Cecilia PasquiniFondazione Bruno Kessler | FBK
Cecilia Pasquini
PhD, Information and Communication Technology
About
44
Publications
9,338
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,225
Citations
Introduction
Additional affiliations
November 2012 - July 2016
Publications
Publications (44)
The attack landscape against video-based face verification is rapidly evolving, thus leading to increased opportunities of impersonation and identity theft within remote identity proofing processes. To support reliable security and risk analyses, we provide an extended threat model composed of threats and security controls for the face acquisition...
This paper presents a secure identity proofing flow for metaverse-based applications, enabling the validation of authoritative identity evidence (such as electronic passports and identity cards) to support sensitive or legally binding operations performed through virtual reality (VR) headsets. These use cases, common in business environments, requi...
Countering image and video manipulations is getting more and more relevant in several fields such as investigation, intelligence and forensics. Multimedia forensics researchers keep developing newtools and updating available detectors to discriminate the processing the media has been subjected to. Even though these tools can be effectively used und...
In the field of image forensics, notable attention has been recently paid toward the detection of synthetic contents created through Generative Adversarial Networks (GANs), especially face images. This work explores a classification methodology inspired by the inner architecture of typical GANs, where vectors in a low-dimensional latent space are t...
The amount of multimedia content shared everyday, combined with the level of realism reached by recent fake-generating technologies, threatens to impair the trustworthiness of online information sources. The process of uploading and sharing data tends to hinder standard media forensic analyses, since multiple re-sharing steps progressively hide the...
Video stabilization is an in-camera processing commonly applied by modern acquisition devices. While significantly improving the visual quality of the resulting videos, it has been shown that such operation typically hinders the forensic analysis of video signals. In fact, the correct identification of the acquisition source usually based on Photo...
italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Deep fakes
have recently become popular. The term refers to doctored media content where one’s face is swapped with someone else’s face or performs someone else’s face movements. In the last couple of years, numerous video clips, often involving celebr...
The detection of manipulated videos represents a highly relevant problem in multimedia forensics, which has been widely investigated in the last years. However, a common trait of published studies is the fact that the forensic analysis is typically applied on data prior to their potential dissemination over the web. This work addresses the challeng...
The amount of multimedia content shared everyday, combined with the level of realism reached by recent fake-generating technologies, threatens to impair the trustworthiness of online information sources. The process of uploading and sharing data tends to hinder standard media forensic analyses, since multiple re-sharing steps progressively hide the...
The creation of manipulated multimedia content involving human characters has reached in the last years unprecedented realism, calling for automated techniques to expose synthetically generated faces in images and videos.
This work explores the analysis of spatio-temporal texture dynamics of the video signal, with the goal of characterizing and dis...
Deep fakes became extremely popular in the last years, also thanks to their increasing realism. Therefore, there is the need to measures human's ability to distinguish between real and synthetic face images when confronted with cutting-edge creation technologies. We describe the design and results of a perceptual experiment we have conducted, where...
The dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the multimedia forensics research community pursued the ambition to scale the forensic analysis to real-world web-based open systems. This survey...
Face-morphing operations allow for the generation of digital faces that simultaneously carry the characteristics of two different subjects. It has been demonstrated that morphed faces strongly challenge face-verification systems, as they typically match two different identities. This poses serious security issues in machine-assisted border control...
The creation of manipulated multimedia content involving human characters has reached in the last years unprecedented realism, calling for automated techniques to expose synthetically generated faces in images and videos. This work explores the analysis of spatio-temporal texture dynamics of the video signal, with the goal of characterizing and dis...
Abstract Backdoor attacks against supervised machine learning methods seek to modify the training samples in such a way that, at inference time, the presence of a specific pattern (trigger) in the input data causes misclassifications to a target class chosen by the adversary. Successful backdoor attacks have been presented in particular for face re...
With the advent of ubiquitous sensing and real-time data processing, the demand for engineers with solid signal processing skills has exceeded the supply by a large margin. However, even students in technical subjects often perceive signal processing as demanding and somewhat dry [4]. In many curricula, signal processing must compete with more attr...
