descriptors and CNNs for non-adult detection in visual content

M Castrillón-Santana, J Lorenzo-Navarro… - Pattern Recognition …, 2018 - Elsevier
The recent evolution of storage devices, digital embedded cameras and the Internet have
collaterally allowed sexual predators to take advantage of these technological …

A PNU-based technique to detect forged regions in digital images

G Cattaneo, U Ferraro Petrillo, G Roscigno… - Advanced Concepts for …, 2015 - Springer
In this paper we propose a non-blind passive technique for image forgery detection. Our
technique is a variant of a method presented in [8] and it is based on the analysis of the …

A hybrid approach to video source identification

M Iuliani, M Fontani, D Shullani, A Piva - arXiv preprint arXiv:1705.01854, 2017 - arxiv.org
Multimedia Forensics allows to determine whether videos or images have been captured
with the same device, and thus, eventually, by the same person. Currently, the most …

Improving the experimental analysis of tampered image detection algorithms for biometric systems

G Cattaneo, G Roscigno, UF Petrillo - Pattern Recognition Letters, 2018 - Elsevier
In this paper we deal with the experimental evaluation of tampered image detection
algorithms. These algorithms aim at establishing if any manipulation has been carried out on …

An experimental estimate of the impact produced on PNU by new generation video codecs

A Bruno, G Cattaneo - International Journal of Embedded …, 2020 - inderscienceonline.com
The resolution of video cameras has increased considerably in recent years leading to a
new generation of codecs with higher compression rates, such as H. 265, VP9 and AV1 …