Simone Milani

ORCID: 0000-0001-8266-5839
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Video Coding and Compression Technologies
  • Advanced Steganography and Watermarking Techniques
  • Advanced Data Compression Techniques
  • Advanced Vision and Imaging
  • Advanced Image and Video Retrieval Techniques
  • Robotics and Sensor-Based Localization
  • Video Analysis and Summarization
  • Remote Sensing and LiDAR Applications
  • 3D Shape Modeling and Analysis
  • Image and Video Quality Assessment
  • 3D Surveying and Cultural Heritage
  • Computer Graphics and Visualization Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Speech and Audio Processing
  • Music and Audio Processing
  • Image Processing Techniques and Applications
  • Benford’s Law and Fraud Detection
  • Law in Society and Culture
  • Advanced Image Processing Techniques
  • Biometric Identification and Security
  • Optical measurement and interference techniques
  • Speech Recognition and Synthesis
  • Advanced Neural Network Applications
  • Wireless Communication Security Techniques

University of Padua
2015-2024

Lowestoft Hospital
2024

University of the Aegean
2022

Politecnico di Milano
2012-2014

Consorzio di Bioingegneria e Informatica Medica
2014

University of Udine
1993-2013

Engineering (Italy)
2006

Telecom Italia (Italy)
2006

The broad availability of tools for the acquisition and processing multimedia signals has recently led to concern that images videos cannot be considered a trustworthy evidence, since they can altered rather easily.This possibility raises need verify whether content, which downloaded from internet, acquired by video surveillance system, or received digital TV broadcaster, is original not.To cope with these issues, signal experts have been investigating effective forensic strategies aimed at...

10.1017/atsip.2012.2 article EN cc-by-nc APSIPA Transactions on Signal and Information Processing 2012-01-01

Video sequences are often believed to provide stronger forensic evidence than still images, e.g., when used in lawsuits. However, a wide set of powerful and easy-to-use video authoring tools is today available anyone. Therefore, it possible for an attacker maliciously forge sequence, by removing or inserting object scene. These forms manipulation can be performed with different techniques. For example, portion the original may replaced either image repeated time or, more complex cases,...

10.1109/mmsp.2013.6659337 article EN 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP) 2013-09-01

Microsoft Kinect had a key role in the development of consumer depth sensors being device that brought acquisition to mass market. Despite success this sensor, with introduction second generation, has completely changed technology behind sensor from structured light Time-Of-Flight. This paper presents comparison data provided by first and generation order explain achievements have been obtained switch technology. After an accurate analysis accuracy two under different conditions, sample...

10.1109/icme.2015.7177380 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2015-06-01

The analysis of double-compressed images is a problem largely studied by the multimedia forensics community, as it might be exploited, e.g., for tampering localization or source device identification. In many practical scenarios, e.g. photos uploaded on blogs, on-line albums, and photo sharing Web sites, compressed several times. However, identification number compression stages applied to an image remains open issue. This paper proposes forensic method based distribution first significant...

10.1109/icassp.2012.6288362 article EN 2012-03-01

Video content is routinely acquired and distributed in digital format. Therefore, it customary to have the encoded multiple times. In this paper we consider a processing chain of two coding steps propose method that aims at identifying type codec used first step, by analyzing its coding-based footprints. The relies on fact lossy an almost idempotent operation, i.e., re-encoding reconstructed sequence with same parameters produces highly correlated input one. As consequence, possible analyze...

10.1109/icassp.2012.6288363 article EN 2012-03-01

Nowadays, thanks to the increasingly availability of powerful processors and user friendly applications, editing video sequences is becoming more frequent. Moreover, after each step, any object almost always encoded in order store it using a less amount memory. For this reason, inferring number compression steps that have been applied such multimedia an important clue assess its authenticity. In paper we propose method recover sequence. accomplish goal, make use classifier based on multiple...

10.1109/mmsp.2012.6343425 article EN 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP) 2012-09-01

Video content is routinely acquired and distributed in a digital compressed format. In many cases, the same video encoded multiple times. This typical scenario that arises when video, originally directly by acquisition device, then re-encoded, either after an editing operation, or uploaded to sharing website. The analysis of bitstream reveals details last compression step (i.e., codec adopted corresponding encoding parameters), while masking previous history. Therefore, this paper, we...