Traditionally, the quality of a multimedia system was mainly assessed through the evaluation of its Quality of Service (QoS) that is by evaluating system parameters such as bandwidth, latency, jitter, throughput, transmission delay, availability, etc. However, these metrics often failed to capture the actual end-user perceived quality, which has pr...
The detection of rescaling operations represents an important task in multimedia forensics. While many effective heuristics have been proposed, there is no theory on the forensic detectability revealing the conditions of more or less reliable detection. We study the problem of discriminating 1D and 2D genuine signals from signals that have been dow...
Adversarial classification is the task of performing robust classification in the presence of a strategic attacker. Originating from information hiding and multimedia forensics, adversarial classification recently received a lot of attention in a broader security context. In the domain of machine learning-based image classification, adversarial cla...
Steganographic systems use Syndrome Trellis Coding (STC) to control the selection of embedding positions in a cover, subject to a set of stochastic constraints. This paper reports observations from a series of experiments on the ability of Syndrome Trellis Coding to approximate independent Bernoulli random variables. We find that approximation erro...
Intrinsic statistical properties of natural uncompressed images are used in image forensics for detecting traces of previous processing operations. In this paper, we propose novel forensic detectors of JPEG compression traces in images stored in uncompressed formats, based on a theoretical analysis of Benford–Fourier coefficients computed on the 8×...
Although several methods have been proposed for the detection of resampling operations in multimedia signals and the estimation of the resampling factor, the fundamental limits for this forensic task leave open research questions. In this work, we explore the effects that a downsampling operation introduces in the statistics of a 1D signal as a fun...
Cracking-resistant password vaults have been recently proposed with the goal of thwarting offline attacks. This requires the generation of synthetic password vaults that are statistically indistinguishable from real ones. In this work, we establish a conceptual link between this problem and steganography, where the stego objects must be undetectabl...
We present an improved method for the remote estimation of heart rate from face videos. By relying on visual techniques used for the decomposition of spatial information, we propose a novel pipeline to properly extract and process the time signal containing the heart rate information. In order to validate our approach, a dataset of videos containin...
The increasing availability and pervasiveness of multimedia data in our society is before our very eyes.
As a result of globalization and worldwide connectivity, people from all over the planet are exchanging constantly increasing amounts of images, videos, audio recordings on a daily basis.
Coupled with the easy access to user-friendly editing so...
In this paper, we propose a forensic technique that is able to detect the application of a median filter to 1D data. The method relies on deterministic mathematical properties of the median filter, which lead to the identification of specific relationships among the sample values that cannot be found in the filtered sequences. Hence, their presence...
We address the known problem of detecting a previous compression in JPEG images, focusing on the challenging case of high and very high quality factors (>= 90) as well as repeated compression with identical or nearly identical quality factors. We first revisit the approaches based on Benford--Fourier analysis in the DCT domain and block convergence...
Digital forensics is a relatively new research area which aims at authenticating digital media by detecting possible digital forgeries. Indeed, the ever increasing availability of multimedia data on the web, coupled with the great advances reached by computer graphical tools, makes the modification of an image and the creation of visually compellin...
Intrinsic statistical properties of natural uncompressed images can be used in image forensics for detecting traces of previous processing operations. In this paper, we extend the recent theoretical analysis of Benford-Fourier coefficients and propose a novel forensic detector of JPEG compression traces in images stored in an uncompressed format. T...
The analysis of JPEG compressed images is one of the most studied problems in image forensics, because of the extensive use and the characteristic traces left by such coding operation. In this paper, we propose a novel statistical framework for the identification of previous multiple aligned compressions in JPEG images and the estimation of the qua...
First-order statistics of First Significant Digits (FSD) have been recently exploited in multimedia forensics as a powerful tool to reveal traces of previous coding operations. As an answer, adversarial approaches aimed at modifying the FSD histogram and fooling such forensic methods have been proposed. However, the existing techniques have limitat...
Traces left by lossy compression processes have been widely studied in digital image forensics. In particular, the artifacts produced by JPEG compression have been characterized and exploited both in forensic methods and counter-forensic attacks. In this paper, we propose a novel anti-forensic procedure, aimed at concealing the traces of single JPE...