• Home
  • Giacomo Cancelli
Giacomo Cancelli

Giacomo Cancelli

About

12
Publications
977
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
271
Citations

Publications

Publications (12)
Article
Full-text available
Recently Zhang et al. described an algorithm for the detection of ±1 LSB steganography based on the statistics of the amplitudes of local extrema in the grey-level histogram. Experimental results demonstrated performance comparable or superior to other state-of-the-art algorithms. In this paper, we describe improvements to this algorithm to (i) red...
Conference Paper
We tackle the problem of the steganalysis of images produced by different sources. We first use a classifier to try to understand the image source and then use a version of the steganalyzer that has been explicitly trained to work with images belonging to the correct class. These classifiers are widely available from the image forensics literature...
Chapter
The large variety of signal processing tools available today permits to anyone to easily modify digital multimedia objects like audio, still images or video without leaving any perceptible trace of the modifications. Even though these tools are extremely useful in several scenarios, e.g. to increase the perceived quality of multimedia contents, the...
Article
Full-text available
The main goal of any steganographic algorithm is that of hiding a message within an innocuous signal in such a way that the very presence of the hidden message remains secret. The opposite effort of determining the presence of a hidden message within a cover signal is carried out by steganalyzer programs. Blind steganalyzers do not know the stegano...
Article
Recently Zhang et al. described an algorithm for the detection of ±1 LSB steganography based on the statistics of the amplitudes of local extrema in the grey-level histogram. Experimental results demonstrated performance comparable or superior to other state-of-the-art algorithms. In this paper, we describe improvements to this algorithm to (i) red...
Conference Paper
Full-text available
In this paper we describe a robust watermarking scheme for image tampering identification and localization. A compact representation of the image is first produced by assembling a feature vector consisting of pseudo-random projections of the decimated image. Then, the quantized projections are encoded to form a hash, which is robustly embedded as a...
Article
The possibility of using redundant basis expansion to securely hide a message within a cover color image is explored by improving previous attempts in this sense in terms of security and payload. The stability and computational complexity problems of previous works are solved by introducing new selection and update rules working entirely in the int...
Conference Paper
Full-text available
We compare the performance of three steganalysis system for detection of plus/minus 1 steganography. We examine the relative performance of each system on three commonly used image databases. Experimental results clearly demonstrate that both absolute and relative performance of all three algorithms vary considerably across databases. This sensitiv...
Conference Paper
Full-text available
Recently Zhang et al described an algorithm for the detection of plusmn1 LSB steganography based on the statistics of the amplitudes of local extrema in the greylevel histogram. Experimental results demonstrated performance comparable or superior to other state-of-the-art algorithms. In this paper, we describe improvements to this algorithm to (i)...
Conference Paper
A new steganographic algorithm for color images (MPSteg-color) is presented based on Matching Pursuit (MP) decomposition of the host image. With respect to previous works operating in the MP domain, the availability of three color bands is exploited to avoid the instability of the decomposition path and to randomize it for enhanced security. A sele...
Article
Full-text available
In this paper we propose a new steganographic algorithm based on Matching Pursuit image decomposition. Many modern approaches to detect the presence of hidden messages are based on statistical analysis, preferably on the analysis of higher-order statistical regularities. The idea behind this work is to adaptively choose the elements of a redundant...

Network

Cited By