10.1109/tip.2016.2541960 article EN IEEE Transactions on Image Processing 2016-03-14

Discriminating multiple JPEG compressions using first digit features simone milani, marco tagliasacchi and stefano tubaroThe analysis of double-compressed images is a problem largely studied by the multimedia forensics community, as it might be exploited, e.g., for tampering localization or source device identification.In many practical scenarios, like photos uploaded on blogs, on-line albums, photo sharing web sites, compressed several times.However, identification number compression stages...

10.1017/atsip.2014.19 article EN cc-by-nc APSIPA Transactions on Signal and Information Processing 2014-01-01

The advent of Generative Adversarial Network (GAN) architectures has given anyone the ability generating incredibly realistic synthetic imagery. malicious diffusion GAN-generated images may lead to serious social and political consequences (e.g., fake news spreading, opinion formation, etc.). It is therefore important regulate widespread distribution imagery by developing solutions able detect them. In this paper, we study possibility using Benford's law discriminate from natural...

10.1109/icpr48806.2021.9412944 article EN 2022 26th International Conference on Pattern Recognition (ICPR) 2021-01-10

Image tampering is nowadays at everyone's reach. This has determined an urgent need of tools capable revealing such alterations. Unfortunately, while forgeries can be operated in many different ways, forensic usually focus on one specific kind forgeries. Therefore, effective strategy for detection and localization requires to merge the output tools. In this paper, we propose algorithm image localization, based fusion three separate detectors: i) PRNU, working when have least a few pictures...

10.1109/wifs.2014.7084315 article EN 2014-12-01

An efficient compression of depth maps proves to be a crucial element in the transmission and storage 3-D scenes. However, peculiarities geometry information make traditional coding paradigms for natural images less effective images. The letter presents novel scheme that employs an oversegmentation input image into huge set small regions. These regions are then fused together according target number objects algorithm needs identify representation. This procedure is iterated more than once...

10.1109/lsp.2010.2051619 article EN IEEE Signal Processing Letters 2010-06-24

Nowadays, considering the availability of relatively cheap devices and powerful editing software, video tampering is a easy task. Video sequences can be tampered with by performing, e.g., temporal splicing. However, if spliced together do not share same frame rate, they have to temporally interpolated beforehand. This operation often made using motion compensated interpolators, which allow minimize visual artifacts. In this paper we propose detector kind interpolation. Moreover, capable...

10.1109/icassp.2013.6638215 article EN IEEE International Conference on Acoustics Speech and Signal Processing 2013-05-01

In the current age, users consume multimedia content in very heterogeneous scenarios terms of network, hardware, and display capabilities. A naive solution to this problem is encode multiple independent streams, each covering a different possible requirement for clients, with an obvious negative impact both storage computational requirements. These drawbacks can be avoided by using codecs that enable scalability, i.e., ability generate progressive bitstream, containing base layer followed...

10.48550/arxiv.2502.14099 preprint EN arXiv (Cornell University) 2025-02-19

3D video representations usually associate to each view a depth map with the corresponding geometric information. Many compression schemes have been proposed for multi-view and data, but exploitation of correlation between two enhance performances is still an open research issue. This paper presents novel scheme that exploits segmentation color data predict shape different surfaces in map. Then segment approximated parameterized plane. In case approximation sufficiently accurate target bit...

10.1109/icme.2011.6011969 article EN 2011-07-01

The identification of the camera that has acquired a specific image can be performed via several device-related footprints. Among these, it is possible to look for traces left by adopted color demosaicing strategy, which varies according model and vendor. paper presents an strategy re-processes analyzed with set distinctive CFA interpolation algorithms (eigenalgorithms) and, correlation output original image, builds features permits identifying algorithm. proposed solution performs well...

