default search action
Valentina Conotter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Francesco Tessarolo, Despoina Petsani, Valentina Conotter, Giandomenico Nollo, Giuseppe Conti, Maria M. Nikolaidou, Giulia Onorati, Panagiotis D. Bamidis, Evdokimos I. Konstantinidis:
Developing ambient assisted living technologies exploiting potential of user-centred co-creation and agile methodology: the CAPTAIN project experience. J. Ambient Intell. Humaniz. Comput. 15(5): 2661-2676 (2024)
2010 – 2019
- 2019
- [c23]Francesco Tessarolo, Giandomenico Nollo, Valentina Conotter, Giulia Onorati, Evdokimos I. Konstantinidis, Despoina Petsani, Panagiotis D. Bamidis:
User-centered co-design and AGILE methodology for developing ambient assisting technologies: Study plan and methodological framework of the CAPTAIN project. ISCT 2019: 283-286 - [c22]Evdokimos I. Konstantinidis, Despoina Petsani, Giuseppe Conti, Antonis Billis, Valentina Conotter, Guillaume Chican, Tim Llewellynn Lorenzo, Alejandro Rivero Rodríguez, Santiago Hors-Fraile, Andoni Beristain, Gorka Epelde, Unai Díaz-Orueta, Louise Hopper, Maxim Kostin, Rosa Almeida, Raquel Losada, Wolfgang Kniejski, Giandomenico Nollo, Francesco Tessarolo, Panagiotis D. Bamidis:
A New Approach for Ageing at Home: The CAPTAIN System. MedInfo 2019: 1704-1705 - 2018
- [c21]S. Anzivino, Giandomenico Nollo, Valentina Conotter, Giovanni Maria Achille Guandalini, Giuseppe Conti, Francesco Tessarolo:
Designing Multidimensional Assessment of ICTs for Elderly People: The UNCAP Clinical Study Protocol. ForItAAL 2018: 47-69 - 2016
- [c20]Paolo Rota, Enver Sangineto, Valentina Conotter, Christopher Pramerdorfer:
Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? ICPR 2016: 2503-2508 - 2015
- [j3]Valentina Conotter, Pedro Comesaña Alfaro, Fernando Pérez-González:
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images. IEEE Trans. Inf. Forensics Secur. 10(11): 2257-2269 (2015) - [c19]Cecilia Pasquini, Carlo Brunetta, Andrea F. Vinci, Valentina Conotter, Giulia Boato:
Towards the verification of image integrity in online news. ICME Workshops 2015: 1-6 - [c18]Duc-Tien Dang-Nguyen, Cecilia Pasquini, Valentina Conotter, Giulia Boato:
RAISE: a raw images dataset for digital image forensics. MMSys 2015: 219-224 - 2014
- [c17]Valentina Conotter, Duc-Tien Dang-Nguyen, Giulia Boato, María Menéndez, Martha A. Larson:
Assessing the impact of image manipulation on users' perceptions of deception. Human Vision and Electronic Imaging 2014: 90140Y - [c16]Valentina Conotter, E. Bodnari, Giulia Boato, Hany Farid:
Physiologically-based detection of computer generated faces in video. ICIP 2014: 248-252 - [c15]Valentina Conotter, Guido Grassel, Francesco G. B. De Natale:
Multi-device Interaction for Content Sharing. EMASC@MM 2014: 29-34 - [c14]Valentina Conotter, Duc-Tien Dang-Nguyen, Michael Riegler, Giulia Boato, Martha A. Larson:
A Crowdsourced Data Set of Edited Images Online. CrowdMM 2014: 49-52 - [c13]Duc-Tien Dang-Nguyen, Valentina Conotter, Giulia Boato, Francesco G. B. De Natale:
Video forensics based on expression dynamics. WIFS 2014: 161-166 - 2013
- [c12]Valentina Conotter, Pedro Comesaña, Fernando Pérez-González:
Forensic analysis of full-frame linearly filtered JPEG images. ICIP 2013: 4517-4521 - [c11]Duc-Tien Dang-Nguyen, Israel D. Gebru, Valentina Conotter, Giulia Boato, Francesco G. B. De Natale:
Counter-forensics of median filtering. MMSP 2013: 260-265 - [c10]Valentina Conotter, Pedro Comesaña, Fernando Pérez-González:
Joint detection of full-frame linear filtering and JPEG compression in digital images. WIFS 2013: 156-161 - 2012
- [j2]Valentina Conotter, James F. O'Brien, Hany Farid:
Exposing Digital Forgeries in Ballistic Motion. IEEE Trans. Inf. Forensics Secur. 7(1): 283-296 (2012) - 2011
- [c9]Valentina Conotter, Lorenzo Cordin:
Detecting photographic and computer generated composites. Image Processing: Algorithms and Systems 2011: 78700A - [c8]Andrea Cortiana, Valentina Conotter, Giulia Boato, Francesco G. B. De Natale:
Performance comparison of denoising filters for source camera identification. Media Forensics and Security 2011: 788007 - 2010
- [c7]Valentina Conotter, Giulia Boato, Hany Farid:
Detecting photo manipulation on signs and billboards. ICIP 2010: 1741-1744 - [c6]Valentina Conotter, Giulia Boato, Marco Carli, Karen O. Egiazarian:
Near lossless reversible data hiding based on adaptive prediction. ICIP 2010: 2585-2588
2000 – 2009
- 2009
- [j1]Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari:
Watermarking robustness evaluation based on perceptual quality via genetic algorithms. IEEE Trans. Inf. Forensics Secur. 4(2): 207-216 (2009) - [c5]Valentina Conotter, Giulia Boato, Claudio Fontanari, Francesco G. B. De Natale:
Comparison of watermarking algorithms via a GA-based benchmarking tool. ICIP 2009: 4229-4232 - [c4]Valentina Conotter, Giulia Boato, Claudio Fontanari, Francesco G. B. De Natale:
Robustness and security assessment of image watermarking techniques by a stochastic approach. Image Processing: Algorithms and Systems 2009: 72450 - [c3]Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari:
Towards Multimedia Opinion Mining. LivingWeb@ISWC 2009 - 2008
- [c2]Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari:
A joint asymmetric watermarking and image encryption scheme. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68191A - 2007
- [c1]Giulia Boato, Valentina Conotter, Francesco G. B. De Natale:
GA-Based Robustness Evaluation Method for Digital Image Watermarking. IWDW 2007: 294-307
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint