IAPP https://lesc.dinfo.unifi.it/en en HDR License https://lesc.dinfo.unifi.it/en/node/232 <span class="field field--name-title field--type-string field--label-hidden">HDR License</span> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><strong>HDR License</strong></p> <p>Copyright (c) CSP Lab. (Communications &amp; Signal Processing Laboratory), Dept. Information Engineering, University of Florence, 2018</p> <p>All data provided in the 'HDR dataset' are made freely available for scientific, non-commercial purposes such as academic research, teaching, or personal experimentation. Permission is granted to use and copy the provided data given that you agree to the following coniditions:</p> <p>1. The provided data comes "AS IS", without express or implied warranty.<br /> 2. A reference to our paper  O. Al Shaya , P. Yang , R. Ni, Y. Zhao , and A. Piva, <a href="https://www.mdpi.com/1424-8220/18/11/3801">“A new dataset for source identification of High Dynamic Range images”</a>, Sensors, 2018, 18(11), 3801 is included in any published work using the provided data either as a whole or in parts.<br /> 3. You may not use or distribute the data or any derivative work for commercial purposes as, for example, licensing or selling the data, or using the data with a purpose to procure a commercial gain without written permission.<br /> 4. All copies or derivatives of the provided data must retain the above copyright notice, the license including all conditions and a link to the original website <a href="https://lesc.dinfo.unifi.it/en/datasets">https://lesc.dinfo.unifi.it/en/datasets</a>.<br /> 5. All rights not expressly granted to you are reserved by the authors.</p> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/en/user/4" typeof="schema:Person" property="schema:name" datatype="">nozzoli</span></span> <span class="field field--name-created field--type-created field--label-hidden">Mon, 11/05/2018 - 10:20</span> <div class="field field--name-field-gruppo-di-ricerca field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Gruppo di ricerca</div> <div class="field__items"> <div class="field__item"><a href="/it/taxonomy/term/5" hreflang="it">IAPP</a></div> </div> </div> <div class="field field--name-field-content-type field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Content type</div> <div class="field__item"><a href="/en/taxonomy/term/47" hreflang="en">Materials</a></div> </div> <div class="field field--name-field-research-area field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Research area</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/17" hreflang="und">Multimedia Forensics</a></div> </div> </div> <section class="field field--name-comment-node-book field--type-comment field--label-hidden comment-wrapper"> </section> Mon, 05 Nov 2018 09:20:41 +0000 nozzoli 232 at https://lesc.dinfo.unifi.it VISION Dataset License https://lesc.dinfo.unifi.it/en/node/230 <span class="field field--name-title field--type-string field--label-hidden">VISION Dataset License</span> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><strong>VISION Dataset License</strong></p> <p>Copyright (c) CSP Lab. (Communications &amp; Signal Processing Laboratory), Dept Information Engineering, University of Florence, 2017</p> <p>This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit <a href="http://creativecommons.org/licenses/by-sa/4.0/">http://creativecommons.org/licenses/by-sa/4.0/</a> or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.</p> <p>If you use this dataset for your research, please consider citing our paper (available at <a href="https://link.springer.com/article/10.1186/s13635-017-0067-2">https://link.springer.com/article/10.1186/s13635-017-0067-2</a>):</p> <p>@article{shullani2017vision,<br />   title={VISION: a video and image dataset for source identification},<br />   author={Shullani, Dasara and Fontani, Marco and Iuliani, Massimo and Al Shaya, Omar and Piva, Alessandro},<br />   journal={EURASIP Journal on Information Security},<br />   volume={2017},<br />   number={1},<br />   pages={1--16},<br />   year={2017},<br />   doi={<a href="https://doi.org/10.1186/s13635-017-0067-2">https://doi.org/10.1186/s13635-017-0067-2</a>},<br />   publisher={SpringerOpen}<br /> }</p> <p>Notes:<br /> In the following, we will provide some revised references on the REWIND project that in the paper above were missing or mistaken.<br /> [14.1] D. Vazquez-Padin and F. Perez-Gonzalez, <a href="http://www.gts.tsc.uvigo.es/gpsc/publications/wmark/wifs11_dvazquez_fperez.pdf">"Prefilter Design for Forensic Resampling Estimation"</a>, 2011 IEEE International Workshop on Information Forensics and Security (WIFS), Nov. 2011<br /> [14.2] D. Vazquez-Padin and P. Comesana, <a href="http://webs.uvigo.es/gpscuvigo/sites/default/files/publications/wifs2012_dvazquez_pcomesan.pdf">"ML estimation of the resampling factor"</a>, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.205,210, 2-5 Dec. 2012<br /> [16] P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro, "Local tampering detection in video sequences", 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), Pula, Italy, 2013</p> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/en/user/4" typeof="schema:Person" property="schema:name" datatype="">nozzoli</span></span> <span class="field field--name-created field--type-created field--label-hidden">Mon, 11/05/2018 - 09:12</span> <div class="field field--name-field-gruppo-di-ricerca field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Gruppo di ricerca</div> <div class="field__items"> <div class="field__item"><a href="/it/taxonomy/term/5" hreflang="it">IAPP</a></div> </div> </div> <div class="field field--name-field-content-type field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Content type</div> <div class="field__item"><a href="/en/taxonomy/term/47" hreflang="en">Materials</a></div> </div> <div class="field field--name-field-research-area field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Research area</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/17" hreflang="und">Multimedia Forensics</a></div> </div> </div> <section class="field field--name-comment-node-book field--type-comment field--label-hidden comment-wrapper"> </section> Mon, 05 Nov 2018 08:12:56 +0000 nozzoli 230 at https://lesc.dinfo.unifi.it Secure Signal Processing https://lesc.dinfo.unifi.it/it/node/188 <span class="field field--name-title field--type-string field--label-hidden">Secure Signal Processing</span> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><u><strong><a href="https://drive.google.com/open?id=11l6hZWlP3FJqjAp2UFYw852p3_6nADj1" style="font-family: Arial, Helvetica, sans-serif; font-size: 16px; text-decoration: initial; color: rgb(34, 41, 42);">e-FFT.rar</a></strong></u></p> <p>This archive includes a C++ prototype implementation of encrypted domain fast Fourier transform (e-FFT) based on Paillier homomorphic cryptosystem [1]. Both radix-2 and radix-4 decimation in time versions are provided. If you find the code useful, please cite the following reference:</p> <p>[1] T.Bianchi, A.Piva, M.Barni, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=173" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"On the Implementation of the Discrete Fourier Transform in the Encrypted Domain",</a> <em>IEEE Transactions on Information Forensics and Security</em>, vol. 4, no. 1, Mar. 2009, pp. 86-97.</p> <h4><u><strong><a href="https://drive.google.com/open?id=11rADP5QpynElGyXbMjg-C9LP5OsMPj0E" style="text-decoration: initial; color: rgb(34, 41, 42);">e-DCT.rar</a></strong></u></h4> <p>This archive includes a C++ prototype implementation of encrypted domain discrete cosine transform (e-DCT) based on Paillier homomorphic cryptosystem [1]. It provides both standard and fast (based on Hou's algorithm) DCT-II and DCT-III. The archive also includes routines for composite representation [2] and a demo applying encrypted domain 8x8 block DCT/fast DCT using both standard and composite representations. If you find the code useful, please cite the following references:</p> <p>[1] T.Bianchi, A.Piva, M.Barni, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=211" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"Encrypted Domain DCT based on Homomorphic Cryptosystems",  </a><em>EURASIP Journal on Information Security</em>, vol. 2009,  no. Article ID 716357,  2009,  pp. 12 pages.</p> <p>[2] T.Bianchi, A.Piva, M.Barni, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=213" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals",  </a><em>IEEE Transactions on Information Forensics and Security</em>, vol. 5,  no. 1,  March 2010,  pp. 180-187.</p> <h4><u><strong><a href="https://drive.google.com/open?id=11ryjfJoM1Z7Pe70EDiBskP7nVfPSKcL8" style="text-decoration: initial; color: rgb(34, 41, 42);">ECoMark.rar</a></strong></u></h4> <p>This archive includes a C++ demo implementation of encrypted domain watermark embedding based on Paillier homomorphic cryptosystem and composite representation [1]. Different watermarking schemes (QIM, DC-QIM, RDM) and different encrypted domain embedding strategies are considered. If you find the code useful, please cite the following reference:</p> <p>[1] M.Deng, T.Bianchi, A.Piva, B.Preneel, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=206" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"Efficient implementation of a buyer-seller watermarking protocol using a composite signal representation",  </a><em>Proceedings of the First International Workshop on Signal Processing in the EncryptEd Domain (SPEED 2009)</em>, Lausanne, Switzerland,  Sept. 2009.</p> <h4><u><strong><a href="https://drive.google.com/open?id=11trsk3ty5e0VbRtg4utEMfedFzqusFtS" style="text-decoration: initial; color: rgb(34, 41, 42);">stdmMark.rar</a></strong></u></h4> <p>This archive includes a prototype implementation of client-side spread transform dither modulation (ST-DM) based on look-up tables [1]. It provides three java applications implementing the three entities required by the client-side watermarking protocol: the Server, the Client, and the Trusted Third Party. A simple demo script show how to run the three entities to perform system setup, encryption, client-side joint decryption and watermarking, watermark detection. If you find the code useful, please cite the following reference:</p> <p>[1] A. Piva, T. Bianchi, A. De Rosa, <a href="http://iapp.dinfo.unifi.it/PubEngine/index.php?mode=DET&amp;id_pubblicazioni=212" style="font-family: Arial, Helvetica, sans-serif; color: rgb(0, 0, 204);" target="blank">"Secure Client-Side ST-DM Watermark Embedding",  </a><em>IEEE Transactions on Information Forensics and Security</em>, vol. 5,  no. 1,  March 2010,  pp. 13-26.</p> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/en/user/4" typeof="schema:Person" property="schema:name" datatype="">nozzoli</span></span> <span class="field field--name-created field--type-created field--label-hidden">Mon, 01/21/2013 - 12:11</span> <div class="field field--name-field-research-group field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Research group</div> <div class="field__items"> <div class="field__item"><a href="/it/taxonomy/term/5" hreflang="it">IAPP</a></div> </div> </div> <div class="field field--name-field-content-type field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Content type</div> <div class="field__item"><a href="/en/taxonomy/term/47" hreflang="en">Materials</a></div> </div> <div class="field field--name-field-research-area field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Research area</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/12" hreflang="und">Security &amp; Privacy</a></div> </div> </div> <section class="field field--name-comment-node-book field--type-comment field--label-hidden comment-wrapper"> </section> Mon, 21 Jan 2013 11:04:15 +0000 nozzoli 188 at https://lesc.dinfo.unifi.it