10.1109/icassp.2014.6854082 article EN 2014-05-01

Infrared structured light sensors are widely employed for control applications, gaming, acquisition of dynamic and static 3D scenes. Recent developments have lead to the availability on market low-cost which prove be extremely sensitive noise, conditions, materials, surface nature objects, their distance from camera. As a matter fact, accurate denoising interpolation strategies needed. The paper presents quality enhancement strategy depth maps targeting IR sensors. approach has been tested...

10.1109/icassp.2012.6288004 article EN 2012-03-01

Nowadays, multimedia objects can be easily modified, shared, and distributed, thus determining the widespread diffusion of multiple near-duplicate versions, i.e., obtained applying a set processing operations to original content. This is case images downloaded from sharing platforms, modified (e.g., by performing color correction, splicing, etc.) re-distributed. The evolution group (i.e., their phylogeny) powerful clue determine both image authenticity its origin. For this reason, forensics...

10.1109/euvip.2014.7018370 article EN 2014-12-01

Nowadays, a significant fraction of the available video content is created by reusing already existing online videos. In these cases, source seldom reused as is. Conversely, it typically time clipped to extract only subset original frames, and other transformations are commonly applied (e.g., cropping, logo insertion, etc.). this paper, we analyze pool videos related same event or topic. We propose method that aims at automatically reconstructing videos, i.e., parent sequences, splicing...

10.1109/icip.2014.7026081 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2014-10-01

Augmented and mixed reality applications require efficient tools permitting the compression visualization of 3D object at a limited computational cost. To this purpose, point cloud representations have been widely used, together with an octree-based hierarchical organization data that enables multi-resolution visualization. This paper presents voxel coding strategy based on Cellular Automata block reversible transform which permits obtaining representation input volume higher gain respect to...

10.1109/icip.2017.8297036 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2017-09-01

Internet of Things (IoT) applications play a relevant role in today’s industry sharing diagnostic data with off-site service teams, as well enabling reliable predictive maintenance systems. Several interventions scenarios, however, require the physical presence human operator: Augmented Reality (AR), together broad-band connection, represents major opportunity to integrate real-time in-situ acquisitions. Diagnostic information can be shared remote specialists that are able monitor and guide...

10.3390/s20247157 article EN cc-by Sensors 2020-12-14

The standard H.264/AVC defines an efficient coding architecture both for applications where bandwidth or storage capacity is limited (e.g., video telephony conferencing over mobile channels and devices) that require high reconstruction quality bit rate HDTV). Since its main concern communication time-varying channels, the has to be controlled with scalable algorithms can implemented on low resource devices. paper describes a control algorithm needs reduced memory area complexity compared...

10.1109/tcsvt.2007.913965 article EN IEEE Transactions on Circuits and Systems for Video Technology 2008-02-01

Most of latest-generation multimedia systems are equipped with increasingly-effective object detection algorithms (e.g., intelligent video surveillance systems, augmented reality applications, sharing platforms for data, etc.). Unfortunately, images and usually available in compressed formats, which makes more difficult because the additional distortion noise. In this paper we show that it is possible to mitigate problem by introducing a rate allocation algorithm preserves important details...

10.1109/icassp.2013.6638007 article EN IEEE International Conference on Acoustics Speech and Signal Processing 2013-05-01

Researchers have been recently challenging the robustness of forensic algorithms by designing antiforensic strategies that try to fool them. In this paper, we propose an strategy targets double image compression detectors based on Benford's law (or first digit law). The proposed approach is able modify statistics considered data (a compressed image) single/double law. way, tries mimick effects a single with limited additional distortion. presented algorithm performs better than previous...

10.1109/icassp.2013.6638219 article EN IEEE International Conference on Acoustics Speech and Signal Processing 2013-05-01

Recent researches on image forensics have led to the design of algorithms study phylogenetic relationship between near-duplicate (ND) images. The proposed solutions aim at reconstructing phylogeny tree (IPT), and they immediate applications in security, law copyright enforcement, news tracking services. Anyway, effectiveness such strategies strictly depends accuracy characterizing similarities. In this paper, we show that it is possible take into account additional information better...

10.1109/icassp.2016.7472038 article EN 2016-03-01
Coming Soon ...